[ 35.557177][ T26] audit: type=1800 audit(1553069852.963:27): pid=7441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 35.577451][ T26] audit: type=1800 audit(1553069852.963:28): pid=7441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.567166][ T26] audit: type=1800 audit(1553069854.033:29): pid=7441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 36.587500][ T26] audit: type=1800 audit(1553069854.033:30): pid=7441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts. 2019/03/20 08:17:45 fuzzer started 2019/03/20 08:17:48 dialing manager at 10.128.0.26:32837 2019/03/20 08:17:49 syscalls: 1 2019/03/20 08:17:49 code coverage: enabled 2019/03/20 08:17:49 comparison tracing: enabled 2019/03/20 08:17:49 extra coverage: extra coverage is not supported by the kernel 2019/03/20 08:17:49 setuid sandbox: enabled 2019/03/20 08:17:49 namespace sandbox: enabled 2019/03/20 08:17:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/20 08:17:49 fault injection: enabled 2019/03/20 08:17:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/20 08:17:49 net packet injection: enabled 2019/03/20 08:17:49 net device setup: enabled 08:20:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) syzkaller login: [ 190.119122][ T7606] IPVS: ftp: loaded support on port[0] = 21 08:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6f}}, 0x0}, 0x48) [ 190.227212][ T7606] chnl_net:caif_netlink_parms(): no params data found [ 190.309160][ T7606] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.316826][ T7606] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.339139][ T7606] device bridge_slave_0 entered promiscuous mode [ 190.349191][ T7606] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.369759][ T7606] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.377660][ T7606] device bridge_slave_1 entered promiscuous mode [ 190.391920][ T7609] IPVS: ftp: loaded support on port[0] = 21 08:20:07 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_opts(r3, 0x0, 0x9, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xa0000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000140)={0x1}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r5 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x10000, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000400)={r6, 0x3, 0x7, 0x7f, 0x7, 0x7, 0xfff}) ioctl$int_in(r0, 0x8000000002a701, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000007c0)) eventfd(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000004c0)={0x0, 0xfffffffffffffffd, 0x55, 0x9, @buffer={0x0, 0x24, &(0x7f0000000280)=""/36}, &(0x7f0000000300)="f337487a8507504dfd217deb6dff3e9b3a2c3184c1ceb646f96c324f1286c329f0fba7f91d837bcd578077722e6ba9cdd5cabff89349f826e77a733c51dc5a0f0314f747ca00211151b4e5a1f6276f92a51e5690bc", 0x0, 0xb1d, 0x0, 0x0, 0x0}) rseq(&(0x7f0000000080), 0x20, 0x1, 0x0) [ 190.428095][ T7606] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.441600][ T7606] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.500959][ T7606] team0: Port device team_slave_0 added [ 190.508718][ T7606] team0: Port device team_slave_1 added [ 190.576107][ T7609] chnl_net:caif_netlink_parms(): no params data found 08:20:08 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0xffffffffffffffff, 0x0, 0x10, r0, 0x0) [ 190.631456][ T7606] device hsr_slave_0 entered promiscuous mode [ 190.738414][ T7606] device hsr_slave_1 entered promiscuous mode 08:20:08 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) [ 190.807019][ T7606] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.815256][ T7606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.823180][ T7606] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.830302][ T7606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.872687][ T7612] IPVS: ftp: loaded support on port[0] = 21 [ 190.880754][ T7614] IPVS: ftp: loaded support on port[0] = 21 [ 190.999022][ T7609] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.006085][ T7609] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.014734][ T7609] device bridge_slave_0 entered promiscuous mode [ 191.027289][ T7617] IPVS: ftp: loaded support on port[0] = 21 [ 191.072989][ T7606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.080125][ T7609] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.087170][ T7609] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.096008][ T7609] device bridge_slave_1 entered promiscuous mode [ 191.126198][ T7612] chnl_net:caif_netlink_parms(): no params data found [ 191.143176][ T7606] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.161685][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:20:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a0200000003fb69da03000000000000004824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd000000100001000a0c0c00fcff0000040e05a5", 0x58}], 0x1) [ 191.175476][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.194070][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.203031][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 191.233116][ T7609] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.269168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.277895][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.285029][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.295179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.304672][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.311794][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.324182][ T7609] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.357683][ T7622] IPVS: ftp: loaded support on port[0] = 21 [ 191.362217][ T7606] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.374133][ T7606] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.413342][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.422879][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.431378][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.439830][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.448271][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.456482][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.464706][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.473100][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.481594][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.489710][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.497316][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.508023][ T7609] team0: Port device team_slave_0 added [ 191.516874][ T7609] team0: Port device team_slave_1 added [ 191.527870][ T7612] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.535897][ T7612] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.544282][ T7612] device bridge_slave_0 entered promiscuous mode [ 191.553049][ T7612] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.560334][ T7612] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.567868][ T7612] device bridge_slave_1 entered promiscuous mode [ 191.577005][ T7614] chnl_net:caif_netlink_parms(): no params data found [ 191.660738][ T7609] device hsr_slave_0 entered promiscuous mode [ 191.708384][ T7609] device hsr_slave_1 entered promiscuous mode [ 191.790088][ T7612] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.825617][ T7612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.854773][ T7614] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.863044][ T7614] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.870864][ T7614] device bridge_slave_0 entered promiscuous mode [ 191.909001][ T7617] chnl_net:caif_netlink_parms(): no params data found [ 191.924426][ T7614] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.931755][ T7614] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.943137][ T7614] device bridge_slave_1 entered promiscuous mode [ 191.957070][ T7612] team0: Port device team_slave_0 added [ 191.977749][ T7606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.990677][ T7612] team0: Port device team_slave_1 added [ 192.024338][ T7614] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.035226][ T7614] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.119694][ T7612] device hsr_slave_0 entered promiscuous mode [ 192.168480][ T7612] device hsr_slave_1 entered promiscuous mode [ 192.248774][ T7617] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.256141][ T7617] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.265431][ T7617] device bridge_slave_0 entered promiscuous mode [ 192.283629][ T7614] team0: Port device team_slave_0 added [ 192.290576][ T7614] team0: Port device team_slave_1 added 08:20:09 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="240000000c061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 192.310829][ T7612] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.318124][ T7612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.325419][ T7612] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.332477][ T7612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.348384][ T7617] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.365015][ T7617] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.375741][ T7617] device bridge_slave_1 entered promiscuous mode [ 192.378959][ T7632] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 192.392176][ T7632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:09 executing program 0: socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f00000000c0)={0x2}) [ 192.413072][ T7622] chnl_net:caif_netlink_parms(): no params data found 08:20:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setrlimit(0x408000000000007, &(0x7f00000001c0)) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 08:20:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 192.451903][ T3481] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.463806][ T3481] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.491777][ T7617] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.560906][ T7614] device hsr_slave_0 entered promiscuous mode [ 192.598575][ T7614] device hsr_slave_1 entered promiscuous mode [ 192.648791][ T7617] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.667974][ C1] hrtimer: interrupt took 36736 ns [ 192.689372][ T7641] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.773470][ T7609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.787784][ T7622] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.795394][ T7622] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.803134][ T7622] device bridge_slave_0 entered promiscuous mode 08:20:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 192.821030][ T7642] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.835391][ T7617] team0: Port device team_slave_0 added [ 192.842977][ T7617] team0: Port device team_slave_1 added [ 192.863638][ T7622] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.875976][ T7622] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.884295][ T7622] device bridge_slave_1 entered promiscuous mode [ 192.902931][ T7609] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.942567][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:20:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 193.014605][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.024445][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.032693][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.041554][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.050339][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.057398][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.057748][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.073940][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.083372][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.090461][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.101370][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.110683][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.125084][ T7612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.164756][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:20:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 193.270602][ T7617] device hsr_slave_0 entered promiscuous mode [ 193.308427][ T7617] device hsr_slave_1 entered promiscuous mode [ 193.350877][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.362016][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.370798][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.381716][ T7622] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.426367][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 193.496009][ T7609] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 193.507294][ T7609] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.523496][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.533767][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.546756][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.557276][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.565781][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.574178][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.582476][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.593996][ T7622] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.606454][ T7612] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.621963][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.632466][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.640560][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.648162][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.656610][ T7618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.665119][ T7618] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.672188][ T7618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.690401][ T7614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.712482][ T7609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.731504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.740366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.750492][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.757508][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.765469][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.773894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.783254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.793462][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.806407][ T7614] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.845896][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.864213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.874587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.882540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 08:20:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) [ 193.891269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.900746][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.907801][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.908810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.929798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.945844][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.952966][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.961152][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.969692][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.978335][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.986843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.995502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.004409][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.014675][ T7622] team0: Port device team_slave_0 added [ 194.022149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.030306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.046113][ T7612] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.059430][ T7612] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.073342][ T7622] team0: Port device team_slave_1 added [ 194.083687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.095512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.104262][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.113615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.122190][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.130587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.139175][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.147288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.155796][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.164374][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.173379][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.189930][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.216278][ T7612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.227730][ T7614] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.270919][ T7622] device hsr_slave_0 entered promiscuous mode [ 194.318578][ T7622] device hsr_slave_1 entered promiscuous mode [ 194.374389][ T7617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.449574][ T7617] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.485426][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.493457][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.532872][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.545395][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.555344][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.562443][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.575189][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.585445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.594677][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.601787][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.611472][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.620180][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.629166][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.637721][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.646311][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.655034][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.663584][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.671890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.687351][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.695456][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.703553][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.712339][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.723009][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.755767][ T7622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.769325][ T7617] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.789791][ T7622] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.796780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.805979][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.825685][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.834587][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.848872][ T2997] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.856054][ T2997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.868394][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.877089][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.886104][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.893227][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.893950][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.919611][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.927588][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.936281][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.944799][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.953756][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.962274][ T7667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.975454][ T7622] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.986172][ T7622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.002573][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.010775][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.019632][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.027779][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.036316][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.045386][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.059563][ T7622] 8021q: adding VLAN 0 to HW filter on device batadv0 08:20:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x728) r1 = getpid() ioprio_get$pid(0x2, r1) 08:20:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x5, 0x4) 08:20:12 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) r1 = memfd_create(&(0x7f00000026c0)='/dev/dlm-control\x00', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000002500)=0xffffffffffffffc7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002380)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr="3dee872f7a32a02d610a5ad1a33180e7", 0x5}}, 0x8000, 0xfffffffffffff800, 0x10000, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002480), 0x8) socket$inet6(0xa, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sched_getparam(0x0, 0x0) 08:20:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x9000aea4, &(0x7f0000000280)={0x0, 0x1004000000000, [], [0xc1]}) 08:20:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a0200000003fb69da03000000000000004824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd000000100001000a0c0c00fcff0000040e05a5", 0x58}], 0x1) 08:20:12 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_opts(r3, 0x0, 0x9, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xa0000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000140)={0x1}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r5 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x10000, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000400)={r6, 0x3, 0x7, 0x7f, 0x7, 0x7, 0xfff}) ioctl$int_in(r0, 0x8000000002a701, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000007c0)) eventfd(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000004c0)={0x0, 0xfffffffffffffffd, 0x55, 0x9, @buffer={0x0, 0x24, &(0x7f0000000280)=""/36}, &(0x7f0000000300)="f337487a8507504dfd217deb6dff3e9b3a2c3184c1ceb646f96c324f1286c329f0fba7f91d837bcd578077722e6ba9cdd5cabff89349f826e77a733c51dc5a0f0314f747ca00211151b4e5a1f6276f92a51e5690bc", 0x0, 0xb1d, 0x0, 0x0, 0x0}) rseq(&(0x7f0000000080), 0x20, 0x1, 0x0) [ 195.486266][ T7686] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 08:20:13 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, 0x0, &(0x7f0000000040)) 08:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a0200000003fb69da03000000000000004824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd000000100001000a0c0c00fcff0000040e05a5", 0x58}], 0x1) 08:20:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, 0x0) 08:20:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x40505331, &(0x7f0000000000)={0x40, 0x0, 'client1\x00', 0x0, "d07fab8f1f339cbb", "1ea936f524ae2d227cd55a79ef2ac463339d1ff7ea4240595787f7258064b66e"}) 08:20:13 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) 08:20:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a0200000003fb69da03000000000000004824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd000000100001000a0c0c00fcff0000040e05a5", 0x58}], 0x1) 08:20:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', '\x00', @empty, [], @empty, [], 0xa0, 0xa0, 0x118, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x220) 08:20:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000002c0)="de0f4f947d210ec2bc7e1e689bb5fd58f435274a01c6075f2bfcbab5d4825b0c7cf8a2f5ba39ee1fbfd87dccf10130f8d0592985c98d90463a88e4dc049a64780a4947ec995f678ab6f56c4bfa269ee4b9bef0a15312db2dee0a1bffe3dc7603", 0x60, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) [ 195.979141][ T7736] ebtables: ebtables: counters copy to user failed while replacing table 08:20:13 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:13 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) r1 = memfd_create(&(0x7f00000026c0)='/dev/dlm-control\x00', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000002500)=0xffffffffffffffc7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002380)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr="3dee872f7a32a02d610a5ad1a33180e7", 0x5}}, 0x8000, 0xfffffffffffff800, 0x10000, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002480), 0x8) socket$inet6(0xa, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sched_getparam(0x0, 0x0) 08:20:13 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, 0x0) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0xfff, 0x0, 0x0, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000640)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x2, 0xffffffff80000000, 0x7, 0x7fffffff}, &(0x7f0000000200)=0x98) [ 196.052145][ T7740] ebtables: ebtables: counters copy to user failed while replacing table [ 196.143357][ T26] audit: type=1800 audit(1553070013.613:31): pid=7750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16542 res=0 [ 196.252210][ T26] audit: type=1804 audit(1553070013.613:32): pid=7750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir378735090/syzkaller.VXP7ZV/4/file0/file0" dev="sda1" ino=16542 res=1 08:20:13 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_opts(r3, 0x0, 0x9, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xa0000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000140)={0x1}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r5 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x10000, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000400)={r6, 0x3, 0x7, 0x7f, 0x7, 0x7, 0xfff}) ioctl$int_in(r0, 0x8000000002a701, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000007c0)) eventfd(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000004c0)={0x0, 0xfffffffffffffffd, 0x55, 0x9, @buffer={0x0, 0x24, &(0x7f0000000280)=""/36}, &(0x7f0000000300)="f337487a8507504dfd217deb6dff3e9b3a2c3184c1ceb646f96c324f1286c329f0fba7f91d837bcd578077722e6ba9cdd5cabff89349f826e77a733c51dc5a0f0314f747ca00211151b4e5a1f6276f92a51e5690bc", 0x0, 0xb1d, 0x0, 0x0, 0x0}) rseq(&(0x7f0000000080), 0x20, 0x1, 0x0) 08:20:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070000000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d53fa73b00000000ffffffffffff000000000000aaaaaaaa98aa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', '\x00', @empty, [], @empty, [], 0xa0, 0xa0, 0x118, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x220) 08:20:13 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) r1 = memfd_create(&(0x7f00000026c0)='/dev/dlm-control\x00', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000002500)=0xffffffffffffffc7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002380)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr="3dee872f7a32a02d610a5ad1a33180e7", 0x5}}, 0x8000, 0xfffffffffffff800, 0x10000, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002480), 0x8) socket$inet6(0xa, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sched_getparam(0x0, 0x0) [ 196.364293][ T7756] ebtables: ebtables: counters copy to user failed while replacing table 08:20:13 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) r1 = memfd_create(&(0x7f00000026c0)='/dev/dlm-control\x00', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000002500)=0xffffffffffffffc7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002380)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr="3dee872f7a32a02d610a5ad1a33180e7", 0x5}}, 0x8000, 0xfffffffffffff800, 0x10000, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002480), 0x8) socket$inet6(0xa, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sched_getparam(0x0, 0x0) 08:20:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070000000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d53fa73b00000000ffffffffffff000000000000aaaaaaaa98aa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', '\x00', @empty, [], @empty, [], 0xa0, 0xa0, 0x118, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x220) [ 196.581736][ T7742] md: loop134 has zero or unknown size, marking faulty! [ 196.611427][ T7766] ebtables: ebtables: counters copy to user failed while replacing table [ 196.622029][ T7742] md: