[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 95.981439] audit: type=1800 audit(1551774422.037:25): pid=10544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 96.000847] audit: type=1800 audit(1551774422.037:26): pid=10544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 96.020349] audit: type=1800 audit(1551774422.067:27): pid=10544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.218' (ECDSA) to the list of known hosts. 2019/03/05 08:27:16 fuzzer started 2019/03/05 08:27:22 dialing manager at 10.128.0.26:46079 2019/03/05 08:27:22 syscalls: 1 2019/03/05 08:27:22 code coverage: enabled 2019/03/05 08:27:22 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/05 08:27:22 extra coverage: extra coverage is not supported by the kernel 2019/03/05 08:27:22 setuid sandbox: enabled 2019/03/05 08:27:22 namespace sandbox: enabled 2019/03/05 08:27:22 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/05 08:27:22 fault injection: enabled 2019/03/05 08:27:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/05 08:27:22 net packet injection: enabled 2019/03/05 08:27:22 net device setup: enabled 08:30:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a040007000000000013002d54036205001810000002007b4e3b264f6e1d15d6585c875ddf0000000448e910bcd7d0107d53fd7b7080a7"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) syzkaller login: [ 289.271986] IPVS: ftp: loaded support on port[0] = 21 [ 289.435641] chnl_net:caif_netlink_parms(): no params data found [ 289.528090] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.534758] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.543288] device bridge_slave_0 entered promiscuous mode [ 289.553337] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.559858] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.568334] device bridge_slave_1 entered promiscuous mode [ 289.603720] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 289.615794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 289.647475] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 289.656308] team0: Port device team_slave_0 added [ 289.662944] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 289.671633] team0: Port device team_slave_1 added [ 289.677985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 289.687146] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 289.777027] device hsr_slave_0 entered promiscuous mode [ 289.912485] device hsr_slave_1 entered promiscuous mode [ 290.033278] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 290.040961] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 290.071381] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.077986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.085237] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.091823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.190192] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 290.196413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.211221] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 290.224617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.235994] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.246685] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.258533] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 290.278445] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 290.284695] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.301246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.310130] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.316787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.356673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.365235] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.371814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.381820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.417401] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.426570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.435746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.445742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.460020] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 290.466229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.502200] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 290.522823] 8021q: adding VLAN 0 to HW filter on device batadv0 08:30:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="050000fcffffff00"], 0x0}, 0x48) 08:30:17 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9e1a) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) clone(0x1000109, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3a) ftruncate(r0, 0x0) 08:30:17 executing program 0: clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x20, r0, 0x0, 0x0) 08:30:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@ll={0x11, 0x0, r1}, 0x80, 0x0, 0x0, &(0x7f0000000440)=[{0x10}], 0x10}, 0x800) 08:30:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x100840000000002, 0x3, 0x1f) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) bind$inet6(r1, 0x0, 0x0) 08:30:19 executing program 0: socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000000)={0x0, 0x0}) r2 = dup3(r1, r0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f00000000c0)={0x10001, 0x0, {0xffffffffffffffff, 0x2, 0xff, 0x3, 0xffffffffffffffff}}) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xc22, 0x400000) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000380)=0xf5) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f0000000280)=""/245) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000440)) connect$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x20) [ 293.152445] IPVS: ftp: loaded support on port[0] = 21 08:30:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xf) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) 08:30:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000020000007f"], 0x0, 0x4}, 0x48) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)='\x03') [ 293.363147] chnl_net:caif_netlink_parms(): no params data found [ 293.472653] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.479238] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.487782] device bridge_slave_0 entered promiscuous mode [ 293.503002] rpcbind: RPC call returned error 13 [ 293.516463] rpcbind: RPC call returned error 13 [ 293.527082] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.533815] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.542575] device bridge_slave_1 entered promiscuous mode 08:30:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000020000007f"], 0x0, 0x4}, 0x48) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)='\x03') [ 293.581169] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 293.594272] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 293.643686] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 293.652960] team0: Port device team_slave_0 added [ 293.668569] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 293.678255] team0: Port device team_slave_1 added [ 293.686746] rpcbind: RPC call returned error 13 [ 293.696987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 293.707365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 08:30:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000020000007f"], 0x0, 0x4}, 0x48) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)='\x03') [ 293.798227] device hsr_slave_0 entered promiscuous mode [ 293.817591] rpcbind: RPC call returned error 13 [ 293.843779] device hsr_slave_1 entered promiscuous mode 08:30:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000020000007f"], 0x0, 0x4}, 0x48) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)='\x03') [ 293.885001] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 293.900987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 08:30:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x55) listen(r1, 0x4) r2 = socket$inet6(0xa, 0x6, 0x0) eventfd(0x8000) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf32(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="7f453a46000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000b7ff1ac7ea2825a000000000000000000000000000000000000000000"], 0x58) close(r2) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="dc000000ed7d87180f75f8d377bb0b29cb68daa26333dde8a4648d47984fcc90983f06a4bcc9c5f3556a3c0fd691b2fff490290171c0d28d661956bf8e792459e4ac45724eef70eb3af18cb59324fd483140aefe69a30e47f3650764a8b7dd38f9324fb67aed563cab2a2d13e219a5209bd72868dd85f5af7d2a6ff7894d971593229781d1f77194af5990504994e93fd83da837287411279760708778a061090c0368540439ae04e9bac23f046ec3d0d467a818d34dfb7aca7ed1ee5b4f6ba6a6c15faa72b270fdbc4dd7e2680b03f54f15a0c99b57ad10"], &(0x7f0000000080)=0xe4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000240)={r5, @in6={{0xa, 0x4e23, 0x7, @remote, 0x1}}, 0x95, 0x80}, &(0x7f00000000c0)=0x90) r6 = accept4(r1, 0x0, 0x0, 0x0) close(r2) recvfrom$inet6(r4, &(0x7f0000000500)=""/113, 0x71, 0x10000, &(0x7f0000000300)={0xa, 0x4e20, 0xc41, @loopback, 0x10000}, 0x1c) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) setsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x7}, 0x8) setsockopt$inet_tcp_buf(r4, 0x6, 0xe, &(0x7f0000000400)="99a9ab15e536092aa76474868c1d5ffcd9667d4b04523f684410efcf8f87dd2af1caafe17001478431d299aa31968402c8fcc9b48a6d6bb5f597cb707cd8e06860190e02ef9b4605a7e040878b90328302d834d4cdc17bc575e1bf454df83423ab8a8edeeb7131002069dac6acdc7deb448308d5a55dd2ec504480ebb5361499ab3bb6ec0a7591b1673cc73d260263874c1460febc5883563972fa98d31284ff4a6033b2f1a0f18f8ae097e8c5917ae48a9be3413ad53a5e8374ead71b404f5d615b6ce7950fa