md_import_device returned -22 08:20:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', '\x00', @empty, [], @empty, [], 0xa0, 0xa0, 0x118, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x220) 08:20:14 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) r1 = memfd_create(&(0x7f00000026c0)='/dev/dlm-control\x00', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000002500)=0xffffffffffffffc7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002380)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr="3dee872f7a32a02d610a5ad1a33180e7", 0x5}}, 0x8000, 0xfffffffffffff800, 0x10000, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002480), 0x8) socket$inet6(0xa, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sched_getparam(0x0, 0x0) [ 196.678212][ T7770] md: loop134 has zero or unknown size, marking faulty! [ 196.706560][ T7770] md: md_import_device returned -22 [ 196.826336][ T7782] ebtables: ebtables: counters copy to user failed while replacing table [ 196.905057][ T26] audit: type=1804 audit(1553070014.373:33): pid=7750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir378735090/syzkaller.VXP7ZV/4/file0/file0" dev="sda1" ino=16542 res=1 08:20:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 08:20:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) r1 = memfd_create(&(0x7f00000026c0)='/dev/dlm-control\x00', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000002500)=0xffffffffffffffc7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002380)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr="3dee872f7a32a02d610a5ad1a33180e7", 0x5}}, 0x8000, 0xfffffffffffff800, 0x10000, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002480), 0x8) socket$inet6(0xa, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sched_getparam(0x0, 0x0) [ 197.028147][ T26] audit: type=1804 audit(1553070014.403:34): pid=7786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir378735090/syzkaller.VXP7ZV/4/file0/file0" dev="sda1" ino=16542 res=1 08:20:14 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:14 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) 08:20:14 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_opts(r3, 0x0, 0x9, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xa0000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000140)={0x1}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r5 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x10000, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000400)={r6, 0x3, 0x7, 0x7f, 0x7, 0x7, 0xfff}) ioctl$int_in(r0, 0x8000000002a701, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000007c0)) eventfd(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000004c0)={0x0, 0xfffffffffffffffd, 0x55, 0x9, @buffer={0x0, 0x24, &(0x7f0000000280)=""/36}, &(0x7f0000000300)="f337487a8507504dfd217deb6dff3e9b3a2c3184c1ceb646f96c324f1286c329f0fba7f91d837bcd578077722e6ba9cdd5cabff89349f826e77a733c51dc5a0f0314f747ca00211151b4e5a1f6276f92a51e5690bc", 0x0, 0xb1d, 0x0, 0x0, 0x0}) rseq(&(0x7f0000000080), 0x20, 0x1, 0x0) 08:20:14 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) r1 = memfd_create(&(0x7f00000026c0)='/dev/dlm-control\x00', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000002500)=0xffffffffffffffc7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000024c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002380)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr="3dee872f7a32a02d610a5ad1a33180e7", 0x5}}, 0x8000, 0xfffffffffffff800, 0x10000, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002480), 0x8) socket$inet6(0xa, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) sched_getparam(0x0, 0x0) 08:20:14 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="000227d1b58f00000008000500090000000c000100080001000a0000001400032008000000080003000200c9db56b1c0f21115c1600b8f6c73da062c7c187ca9cb891d7557392775beb2fbd3286772448fbe6d93a361dc3d47e51550ec999800900080f8000000000000000000008a423f15181b01867a286f0191941a06f57dbfd82d35bc95ffd08b0114d80d57247a258a18eb1f48eb6f415f7748b09422c937c9fe5b7f7f3bd18726648d4f7cafb6184ddf21b13b8c000000003c47651295de081f337ba28bd80700c2e700000000000038000000000000000611753341e06ccfcff475109091696574deec6aa4a18a8327526670569b7101efcb1d8d9d2593121a1819bdce7d0108430ce2f424a13c7a85c64df634533d550009ccdb6199c3b09f3c8d2f9d05577853dd968ead42efb7c403cc20cafd55aad40a395a1fa009782453138126da6c32e7095d37bce751852fb941328434661e6795dc7c3ed1d1b175d69b03412eb110078ef23f3a0ab38c6ce7561371734db9b34b6f458e3eff010000000000009340178ba43d344626fc8e2f1919e1b9b1a00c9c736d10f8855037fc9a23af86baf4c55367ee94440bd06c6d4e628fa3ba60a3b0f9644a72214c7c31eb1618845c1ee9f0964980229602883268f7edbddfd33a227bad235d4770ed63629e9c00393e3b6dad7338f83b182223e66ec9719a3ee7676254cf85f1adb9b233b2d9836c454d36972e9ff763fcd99856e4dbc0b772ba4109cba9a5a54c6eedeacdb8b3000000e4a3dce444b81a0ddd0e12cfd5fbb4005cbd10587ef8bc50d25087f11a8173c6a9683a83ea57639d3dcaf9f12bfc37c2781930b51494981218c8e13d9561cd798816f293ea966ea6460bbf4621a33e856e30f8039d2faf1357db5347077310298340412bf2735d741239e067207d0f5b6026ddf3478742a5de83b39a00c522446531e48326905698b8b7184f5bf93493644804794e67a84ac4196c7efd931405007eaef605e8718abd318f258f0d1232b6ed3b66ff6ef721142c29657108c5189d853a593009193bbfbb86dfbb27bfafcf122e4fa57697bc42dd403ba622d40000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:14 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) [ 197.403253][ T7802] md: loop134 has zero or unknown size, marking faulty! [ 197.425910][ T7802] md: md_import_device returned -22 [ 197.432328][ T7809] md: loop134 has zero or unknown size, marking faulty! [ 197.443052][ T7809] md: md_import_device returned -22 08:20:15 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="000227d1b58f00000008000500090000000c000100080001000a0000001400032008000000080003000200c9db56b1c0f21115c1600b8f6c73da062c7c187ca9cb891d7557392775beb2fbd3286772448fbe6d93a361dc3d47e51550ec999800900080f8000000000000000000008a423f15181b01867a286f0191941a06f57dbfd82d35bc95ffd08b0114d80d57247a258a18eb1f48eb6f415f7748b09422c937c9fe5b7f7f3bd18726648d4f7cafb6184ddf21b13b8c000000003c47651295de081f337ba28bd80700c2e700000000000038000000000000000611753341e06ccfcff475109091696574deec6aa4a18a8327526670569b7101efcb1d8d9d2593121a1819bdce7d0108430ce2f424a13c7a85c64df634533d550009ccdb6199c3b09f3c8d2f9d05577853dd968ead42efb7c403cc20cafd55aad40a395a1fa009782453138126da6c32e7095d37bce751852fb941328434661e6795dc7c3ed1d1b175d69b03412eb110078ef23f3a0ab38c6ce7561371734db9b34b6f458e3eff010000000000009340178ba43d344626fc8e2f1919e1b9b1a00c9c736d10f8855037fc9a23af86baf4c55367ee94440bd06c6d4e628fa3ba60a3b0f9644a72214c7c31eb1618845c1ee9f0964980229602883268f7edbddfd33a227bad235d4770ed63629e9c00393e3b6dad7338f83b182223e66ec9719a3ee7676254cf85f1adb9b233b2d9836c454d36972e9ff763fcd99856e4dbc0b772ba4109cba9a5a54c6eedeacdb8b3000000e4a3dce444b81a0ddd0e12cfd5fbb4005cbd10587ef8bc50d25087f11a8173c6a9683a83ea57639d3dcaf9f12bfc37c2781930b51494981218c8e13d9561cd798816f293ea966ea6460bbf4621a33e856e30f8039d2faf1357db5347077310298340412bf2735d741239e067207d0f5b6026ddf3478742a5de83b39a00c522446531e48326905698b8b7184f5bf93493644804794e67a84ac4196c7efd931405007eaef605e8718abd318f258f0d1232b6ed3b66ff6ef721142c29657108c5189d853a593009193bbfbb86dfbb27bfafcf122e4fa57697bc42dd403ba622d40000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:15 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) [ 197.645426][ T7824] md: loop134 has zero or unknown size, marking faulty! 08:20:15 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) [ 197.741251][ T7824] md: md_import_device returned -22 [ 197.809998][ T7827] md: loop134 has zero or unknown size, marking faulty! [ 197.842475][ T7827] md: md_import_device returned -22 08:20:15 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="000227d1b58f00000008000500090000000c000100080001000a0000001400032008000000080003000200c9db56b1c0f21115c1600b8f6c73da062c7c187ca9cb891d7557392775beb2fbd3286772448fbe6d93a361dc3d47e51550ec999800900080f8000000000000000000008a423f15181b01867a286f0191941a06f57dbfd82d35bc95ffd08b0114d80d57247a258a18eb1f48eb6f415f7748b09422c937c9fe5b7f7f3bd18726648d4f7cafb6184ddf21b13b8c000000003c47651295de081f337ba28bd80700c2e700000000000038000000000000000611753341e06ccfcff475109091696574deec6aa4a18a8327526670569b7101efcb1d8d9d2593121a1819bdce7d0108430ce2f424a13c7a85c64df634533d550009ccdb6199c3b09f3c8d2f9d05577853dd968ead42efb7c403cc20cafd55aad40a395a1fa009782453138126da6c32e7095d37bce751852fb941328434661e6795dc7c3ed1d1b175d69b03412eb110078ef23f3a0ab38c6ce7561371734db9b34b6f458e3eff010000000000009340178ba43d344626fc8e2f1919e1b9b1a00c9c736d10f8855037fc9a23af86baf4c55367ee94440bd06c6d4e628fa3ba60a3b0f9644a72214c7c31eb1618845c1ee9f0964980229602883268f7edbddfd33a227bad235d4770ed63629e9c00393e3b6dad7338f83b182223e66ec9719a3ee7676254cf85f1adb9b233b2d9836c454d36972e9ff763fcd99856e4dbc0b772ba4109cba9a5a54c6eedeacdb8b3000000e4a3dce444b81a0ddd0e12cfd5fbb4005cbd10587ef8bc50d25087f11a8173c6a9683a83ea57639d3dcaf9f12bfc37c2781930b51494981218c8e13d9561cd798816f293ea966ea6460bbf4621a33e856e30f8039d2faf1357db5347077310298340412bf2735d741239e067207d0f5b6026ddf3478742a5de83b39a00c522446531e48326905698b8b7184f5bf93493644804794e67a84ac4196c7efd931405007eaef605e8718abd318f258f0d1232b6ed3b66ff6ef721142c29657108c5189d853a593009193bbfbb86dfbb27bfafcf122e4fa57697bc42dd403ba622d40000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) [ 197.870602][ T7822] md: loop134 has zero or unknown size, marking faulty! 08:20:15 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) [ 197.926506][ T7822] md: md_import_device returned -22 08:20:15 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:15 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) 08:20:15 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) [ 198.117300][ T7835] md: loop134 has zero or unknown size, marking faulty! [ 198.164568][ T7835] md: md_import_device returned -22 [ 198.207583][ T7840] md: loop134 has zero or unknown size, marking faulty! [ 198.221800][ T7840] md: md_import_device returned -22 [ 198.324638][ T7849] md: loop134 has zero or unknown size, marking faulty! [ 198.336933][ T7849] md: md_import_device returned -22 08:20:15 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:15 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="000227d1b58f00000008000500090000000c000100080001000a0000001400032008000000080003000200c9db56b1c0f21115c1600b8f6c73da062c7c187ca9cb891d7557392775beb2fbd3286772448fbe6d93a361dc3d47e51550ec999800900080f8000000000000000000008a423f15181b01867a286f0191941a06f57dbfd82d35bc95ffd08b0114d80d57247a258a18eb1f48eb6f415f7748b09422c937c9fe5b7f7f3bd18726648d4f7cafb6184ddf21b13b8c000000003c47651295de081f337ba28bd80700c2e700000000000038000000000000000611753341e06ccfcff475109091696574deec6aa4a18a8327526670569b7101efcb1d8d9d2593121a1819bdce7d0108430ce2f424a13c7a85c64df634533d550009ccdb6199c3b09f3c8d2f9d05577853dd968ead42efb7c403cc20cafd55aad40a395a1fa009782453138126da6c32e7095d37bce751852fb941328434661e6795dc7c3ed1d1b175d69b03412eb110078ef23f3a0ab38c6ce7561371734db9b34b6f458e3eff010000000000009340178ba43d344626fc8e2f1919e1b9b1a00c9c736d10f8855037fc9a23af86baf4c55367ee94440bd06c6d4e628fa3ba60a3b0f9644a72214c7c31eb1618845c1ee9f0964980229602883268f7edbddfd33a227bad235d4770ed63629e9c00393e3b6dad7338f83b182223e66ec9719a3ee7676254cf85f1adb9b233b2d9836c454d36972e9ff763fcd99856e4dbc0b772ba4109cba9a5a54c6eedeacdb8b3000000e4a3dce444b81a0ddd0e12cfd5fbb4005cbd10587ef8bc50d25087f11a8173c6a9683a83ea57639d3dcaf9f12bfc37c2781930b51494981218c8e13d9561cd798816f293ea966ea6460bbf4621a33e856e30f8039d2faf1357db5347077310298340412bf2735d741239e067207d0f5b6026ddf3478742a5de83b39a00c522446531e48326905698b8b7184f5bf93493644804794e67a84ac4196c7efd931405007eaef605e8718abd318f258f0d1232b6ed3b66ff6ef721142c29657108c5189d853a593009193bbfbb86dfbb27bfafcf122e4fa57697bc42dd403ba622d40000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:15 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:15 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0x7ff, 0x400880) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000a80)={0x0, 0x80000000, 0x9, [], &(0x7f0000000a40)}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$media(&(0x7f0000000600)='/dev/media#\x00', 0xe3bb, 0x42002) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000940)) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x20000000) getgid() bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local={0xfe, 0x80, [0x0, 0x0, 0x300]}, {[], @udp={0x4e23, 0x4e20, 0x8}}}}}}, 0x0) 08:20:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x7fffffffff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0x13f698e4b9e296e3, 0x0, 0x0, 0xffffffffffffff06) [ 198.503068][ T7854] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 198.514637][ T7863] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:20:16 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 198.614421][ T7869] md: loop134 has zero or unknown size, marking faulty! [ 198.633972][ T7869] md: md_import_device returned -22 08:20:16 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0x7ff, 0x400880) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000a80)={0x0, 0x80000000, 0x9, [], &(0x7f0000000a40)}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$media(&(0x7f0000000600)='/dev/media#\x00', 0xe3bb, 0x42002) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000940)) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x20000000) getgid() bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local={0xfe, 0x80, [0x0, 0x0, 0x300]}, {[], @udp={0x4e23, 0x4e20, 0x8}}}}}}, 0x0) [ 198.655420][ T7870] md: loop134 has zero or unknown size, marking faulty! [ 198.672543][ T7870] md: md_import_device returned -22 [ 198.683162][ T7860] md: loop134 has zero or unknown size, marking faulty! 08:20:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122002800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) lstat(&(0x7f0000001f80)='./bus\x00', &(0x7f0000001fc0)) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000400), 0x0) write$FUSE_STATFS(r1, &(0x7f00000004c0)={0x60, 0x0, 0x5, {{0x1, 0xff, 0x6, 0x1, 0xfffffffffffffffd, 0xf7, 0x57e, 0xbe9}}}, 0x60) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 198.703876][ T7860] md: md_import_device returned -22 [ 198.718057][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 198.724015][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 198.724096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 198.735542][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:20:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc0000}) 08:20:16 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:16 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="000227d1b58f00000008000500090000000c000100080001000a0000001400032008000000080003000200c9db56b1c0f21115c1600b8f6c73da062c7c187ca9cb891d7557392775beb2fbd3286772448fbe6d93a361dc3d47e51550ec999800900080f8000000000000000000008a423f15181b01867a286f0191941a06f57dbfd82d35bc95ffd08b0114d80d57247a258a18eb1f48eb6f415f7748b09422c937c9fe5b7f7f3bd18726648d4f7cafb6184ddf21b13b8c000000003c47651295de081f337ba28bd80700c2e700000000000038000000000000000611753341e06ccfcff475109091696574deec6aa4a18a8327526670569b7101efcb1d8d9d2593121a1819bdce7d0108430ce2f424a13c7a85c64df634533d550009ccdb6199c3b09f3c8d2f9d05577853dd968ead42efb7c403cc20cafd55aad40a395a1fa009782453138126da6c32e7095d37bce751852fb941328434661e6795dc7c3ed1d1b175d69b03412eb110078ef23f3a0ab38c6ce7561371734db9b34b6f458e3eff010000000000009340178ba43d344626fc8e2f1919e1b9b1a00c9c736d10f8855037fc9a23af86baf4c55367ee94440bd06c6d4e628fa3ba60a3b0f9644a72214c7c31eb1618845c1ee9f0964980229602883268f7edbddfd33a227bad235d4770ed63629e9c00393e3b6dad7338f83b182223e66ec9719a3ee7676254cf85f1adb9b233b2d9836c454d36972e9ff763fcd99856e4dbc0b772ba4109cba9a5a54c6eedeacdb8b3000000e4a3dce444b81a0ddd0e12cfd5fbb4005cbd10587ef8bc50d25087f11a8173c6a9683a83ea57639d3dcaf9f12bfc37c2781930b51494981218c8e13d9561cd798816f293ea966ea6460bbf4621a33e856e30f8039d2faf1357db5347077310298340412bf2735d741239e067207d0f5b6026ddf3478742a5de83b39a00c522446531e48326905698b8b7184f5bf93493644804794e67a84ac4196c7efd931405007eaef605e8718abd318f258f0d1232b6ed3b66ff6ef721142c29657108c5189d853a593009193bbfbb86dfbb27bfafcf122e4fa57697bc42dd403ba622d40000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) 08:20:16 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0x7ff, 0x400880) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000a80)={0x0, 0x80000000, 0x9, [], &(0x7f0000000a40)}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$media(&(0x7f0000000600)='/dev/media#\x00', 0xe3bb, 0x42002) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000940)) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x20000000) getgid() bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local={0xfe, 0x80, [0x0, 0x0, 0x300]}, {[], @udp={0x4e23, 0x4e20, 0x8}}}}}}, 0x0) 08:20:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x11, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x67}}, &(0x7f0000000080)='M[Z\xf2\xa4\nf07\xc3Ju-\x01\xc2W>\x86E\x10*\xe7{\x15\xba)%\xdc@\x8f*\xe1=\x85-\xf6\xd3\xf2a|\xa6\x1f\x97\xbe70BL\x7f=\xc08\xc2\xb4\x85\xfc?8\xec\x93\a[M-\xcc\b\xad\xceP9\x8a\xc40\x83\xd5\b\x1d\xc7o\xbb\xec\x87\xdf\xd4\x9c\xa7s\xbf\xfd\xdc\xc9\xffI\x82r\x90\x05\xb5\a\xec`VY\x94}\xbfMF\x84\xb9ZmFW\xe39+s\xa16\xff\xb5 \xa4d\x1bm=\x1c\xa1`\"\xaf\xe4\x9b\xd8\xcb\xb3\x82D\xc2\xa4>\x87\xbd\xfe\x1b\x1b\xae\xe7\xe4\x7f\xd0/LS\xdf\xd4\xc7\x91S\xb7\x1f\f\xbe\xde4F+\x85\xb4\x97', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 08:20:16 executing program 4: r0 = syz_open_dev$vcsn(0x0, 0x7ff, 0x400880) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000a80)={0x0, 0x80000000, 0x9, [], &(0x7f0000000a40)}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$media(&(0x7f0000000600)='/dev/media#\x00', 0xe3bb, 0x42002) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000940)) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x20000000) getgid() bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local={0xfe, 0x80, [0x0, 0x0, 0x300]}, {[], @udp={0x4e23, 0x4e20, 0x8}}}}}}, 0x0) [ 199.025902][ T7889] md: loop134 has zero or unknown size, marking faulty! [ 199.033976][ T7889] md: md_import_device returned -22 [ 199.052103][ T7888] md: loop134 has zero or unknown size, marking faulty! [ 199.063762][ T7888] md: md_import_device returned -22 08:20:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0xfdffffff00000000, 0xb00000000000006], [], {@ipv4={0x800, {{0x5, 0x4, 0x3201, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 08:20:16 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x264, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000400)=""/19) r3 = socket$inet(0x2, 0x4, 0xfffffffffffffef2) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r5, &(0x7f0000000340)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1a00001}, 0xc, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x10000001, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x4001, 0x0) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000080)={0x4, 0x7, 0x86, &(0x7f0000000280)="d0e423b71a6225486a6af46106eb41da351f6d99d047b8e4b7b635a435c553cbfdf8ac0fcab53e48de15699253eba21f3ccc0076948c01849ff8f2e5e93741cdd7b5a43260f1767efb914415a6f612e590c251d48701fedc872ad4b2661354a2daeec836cb7bd5dfbd2ff61dbcae38ef67d115c316206f5e15e3b9bfb1926b164b10a43a1c4a"}) [ 199.278031][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 199.333277][ T7906] md: loop134 has zero or unknown size, marking faulty! [ 199.341329][ T7906] md: md_import_device returned -22 08:20:16 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003800)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@hci={0x1f, r1}, 0x67) sendmsg$can_bcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "9b5117f117e9a7f4"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x1, 0x0, 0x0, {}, {}, {0x0, 0x0, 0x7d3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3866cd5576c01aba"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1, 0x800, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "55ae887930467fae3d43ffa5fa7209934fe0d3e57421f67ed8602d6d741fbc0e84946297e8f536a96450b1533ad7cc6f90959c54483f6d309fc122aeeeef15fc"}}, 0x80}}, 0x0) 08:20:16 executing program 0: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) io_setup(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000636000)=0x2, 0x4) 08:20:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x120) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") dup2(r0, r1) [ 199.478749][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.486269][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.507459][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.521958][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.535083][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.543262][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.559617][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.573823][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.587060][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.594606][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.602811][ T2997] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.617067][ T2997] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 08:20:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122002800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) lstat(&(0x7f0000001f80)='./bus\x00', &(0x7f0000001fc0)) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000400), 0x0) write$FUSE_STATFS(r1, &(0x7f00000004c0)={0x60, 0x0, 0x5, {{0x1, 0xff, 0x6, 0x1, 0xfffffffffffffffd, 0xf7, 0x57e, 0xbe9}}}, 0x60) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 08:20:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0xfdffffff00000000, 0xb00000000000006], [], {@ipv4={0x800, {{0x5, 0x4, 0x3201, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 08:20:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffffffffffffffa5, 0x6000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) bind$isdn(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x8e30, 0x0, 0x0, 0x101aa) 08:20:17 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_PARM(r0, 0xc0285629, &(0x7f0000000400)={0x0, @output}) 08:20:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1d, 0x74f44c59, 0x0, 0x0, {0x5}}, 0x14}, 0x1, 0x300}, 0x0) 08:20:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv6_getroute={0x24, 0x1a, 0x401, 0x0, 0x0, {0x2}, [@RTA_MARK={0x8, 0x1b, 0x3a}]}, 0x24}}, 0x0) 08:20:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) [ 199.701506][ T7937] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 08:20:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0xfdffffff00000000, 0xb00000000000006], [], {@ipv4={0x800, {{0x5, 0x4, 0x3201, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 08:20:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f000000cfe4), 0x1c) 08:20:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000c40)={0x14, 0x3, 0x2, 0x1}, 0x14}}, 0x0) 08:20:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x8, 0x200209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x2c) 08:20:17 executing program 0: syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550c, 0x0) 08:20:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122002800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) lstat(&(0x7f0000001f80)='./bus\x00', &(0x7f0000001fc0)) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000400), 0x0) write$FUSE_STATFS(r1, &(0x7f00000004c0)={0x60, 0x0, 0x5, {{0x1, 0xff, 0x6, 0x1, 0xfffffffffffffffd, 0xf7, 0x57e, 0xbe9}}}, 0x60) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 08:20:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) 08:20:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0xfdffffff00000000, 0xb00000000000006], [], {@ipv4={0x800, {{0x5, 0x4, 0x3201, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 08:20:18 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 08:20:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffffffffffffffa5, 0x6000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) bind$isdn(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x8e30, 0x0, 0x0, 0x101aa) 08:20:18 executing program 0: syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550c, 0x0) 08:20:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) 08:20:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x18) listen(r1, 0x3) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r2, 0x29, 0x21, &(0x7f0000000040)=0xffffffffffffffff, 0x4) connect$inet6(r2, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) 08:20:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffffffffffffffa5, 0x6000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) bind$isdn(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x8e30, 0x0, 0x0, 0x101aa) 08:20:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) 08:20:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 08:20:18 executing program 2: unshare(0x8020000) semget$private(0x0, 0x4007, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x2000000, 0x11, &(0x7f00000001c0)=[0x0]) 08:20:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122002800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) lstat(&(0x7f0000001f80)='./bus\x00', &(0x7f0000001fc0)) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000400), 0x0) write$FUSE_STATFS(r1, &(0x7f00000004c0)={0x60, 0x0, 0x5, {{0x1, 0xff, 0x6, 0x1, 0xfffffffffffffffd, 0xf7, 0x57e, 0xbe9}}}, 0x60) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 08:20:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, 0x2c, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202f6465762f696e7075742f6d696365000a981327eef006413269e4df594a17fc26c3c0496d7f805b0befe6bd5ee3974e0cf05e9cc039f4793155e3e7796467f5a6105685e614e2615a1f9a0c56bbd80f17e414809173061d971233fb59544db4a4a13fd7f3c06d556fc1b7cf3ccc74cf718839d994945c7b76cd996f2fbb3c50b2acc65e3267bc16ce7390aedc4db945156f40b340e447671a06af13a717234fdcd3dc40dcaf731946c22c486b58d43dd72ead941a921ab14a1f7cbc66ccd38d6a8a04e1f3727dfad7c4cf77e4f665d18d56d25a03790d6019bbb374ea465342adc12926181e230d4821d34212e021cf74ec1a1b71ff8cf2"], 0x103) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="0700006f89", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000740)={{0xa, 0x4e22, 0x0, @loopback, 0xffffffffffffffff}, {0xa, 0x0, 0x0, @mcast1, 0x3}, 0xffffffff, [0x0, 0x0, 0x0, 0x100, 0x9, 0x0, 0x9c, 0x6]}, 0x5c) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r3 = eventfd2(0x80401, 0x80000) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f00000006c0)) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000980), 0xfffffffffffffc20) unlink(0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x28e, 0xfa00, {{0xa, 0x4e21, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x6}, {0xa, 0x4e23, 0x0, @remote, 0x81}}}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x80, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x11) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000600)=""/185) 08:20:18 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x28, 0xff, 0x51}, 0x2c) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000380)) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0xf3, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 08:20:18 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000002000/0x3000)=nil) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x06', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:20:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffffffffffffffa5, 0x6000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) bind$isdn(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x8e30, 0x0, 0x0, 0x101aa) 08:20:18 executing program 0: syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550c, 0x0) [ 201.499269][ T26] audit: type=1800 audit(1553070018.953:35): pid=8031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=3 res=0 [ 201.602659][ T8026] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 201.678492][ C1] net_ratelimit: 1 callbacks suppressed [ 201.678518][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 201.682238][ T26] audit: type=1804 audit(1553070018.993:36): pid=8031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir748000010/syzkaller.HNys39/11/file0/file0" dev="loop2" ino=3 res=1 [ 201.690139][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 201.794975][ T26] audit: type=1804 audit(1553070019.263:37): pid=8031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir748000010/syzkaller.HNys39/11/file0/file0" dev="loop2" ino=3 res=1 [ 201.823471][ T26] audit: type=1804 audit(1553070019.263:38): pid=8042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir748000010/syzkaller.HNys39/11/file0/file0" dev="loop2" ino=3 res=1 08:20:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(0x0, &(0x7f0000000300)='./file1\x00') r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8000000000, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000003c0)) fcntl$notify(r0, 0x402, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) dup(0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 08:20:19 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x28, 0xff, 0x51}, 0x2c) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000380)) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0xf3, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 08:20:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, 0x2c, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x103) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="0700006f89", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000740)={{0xa, 0x4e22, 0x0, @loopback, 0xffffffffffffffff}, {0xa, 0x0, 0x0, @mcast1, 0x3}, 0xffffffff, [0x0, 0x0, 0x0, 0x100, 0x9, 0x0, 0x9c, 0x6]}, 0x5c) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r3 = eventfd2(0x80401, 0x80000) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f00000006c0)) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000980), 0xfffffffffffffc20) unlink(0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x28e, 0xfa00, {{0xa, 0x4e21, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x6}, {0xa, 0x4e23, 0x0, @remote, 0x81}}}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x80, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x11) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000600)=""/185) 08:20:19 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x28, 0xff, 0x51}, 0x2c) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000380)) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0xf3, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) [ 202.125644][ T8050] loop4: p1 p2 p3 p4 < > [ 202.169734][ T8050] loop4: partition table partially beyond EOD, truncated [ 202.191424][ T8050] loop4: p1 start 1 is beyond EOD, truncated [ 202.197608][ T8050] loop4: p2 start 101 is beyond EOD, truncated [ 202.228615][ T26] audit: type=1800 audit(1553070019.693:39): pid=8065 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16581 res=0 [ 202.258652][ T8050] loop4: p3 start 201 is beyond EOD, truncated [ 202.286062][ T8050] loop4: p4 start 301 is beyond EOD, truncated 08:20:19 executing program 0: syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550c, 0x0) 08:20:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, 0x2c, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x103) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="0700006f89", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000740)={{0xa, 0x4e22, 0x0, @loopback, 0xffffffffffffffff}, {0xa, 0x0, 0x0, @mcast1, 0x3}, 0xffffffff, [0x0, 0x0, 0x0, 0x100, 0x9, 0x0, 0x9c, 0x6]}, 0x5c) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r3 = eventfd2(0x80401, 0x80000) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f00000006c0)) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000980), 0xfffffffffffffc20) unlink(0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x28e, 0xfa00, {{0xa, 0x4e21, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x6}, {0xa, 0x4e23, 0x0, @remote, 0x81}}}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x80, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x11) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000600)=""/185) [ 202.391037][ T26] audit: type=1800 audit(1553070019.733:40): pid=8066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16582 res=0 [ 202.417040][ T26] audit: type=1804 audit(1553070019.733:41): pid=8060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir748000010/syzkaller.HNys39/12/file0/file0" dev="sda1" ino=16581 res=1 08:20:20 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x28, 0xff, 0x51}, 0x2c) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000380)) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0xf3, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) [ 202.484298][ T26] audit: type=1804 audit(1553070019.743:42): pid=8066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir971793501/syzkaller.8FCOQS/17/file0/file0" dev="sda1" ino=16582 res=1 08:20:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(0x0, &(0x7f0000000300)='./file1\x00') r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8000000000, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000003c0)) fcntl$notify(r0, 0x402, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) dup(0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 08:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x20, 0x1c, 0x1, 0x0, 0x0, {0x1}, [@typed={0xc, 0x1, @u64=0x1000000}]}, 0x20}}, 0x0) [ 202.741273][ T8088] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 08:20:20 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x28, 0xff, 0x51}, 0x2c) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000380)) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0xf3, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 08:20:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x6, 0xf638}]}, 0xc, 0x1) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000140)={0x16, 0x91, &(0x7f0000000080)="be45759ef13b220551999ca95875816a9a135a74ba64a9094e2fcc2363db69b6d6761de244df9f9149c89400b02d4d510e9ef7d14c4db804c0444b13cc0e8d95ebe8a17da1ecca71345227a79809003e49e760f42e21109c8d5c6e4d45071225ece8e43b3f61f9720399bb53b67bee415862b99af2c16bf99059093aa5a9d0f164323edda66cba0325188d43deaeed99a4"}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 08:20:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, 0x2c, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x103) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="0700006f89", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000740)={{0xa, 0x4e22, 0x0, @loopback, 0xffffffffffffffff}, {0xa, 0x0, 0x0, @mcast1, 0x3}, 0xffffffff, [0x0, 0x0, 0x0, 0x100, 0x9, 0x0, 0x9c, 0x6]}, 0x5c) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r3 = eventfd2(0x80401, 0x80000) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f00000006c0)) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000980), 0xfffffffffffffc20) unlink(0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x28e, 0xfa00, {{0xa, 0x4e21, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x6}, {0xa, 0x4e23, 0x0, @remote, 0x81}}}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x80, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x11) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000600)=""/185) [ 202.917895][ T8091] loop4: p1 p2 p3 p4 < > [ 202.925316][ T8091] loop4: partition table partially beyond EOD, truncated [ 202.989559][ T8091] loop4: p1 start 1 is beyond EOD, truncated [ 203.012215][ T8091] loop4: p2 start 101 is beyond EOD, truncated [ 203.044002][ T8091] loop4: p3 start 201 is beyond EOD, truncated [ 203.075149][ T8091] loop4: p4 start 301 is beyond EOD, truncated 08:20:20 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x28, 0xff, 0x51}, 0x2c) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000380)) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0xf3, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 08:20:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid_for_children/') [ 203.303488][ T26] audit: type=1800 audit(1553070020.773:43): pid=8117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16583 res=0 08:20:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$alg(r0, 0x0, 0x0) 08:20:20 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) 08:20:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}, 0x0, 0xfff}}, 0xf8}}, 0x0) 08:20:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(0x0, &(0x7f0000000300)='./file1\x00') r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8000000000, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000003c0)) fcntl$notify(r0, 0x402, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) dup(0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 203.397917][ T26] audit: type=1804 audit(1553070020.773:44): pid=8117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir971793501/syzkaller.8FCOQS/18/file0/file0" dev="sda1" ino=16583 res=1 08:20:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x6, 0xf638}]}, 0xc, 0x1) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000140)={0x16, 0x91, &(0x7f0000000080)="be45759ef13b220551999ca95875816a9a135a74ba64a9094e2fcc2363db69b6d6761de244df9f9149c89400b02d4d510e9ef7d14c4db804c0444b13cc0e8d95ebe8a17da1ecca71345227a79809003e49e760f42e21109c8d5c6e4d45071225ece8e43b3f61f9720399bb53b67bee415862b99af2c16bf99059093aa5a9d0f164323edda66cba0325188d43deaeed99a4"}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 08:20:21 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x756, 0x80102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) stat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x0, 0x1}, 0x8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) [ 203.494837][ T8128] [ 203.497493][ T8128] ============================= [ 203.531168][ T8128] WARNING: suspicious RCU usage 08:20:21 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) [ 203.572776][ T8128] 5.1.0-rc1-next-20190320 #7 Not tainted [ 203.586875][ T8128] ----------------------------- [ 203.610367][ T8128] net/xfrm/xfrm_user.c:1080 suspicious rcu_dereference_check() usage! [ 203.631266][ T8128] [ 203.631266][ T8128] other info that might help us debug this: [ 203.631266][ T8128] [ 203.657062][ T8134] loop4: p1 p2 p3 p4 < > [ 203.711910][ T8134] loop4: partition table partially beyond EOD, truncated [ 203.718566][ T8128] [ 203.718566][ T8128] rcu_scheduler_active = 2, debug_locks = 1 [ 203.744008][ T8128] 1 lock held by syz-executor.0/8128: [ 203.751561][ T8128] #0: 00000000d10333a1 (&net->xfrm.xfrm_cfg_mutex){+.+.}, at: xfrm_netlink_rcv+0x61/0x90 08:20:21 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) [ 203.765458][ T8128] [ 203.765458][ T8128] stack backtrace: [ 203.774215][ T8128] CPU: 1 PID: 8128 Comm: syz-executor.0 Not tainted 5.1.0-rc1-next-20190320 #7 [ 203.774911][ T8134] loop4: p1 start 1 is beyond EOD, truncated [ 203.783156][ T8128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.783161][ T8128] Call Trace: [ 203.783182][ T8128] dump_stack+0x172/0x1f0 [ 203.783204][ T8128] lockdep_rcu_suspicious+0x153/0x15d [ 203.783221][ T8128] xfrm_alloc_userspi+0x7d5/0xa80 [ 203.783241][ T8128] ? xfrm_state_netlink+0x140/0x140 [ 203.783260][ T8128] ? nla_parse+0x45/0x60 [ 203.783276][ T8128] ? xfrm_state_netlink+0x140/0x140 [ 203.783291][ T8128] xfrm_user_rcv_msg+0x458/0x770 [ 203.783308][ T8128] ? xfrm_dump_sa_done+0xf0/0xf0 [ 203.783328][ T8128] ? mark_held_locks+0xf0/0xf0 [ 203.783340][ T8128] ? lockdep_hardirqs_on+0x418/0x5d0 [ 203.783377][ T8128] ? __mutex_lock+0x3cd/0x1310 [ 203.783395][ T8128] ? xfrm_netlink_rcv+0x61/0x90 [ 203.846345][ T8134] loop4: p2 start 101 is beyond EOD, truncated [ 203.846551][ T8128] netlink_rcv_skb+0x17a/0x460 [ 203.846574][ T8128] ? xfrm_dump_sa_done+0xf0/0xf0 [ 203.857585][ T8134] loop4: p3 start 201 is beyond EOD, truncated [ 203.861417][ T8128] ? netlink_ack+0xb50/0xb50 [ 203.861448][ T8128] xfrm_netlink_rcv+0x70/0x90 [ 203.861473][ T8128] netlink_unicast+0x536/0x720 [ 203.861493][ T8128] ? netlink_attachskb+0x770/0x770 [ 203.861508][ T8128] ? _copy_from_iter_full+0x259/0x8f0 [ 203.861523][ T8128] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 203.861538][ T8128] ? __check_object_size+0x3d/0x42f [ 203.861559][ T8128] netlink_sendmsg+0x8ae/0xd70 [ 203.861580][ T8128] ? netlink_unicast+0x720/0x720 [ 203.861595][ T8128] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 203.861612][ T8128] ? apparmor_socket_sendmsg+0x2a/0x30 [ 203.872819][ T8134] loop4: p4 start 301 is beyond EOD, truncated [ 203.877406][ T8128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.877422][ T8128] ? security_socket_sendmsg+0x93/0xc0 [ 203.877436][ T8128] ? netlink_unicast+0x720/0x720 [ 203.877453][ T8128] sock_sendmsg+0xdd/0x130 [ 203.877478][ T8128] ___sys_sendmsg+0x806/0x930 [ 203.877495][ T8128] ? copy_msghdr_from_user+0x430/0x430 [ 203.877520][ T8128] ? kasan_check_read+0x11/0x20 [ 203.982476][ T8128] ? __fget+0x381/0x550 [ 203.986618][ T8128] ? ksys_dup3+0x3e0/0x3e0 [ 203.991033][ T8128] ? lock_downgrade+0x880/0x880 [ 203.995875][ T8128] ? __fget_light+0x1a9/0x230 [ 204.000530][ T8128] ? __fdget+0x1b/0x20 [ 204.004582][ T8128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.010830][ T8128] __sys_sendmsg+0x105/0x1d0 [ 204.015408][ T8128] ? __ia32_sys_shutdown+0x80/0x80 [ 204.020509][ T8128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.025945][ T8128] ? do_syscall_64+0x26/0x610 [ 204.030619][ T8128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.036688][ T8128] ? do_syscall_64+0x26/0x610 [ 204.041372][ T8128] __x64_sys_sendmsg+0x78/0xb0 [ 204.046129][ T8128] do_syscall_64+0x103/0x610 [ 204.050734][ T8128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.056630][ T8128] RIP: 0033:0x458079 [ 204.060525][ T8128] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.080118][ T8128] RSP: 002b:00007f7a20b0bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 204.088510][ T8128] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 204.096469][ T8128] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 204.104420][ T8128] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 08:20:21 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0xffc, 0x400000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(0x0, 0x0, 0x108) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000700)={r2, 0x0, 0xfffffffff0001000, 0xfffffffffffff000}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x32, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 'none\x00', 0x28, 0xff, 0x51}, 0x2c) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x100, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000380)) sendfile(r4, r5, 0x0, 0xc7000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0xf3, 0x401}, {0x1, 0xffffffffffffff81, 0x4, 0xffffffffffff7fff}]}, 0x10) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) [ 204.112394][ T8128] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a20b0c6d4 [ 204.120430][ T8128] R13: 00000000004c56c3 R14: 00000000004d95f0 R15: 00000000ffffffff 08:20:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}, 0x0, 0xfff}}, 0xf8}}, 0x0) 08:20:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x6, 0xf638}]}, 0xc, 0x1) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000140)={0x16, 0x91, &(0x7f0000000080)="be45759ef13b220551999ca95875816a9a135a74ba64a9094e2fcc2363db69b6d6761de244df9f9149c89400b02d4d510e9ef7d14c4db804c0444b13cc0e8d95ebe8a17da1ecca71345227a79809003e49e760f42e21109c8d5c6e4d45071225ece8e43b3f61f9720399bb53b67bee415862b99af2c16bf99059093aa5a9d0f164323edda66cba0325188d43deaeed99a4"}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 08:20:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(0x0, &(0x7f0000000300)='./file1\x00') r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8000000000, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000003c0)) fcntl$notify(r0, 0x402, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) dup(0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 08:20:21 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) 08:20:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}, 0x0, 0xfff}}, 0xf8}}, 0x0) 08:20:21 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x756, 0x80102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) stat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x0, 0x1}, 0x8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) [ 204.440963][ T8161] loop4: p1 p2 p3 p4 < > 08:20:21 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x756, 0x80102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) stat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x0, 0x1}, 0x8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 08:20:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}, 0x0, 0xfff}}, 0xf8}}, 0x0) [ 204.484755][ T8161] loop4: partition table partially beyond EOD, truncated [ 204.512648][ T8161] loop4: p1 start 1 is beyond EOD, truncated [ 204.611713][ T8161] loop4: p2 start 101 is beyond EOD, truncated [ 204.658112][ T8161] loop4: p3 start 201 is beyond EOD, truncated [ 204.669115][ T8161] loop4: p4 start 301 is beyond EOD, truncated 08:20:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev, 0x3f}, 0x1c) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast2, 0x9}, 0x1c) 08:20:22 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x756, 0x80102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) stat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x0, 0x1}, 0x8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 08:20:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x6, 0xf638}]}, 0xc, 0x1) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000140)={0x16, 0x91, &(0x7f0000000080)="be45759ef13b220551999ca95875816a9a135a74ba64a9094e2fcc2363db69b6d6761de244df9f9149c89400b02d4d510e9ef7d14c4db804c0444b13cc0e8d95ebe8a17da1ecca71345227a79809003e49e760f42e21109c8d5c6e4d45071225ece8e43b3f61f9720399bb53b67bee415862b99af2c16bf99059093aa5a9d0f164323edda66cba0325188d43deaeed99a4"}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 08:20:22 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x756, 0x80102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) stat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x0, 0x1}, 0x8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 08:20:22 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f0000000280)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x7ff}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3b6f3b0a5e32a8be"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x2, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {0x0, 0xffffff7f}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) 08:20:22 executing program 0: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0xffffffffffffffff) 08:20:22 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x756, 0x80102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) stat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x0, 0x1}, 0x8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) [ 205.200409][ T8204] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 08:20:22 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f0000000280)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x7ff}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3b6f3b0a5e32a8be"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x2, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {0x0, 0xffffff7f}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) 08:20:22 executing program 0: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0xffffffffffffffff) 08:20:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 08:20:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000200)=0x1c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000680)="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", 0x34d) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000040030b8000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084db601e2cdcbfaaee68f41bc9da862c7698e8475d983a0cb447699f48aab4"], 0x1) getpid() ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x1, 0xfffffffffffffffc}) set_mempolicy(0x8003, &(0x7f00000001c0)=0x197, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x80) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000280)={0x0, 0x0, 0x6, [], 0x0}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 08:20:22 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f0000000280)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x7ff}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3b6f3b0a5e32a8be"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x2, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {0x0, 0xffffff7f}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) 08:20:22 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x756, 0x80102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) stat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, 0x0) close(r2) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x0, 0x1}, 0x8) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 08:20:22 executing program 0: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0xffffffffffffffff) 08:20:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="24000000580007241dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:20:23 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f0000000280)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x7ff}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3b6f3b0a5e32a8be"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x2, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {0x0, 0xffffff7f}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) 08:20:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000200)=0x1c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000680)="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", 0x34d) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000040030b8000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084db601e2cdcbfaaee68f41bc9da862c7698e8475d983a0cb447699f48aab4"], 0x1) getpid() ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x1, 0xfffffffffffffffc}) set_mempolicy(0x8003, &(0x7f00000001c0)=0x197, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x80) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000280)={0x0, 0x0, 0x6, [], 0x0}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 08:20:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 08:20:23 executing program 0: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0xffffffffffffffff) [ 205.628161][ T8238] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 08:20:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000002c0)={0x1, 0x2}, 0x8) shutdown(r0, 0x0) 08:20:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$RTC_WIE_OFF(r1, 0x7010) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x90}, 0x40840) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$addseals(r3, 0x409, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xa210, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, 0x0) fcntl$addseals(r4, 0x409, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xfc) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xf) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_PVERSION(r5, 0x80045500, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r6) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4e2c57701189620a8dd09f0e96890a43e325df8eb4b72acfef5c2fd4e4"], 0x1}, 0x1, 0x0, 0x0, 0x8080}, 0x0) 08:20:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 08:20:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:20:23 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x201) sendmsg$alg(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000840)}], 0x1, 0x0, 0x0, 0x4000001}, 0x4000000) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='system%keyringeth0{ppp1,eth1security\x00', 0x25) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000cc0)=0xe8) recvmsg$kcm(r0, &(0x7f0000000f80)={&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/39, 0x27}, {&(0x7f0000000dc0)=""/47, 0x2f}, {&(0x7f0000000e00)}], 0x3, &(0x7f0000000e80)=""/241, 0xf1}, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{&(0x7f0000000fc0)=@caif=@rfm, 0x80, &(0x7f0000001280)=[{&(0x7f0000001040)=""/186, 0xba}, {&(0x7f0000001100)=""/206, 0xce}, {&(0x7f0000001240)=""/33, 0x21}], 0x3, &(0x7f00000012c0)=""/127, 0x7f}, 0x8}, {{&(0x7f0000001340)=@hci, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/4096, 0x1000}, 0x1f}, {{&(0x7f0000002400)=@nfc_llcp, 0x80, &(0x7f0000002700)=[{&(0x7f0000002480)=""/206, 0xce}, {&(0x7f0000002580)=""/147, 0x93}, {&(0x7f0000002640)=""/182, 0xb6}], 0x3, &(0x7f0000002740)=""/219, 0xdb}, 0x1}, {{&(0x7f0000002840)=@ethernet={0x0, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000028c0)=""/119, 0x77}, {&(0x7f0000002940)=""/243, 0xf3}, {&(0x7f0000002a40)=""/249, 0xf9}, {&(0x7f0000002b40)=""/27, 0x1b}], 0x4, &(0x7f0000002bc0)=""/18, 0x12}, 0x4}, {{&(0x7f0000002c00)=@sco, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002c80)=""/119, 0x77}, {&(0x7f0000002d00)=""/148, 0x94}, {&(0x7f0000002dc0)=""/147, 0x93}, {&(0x7f0000002e80)=""/182, 0xb6}, {&(0x7f0000002f40)=""/146, 0x92}, {0x0}, {&(0x7f0000003180)=""/31, 0x1f}, {&(0x7f00000031c0)=""/252, 0xfc}], 0x8, &(0x7f0000003380)=""/234, 0xea}, 0xb2}], 0x5, 0x40000122, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000035c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000004d80)={@initdev, @multicast1}, &(0x7f0000004dc0)=0xc) accept4$packet(r0, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14, 0x1bd3c3156b7f86b0) accept4(0xffffffffffffffff, &(0x7f0000004ec0)=@xdp, &(0x7f0000004f40)=0x80, 0x0) getsockname(r0, &(0x7f0000004f80)=@xdp, &(0x7f0000005000)=0x80) getsockname$packet(r0, &(0x7f0000005040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005200)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000005300)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005480)={{{@in6=@initdev, @in6=@empty}}, {{}, 0x0, @in=@remote}}, &(0x7f0000005580)=0xe8) getpeername$packet(r0, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005600)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000005640)={@empty, @multicast1}, &(0x7f0000005680)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000007b40)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000007b80)=0x14) getpeername$packet(r0, &(0x7f0000007bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007c40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000007d40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000084c0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2010080}, 0xc, &(0x7f0000008480)={&(0x7f0000007d80)={0xdc, r2, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}, {0x8}}}]}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x48000}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) read(r5, &(0x7f0000009f9c)=""/100, 0x64) 08:20:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 08:20:23 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 206.074123][ T8267] kvm: pic: non byte read [ 206.098995][ T8267] kvm: pic: non byte write 08:20:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000200)=0x1c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000680)="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", 0x34d) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000040030b8000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084db601e2cdcbfaaee68f41bc9da862c7698e8475d983a0cb447699f48aab4"], 0x1) getpid() ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x1, 0xfffffffffffffffc}) set_mempolicy(0x8003, &(0x7f00000001c0)=0x197, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x80) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000280)={0x0, 0x0, 0x6, [], 0x0}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 206.127663][ T8267] kvm: pic: non byte read [ 206.135987][ T8267] kvm: pic: non byte write [ 206.143433][ T8267] kvm: pic: non byte read 08:20:23 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(r0, &(0x7f0000000100)=0x4, r1, 0x0, 0xffffffffffffff00, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 206.218304][ T8267] kvm: pic: non byte write 08:20:23 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x201) sendmsg$alg(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000840)}], 0x1, 0x0, 0x0, 0x4000001}, 0x4000000) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='system%keyringeth0{ppp1,eth1security\x00', 0x25) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000cc0)=0xe8) recvmsg$kcm(r0, &(0x7f0000000f80)={&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/39, 0x27}, {&(0x7f0000000dc0)=""/47, 0x2f}, {&(0x7f0000000e00)}], 0x3, &(0x7f0000000e80)=""/241, 0xf1}, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{&(0x7f0000000fc0)=@caif=@rfm, 0x80, &(0x7f0000001280)=[{&(0x7f0000001040)=""/186, 0xba}, {&(0x7f0000001100)=""/206, 0xce}, {&(0x7f0000001240)=""/33, 0x21}], 0x3, &(0x7f00000012c0)=""/127, 0x7f}, 0x8}, {{&(0x7f0000001340)=@hci, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/4096, 0x1000}, 0x1f}, {{&(0x7f0000002400)=@nfc_llcp, 0x80, &(0x7f0000002700)=[{&(0x7f0000002480)=""/206, 0xce}, {&(0x7f0000002580)=""/147, 0x93}, {&(0x7f0000002640)=""/182, 0xb6}], 0x3, &(0x7f0000002740)=""/219, 0xdb}, 0x1}, {{&(0x7f0000002840)=@ethernet={0x0, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000028c0)=""/119, 0x77}, {&(0x7f0000002940)=""/243, 0xf3}, {&(0x7f0000002a40)=""/249, 0xf9}, {&(0x7f0000002b40)=""/27, 0x1b}], 0x4, &(0x7f0000002bc0)=""/18, 0x12}, 0x4}, {{&(0x7f0000002c00)=@sco, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002c80)=""/119, 0x77}, {&(0x7f0000002d00)=""/148, 0x94}, {&(0x7f0000002dc0)=""/147, 0x93}, {&(0x7f0000002e80)=""/182, 0xb6}, {&(0x7f0000002f40)=""/146, 0x92}, {0x0}, {&(0x7f0000003180)=""/31, 0x1f}, {&(0x7f00000031c0)=""/252, 0xfc}], 0x8, &(0x7f0000003380)=""/234, 0xea}, 0xb2}], 0x5, 0x40000122, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000035c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000004d80)={@initdev, @multicast1}, &(0x7f0000004dc0)=0xc) accept4$packet(r0, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14, 0x1bd3c3156b7f86b0) accept4(0xffffffffffffffff, &(0x7f0000004ec0)=@xdp, &(0x7f0000004f40)=0x80, 0x0) getsockname(r0, &(0x7f0000004f80)=@xdp, &(0x7f0000005000)=0x80) getsockname$packet(r0, &(0x7f0000005040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005200)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000005300)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005480)={{{@in6=@initdev, @in6=@empty}}, {{}, 0x0, @in=@remote}}, &(0x7f0000005580)=0xe8) getpeername$packet(r0, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005600)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000005640)={@empty, @multicast1}, &(0x7f0000005680)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000007b40)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000007b80)=0x14) getpeername$packet(r0, &(0x7f0000007bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007c40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000007d40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000084c0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2010080}, 0xc, &(0x7f0000008480)={&(0x7f0000007d80)={0xdc, r2, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}, {0x8}}}]}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x48000}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) read(r5, &(0x7f0000009f9c)=""/100, 0x64) 08:20:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x30000, &(0x7f0000000100)={&(0x7f0000000000)={0x347, 0x34, 0x829, 0x0, 0x0, {0x2803, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0xfd5a}}, 0x0) [ 206.248473][ T8267] kvm: pic: non byte read [ 206.253376][ T8267] kvm: pic: non byte write [ 206.267271][ T8267] kvm: pic: non byte read [ 206.275880][ T8267] kvm: pic: non byte write [ 206.284224][ T8267] kvm: pic: non byte write 08:20:23 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(r0, &(0x7f0000000100)=0x4, r1, 0x0, 0xffffffffffffff00, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 206.307923][ T8288] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 206.319549][ T8288] netlink: 755 bytes leftover after parsing attributes in process `syz-executor.5'. [ 206.404603][ T8294] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 206.422103][ T8294] netlink: 755 bytes leftover after parsing attributes in process `syz-executor.5'. 08:20:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 08:20:24 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(r0, &(0x7f0000000100)=0x4, r1, 0x0, 0xffffffffffffff00, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 08:20:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000200)=0x1c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000680)="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", 0x34d) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000040030b8000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084db601e2cdcbfaaee68f41bc9da862c7698e8475d983a0cb447699f48aab4"], 0x1) getpid() ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x1, 0xfffffffffffffffc}) set_mempolicy(0x8003, &(0x7f00000001c0)=0x197, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x80) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000280)={0x0, 0x0, 0x6, [], 0x0}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 08:20:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) write$binfmt_aout(r1, &(0x7f00000004c0), 0x10) 08:20:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:20:24 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(r0, &(0x7f0000000100)=0x4, r1, 0x0, 0xffffffffffffff00, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 08:20:24 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") listen(r0, 0x4) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fe, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={0x0, 0xe}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x24, "2191cbd70abc9c1adeee8854beb5634dfe734c5acb0bd18054b5a47388d662e6cbb1526a"}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x6, 0xfffffffffffffffc, 0x20001, r3}, 0x10) r4 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) sendto(r1, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) bind(r0, &(0x7f0000000180)=@un=@file={0x1, './file0\x00'}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(r4) accept4(r0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) close(r4) [ 206.770586][ T8329] kvm: pic: non byte read [ 206.788407][ T8329] kvm: pic: non byte write [ 206.793227][ T8329] kvm: pic: non byte read [ 206.798862][ T8329] kvm: pic: non byte write [ 206.804589][ T8329] kvm: pic: non byte read 08:20:24 executing program 1: setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x0, 0x4}, 0x10) syz_open_dev$loop(0x0, 0x4, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) syz_genetlink_get_family_id$tipc2(0x0) [ 206.819009][ T8329] kvm: pic: non byte write [ 206.830108][ T8329] kvm: pic: non byte read [ 206.849376][ T8329] kvm: pic: non byte write [ 206.861737][ T8329] kvm: pic: non byte read 08:20:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000180)=@newsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}}, 0xf0}}, 0x0) 08:20:24 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x201) sendmsg$alg(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000840)}], 0x1, 0x0, 0x0, 0x4000001}, 0x4000000) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='system%keyringeth0{ppp1,eth1security\x00', 0x25) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000cc0)=0xe8) recvmsg$kcm(r0, &(0x7f0000000f80)={&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/39, 0x27}, {&(0x7f0000000dc0)=""/47, 0x2f}, {&(0x7f0000000e00)}], 0x3, &(0x7f0000000e80)=""/241, 0xf1}, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{&(0x7f0000000fc0)=@caif=@rfm, 0x80, &(0x7f0000001280)=[{&(0x7f0000001040)=""/186, 0xba}, {&(0x7f0000001100)=""/206, 0xce}, {&(0x7f0000001240)=""/33, 0x21}], 0x3, &(0x7f00000012c0)=""/127, 0x7f}, 0x8}, {{&(0x7f0000001340)=@hci, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/4096, 0x1000}, 0x1f}, {{&(0x7f0000002400)=@nfc_llcp, 0x80, &(0x7f0000002700)=[{&(0x7f0000002480)=""/206, 0xce}, {&(0x7f0000002580)=""/147, 0x93}, {&(0x7f0000002640)=""/182, 0xb6}], 0x3, &(0x7f0000002740)=""/219, 0xdb}, 0x1}, {{&(0x7f0000002840)=@ethernet={0x0, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000028c0)=""/119, 0x77}, {&(0x7f0000002940)=""/243, 0xf3}, {&(0x7f0000002a40)=""/249, 0xf9}, {&(0x7f0000002b40)=""/27, 0x1b}], 0x4, &(0x7f0000002bc0)=""/18, 0x12}, 0x4}, {{&(0x7f0000002c00)=@sco, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002c80)=""/119, 0x77}, {&(0x7f0000002d00)=""/148, 0x94}, {&(0x7f0000002dc0)=""/147, 0x93}, {&(0x7f0000002e80)=""/182, 0xb6}, {&(0x7f0000002f40)=""/146, 0x92}, {0x0}, {&(0x7f0000003180)=""/31, 0x1f}, {&(0x7f00000031c0)=""/252, 0xfc}], 0x8, &(0x7f0000003380)=""/234, 0xea}, 0xb2}], 0x5, 0x40000122, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000035c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000004d80)={@initdev, @multicast1}, &(0x7f0000004dc0)=0xc) accept4$packet(r0, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14, 0x1bd3c3156b7f86b0) accept4(0xffffffffffffffff, &(0x7f0000004ec0)=@xdp, &(0x7f0000004f40)=0x80, 0x0) getsockname(r0, &(0x7f0000004f80)=@xdp, &(0x7f0000005000)=0x80) getsockname$packet(r0, &(0x7f0000005040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005200)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000005300)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005480)={{{@in6=@initdev, @in6=@empty}}, {{}, 0x0, @in=@remote}}, &(0x7f0000005580)=0xe8) getpeername$packet(r0, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005600)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000005640)={@empty, @multicast1}, &(0x7f0000005680)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000007b40)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000007b80)=0x14) getpeername$packet(r0, &(0x7f0000007bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007c40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000007d40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000084c0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2010080}, 0xc, &(0x7f0000008480)={&(0x7f0000007d80)={0xdc, r2, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}, {0x8}}}]}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x48000}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) read(r5, &(0x7f0000009f9c)=""/100, 0x64) 08:20:24 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") listen(r0, 0x4) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fe, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={0x0, 0xe}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x24, "2191cbd70abc9c1adeee8854beb5634dfe734c5acb0bd18054b5a47388d662e6cbb1526a"}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x6, 0xfffffffffffffffc, 0x20001, r3}, 0x10) r4 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) sendto(r1, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) bind(r0, &(0x7f0000000180)=@un=@file={0x1, './file0\x00'}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(r4) accept4(r0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) close(r4) 08:20:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0x388, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'vxcan1\x00', 'bcsf0\x00', 'rose0\x00', 'veth0\x00', @broadcast, [], @local, [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00', 0x210, {{0x1d}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x400) [ 207.314624][ T8350] xt_bpf: check failed: parse error 08:20:25 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast2, @local, 0x0, 0x2, [@loopback]}, 0x14) 08:20:25 executing program 1: setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x0, 0x4}, 0x10) syz_open_dev$loop(0x0, 0x4, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) syz_genetlink_get_family_id$tipc2(0x0) 08:20:25 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") listen(r0, 0x4) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fe, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={0x0, 0xe}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x24, "2191cbd70abc9c1adeee8854beb5634dfe734c5acb0bd18054b5a47388d662e6cbb1526a"}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x6, 0xfffffffffffffffc, 0x20001, r3}, 0x10) r4 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) sendto(r1, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) bind(r0, &(0x7f0000000180)=@un=@file={0x1, './file0\x00'}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(r4) accept4(r0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) close(r4) 08:20:25 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000000)=""/183) 08:20:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:20:25 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") listen(r0, 0x4) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fe, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={0x0, 0xe}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x24, "2191cbd70abc9c1adeee8854beb5634dfe734c5acb0bd18054b5a47388d662e6cbb1526a"}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x6, 0xfffffffffffffffc, 0x20001, r3}, 0x10) r4 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) sendto(r1, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) bind(r0, &(0x7f0000000180)=@un=@file={0x1, './file0\x00'}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(r4) accept4(r0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) close(r4) 08:20:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x0, 0x7ff}}, 0x28) 08:20:25 executing program 3: r0 = socket$inet6(0xa, 0x800000003, 0x5) shutdown(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) 08:20:25 executing program 1: setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x0, 0x4}, 0x10) syz_open_dev$loop(0x0, 0x4, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) syz_genetlink_get_family_id$tipc2(0x0) 08:20:25 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x201) sendmsg$alg(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000840)}], 0x1, 0x0, 0x0, 0x4000001}, 0x4000000) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='system%keyringeth0{ppp1,eth1security\x00', 0x25) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000cc0)=0xe8) recvmsg$kcm(r0, &(0x7f0000000f80)={&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/39, 0x27}, {&(0x7f0000000dc0)=""/47, 0x2f}, {&(0x7f0000000e00)}], 0x3, &(0x7f0000000e80)=""/241, 0xf1}, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{&(0x7f0000000fc0)=@caif=@rfm, 0x80, &(0x7f0000001280)=[{&(0x7f0000001040)=""/186, 0xba}, {&(0x7f0000001100)=""/206, 0xce}, {&(0x7f0000001240)=""/33, 0x21}], 0x3, &(0x7f00000012c0)=""/127, 0x7f}, 0x8}, {{&(0x7f0000001340)=@hci, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/4096, 0x1000}, 0x1f}, {{&(0x7f0000002400)=@nfc_llcp, 0x80, &(0x7f0000002700)=[{&(0x7f0000002480)=""/206, 0xce}, {&(0x7f0000002580)=""/147, 0x93}, {&(0x7f0000002640)=""/182, 0xb6}], 0x3, &(0x7f0000002740)=""/219, 0xdb}, 0x1}, {{&(0x7f0000002840)=@ethernet={0x0, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000028c0)=""/119, 0x77}, {&(0x7f0000002940)=""/243, 0xf3}, {&(0x7f0000002a40)=""/249, 0xf9}, {&(0x7f0000002b40)=""/27, 0x1b}], 0x4, &(0x7f0000002bc0)=""/18, 0x12}, 0x4}, {{&(0x7f0000002c00)=@sco, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002c80)=""/119, 0x77}, {&(0x7f0000002d00)=""/148, 0x94}, {&(0x7f0000002dc0)=""/147, 0x93}, {&(0x7f0000002e80)=""/182, 0xb6}, {&(0x7f0000002f40)=""/146, 0x92}, {0x0}, {&(0x7f0000003180)=""/31, 0x1f}, {&(0x7f00000031c0)=""/252, 0xfc}], 0x8, &(0x7f0000003380)=""/234, 0xea}, 0xb2}], 0x5, 0x40000122, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000035c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000036c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000004d80)={@initdev, @multicast1}, &(0x7f0000004dc0)=0xc) accept4$packet(r0, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14, 0x1bd3c3156b7f86b0) accept4(0xffffffffffffffff, &(0x7f0000004ec0)=@xdp, &(0x7f0000004f40)=0x80, 0x0) getsockname(r0, &(0x7f0000004f80)=@xdp, &(0x7f0000005000)=0x80) getsockname$packet(r0, &(0x7f0000005040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005200)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000005300)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005480)={{{@in6=@initdev, @in6=@empty}}, {{}, 0x0, @in=@remote}}, &(0x7f0000005580)=0xe8) getpeername$packet(r0, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005600)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000005640)={@empty, @multicast1}, &(0x7f0000005680)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000007b40)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000007b80)=0x14) getpeername$packet(r0, &(0x7f0000007bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007c40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000007d40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000084c0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2010080}, 0xc, &(0x7f0000008480)={&(0x7f0000007d80)={0xdc, r2, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}, {0x8}}}]}}]}, 0xdc}, 0x1, 0x0, 0x0, 0x48000}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) read(r5, &(0x7f0000009f9c)=""/100, 0x64) 08:20:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 08:20:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:20:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10080, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r6+10000000}) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000000000000000000900000102000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 08:20:25 executing program 3: r0 = socket$inet6(0xa, 0x800000003, 0x5) shutdown(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) 08:20:25 executing program 1: setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x0, 0x4}, 0x10) syz_open_dev$loop(0x0, 0x4, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) syz_genetlink_get_family_id$tipc2(0x0) [ 208.222702][ T8398] ucma_write: process 99 (syz-executor.5) changed security contexts after opening file descriptor, this is not allowed. 08:20:25 executing program 3: r0 = socket$inet6(0xa, 0x800000003, 0x5) shutdown(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) 08:20:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x8000000009, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='auxv\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 208.495633][ T8419] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:20:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='auxv\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 08:20:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x8000000009, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x8000000009, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 208.636296][ T8425] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:20:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10080, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r6+10000000}) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000000000000000000900000102000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 08:20:26 executing program 3: r0 = socket$inet6(0xa, 0x800000003, 0x5) shutdown(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) 08:20:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x8000000009, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x8000000009, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='auxv\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 08:20:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10080, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r6+10000000}) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000000000000000000900000102000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 08:20:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x8000000009, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='auxv\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 08:20:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x8000000009, 0x4) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:20:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='em0eth0security\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x81007702, 0x70a000) 08:20:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xaf}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) 08:20:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='em0eth0security\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x81007702, 0x70a000) 08:20:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10080, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r6+10000000}) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000000000000000000900000102000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 08:20:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffff0020, 0x1000000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0xffff0020, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 08:20:27 executing program 1: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000060c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000006240)=[{0x10, 0x1, 0x1}], 0x10}}], 0x1, 0x0) 08:20:27 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='em0eth0security\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x81007702, 0x70a000) 08:20:27 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_SNDBIT(r0, 0x40045568, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$lock(r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_ima(0x0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@md5={0x1, "d3cce0f719456821301b2b983f6d12c9"}, 0x11, 0x2) quotactl(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0xffffffffffffff8b) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) connect$inet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="8aeefdcc5adaf09685b188fdfc31f3332f1ed685f4dbacc5c2cb067fd8479469906b21bb1ae3545a8335aee574a0acc2d098a7cd883599c3f307ac38874be83a9874af4b58d062e48191f7c12d8edf7c5cef2d326546f32517bb32c6191db3e38171f23fe5f9b79b38b3c5b1447d0a678ef7eb5f7bbbbe4e0826d05f5baeed7fa89368c501f544a009", 0x89, 0x20}], 0x800, 0x0) add_key(&(0x7f00000001c0)='cifs.srgoL\xba]\xa4bLWD\xd3a\x1ed', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000380)="9b68d05fd2c86ce86915964bea150d31254488764f7f8929a86f7737ff750f4f8ebc5074d5ac0ca066a76e7094c3e3ba85350e7e6a1f59694241e09759cd523fe3cb0eb798", 0x45, 0xfffffffffffffffc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@empty}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) 08:20:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10080, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r6+10000000}) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000000000000000000900000102000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 08:20:27 executing program 1: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000060c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000006240)=[{0x10, 0x1, 0x1}], 0x10}}], 0x1, 0x0) 08:20:27 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='em0eth0security\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x81007702, 0x70a000) [ 209.998062][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 210.004202][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:20:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffff0020, 0x1000000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0xffff0020, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 08:20:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000017c0)={0x0, @in={{0x2, 0x0, @initdev}}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x8000000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="6a6264300000000100001afa7c51e7bcda15934e2e80246ebecf33c4018bbf8144300fe5b51607c0d8b3ecadcf0a0a8835a812c17cd9f3ba622fac62dbe6a1346a46eeeebf5d3df5dd82560f0e8cb1206c3372e057e351fc811f83beff732bdd9a68166e481ddcb6"], 0x0, &(0x7f0000000480)='debugfs\x00', 0x800020, &(0x7f00000004c0)='syz1') r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x0, 0x3, 0x80000001, 0xd9a}) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB="88f5aa4c43c972ab18a2d3c3896b6949d501f39117"], 0x1) ioctl$TCSETS(r4, 0x5402, &(0x7f00000002c0)={0x0, 0x10001, 0x7, 0x4, 0x7, 0x20, 0x8, 0x1, 0x200, 0x9, 0x5c}) write$binfmt_misc(r5, &(0x7f0000000440)={'syz1'}, 0x1200e) ioctl$UI_DEV_DESTROY(r3, 0x5502) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000)=0x3, &(0x7f0000000180)=0x2) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000580)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000400)={r6}) 08:20:27 executing program 1: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000060c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000006240)=[{0x10, 0x1, 0x1}], 0x10}}], 0x1, 0x0) 08:20:27 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r2 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x1ac) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) fcntl$setflags(r4, 0x2, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) kcmp(r5, r5, 0x3, r0, r3) fchown(0xffffffffffffffff, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) utime(&(0x7f0000000540)='./bus\x00', 0x0) tee(r4, r4, 0xffffffff, 0x0) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000300)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) ftruncate(r6, 0x2007fff) sendfile(r2, r6, 0x0, 0x87ff7) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) [ 210.342642][ T8516] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:20:28 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10080, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r6+10000000}) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000000000000000000900000102000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 08:20:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0xffff0020, 0x1000000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0xffff0020, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 08:20:28 executing program 1: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000060c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000006240)=[{0x10, 0x1, 0x1}], 0x10}}], 0x1, 0x0) 08:20:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10080, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r6+10000000}) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f7200000000000000000000000000000900000102000000000000000040000000000027bf4ff0a8612ba40000000000000000380000001700000000000000001f3be2d3ff000000000000000000000000000000000000000ef400000001000000000000000000000000000000faffffe007ffffff"], 0x78) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 08:20:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000017c0)={0x0, @in={{0x2, 0x0, @initdev}}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x8000000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="6a6264300000000100001afa7c51e7bcda15934e2e80246ebecf33c4018bbf8144300fe5b51607c0d8b3ecadcf0a0a8835a812c17cd9f3ba622fac62dbe6a1346a46eeeebf5d3df5dd82560f0e8cb1206c3372e057e351fc811f83beff732bdd9a68166e481ddcb6"], 0x0, &(0x7f0000000480)='debugfs\x00', 0x800020, &(0x7f00000004c0)='syz1') r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x0, 0x3, 0x80000001, 0xd9a}) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB="88f5aa4c43c972ab18a2d3c3896b6949d501f39117"], 0x1) ioctl$TCSETS(r4, 0x5402, &(0x7f00000002c0)={0x0, 0x10001, 0x7, 0x4, 0x7, 0x20, 0x8, 0x1, 0x200, 0x9, 0x5c}) write$binfmt_misc(r5, &(0x7f0000000440)={'syz1'}, 0x1200e) ioctl$UI_DEV_DESTROY(r3, 0x5502) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000)=0x3, &(0x7f0000000180)=0x2) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000580)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000400)={r6}) 08:20:28 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r2 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x1ac) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ab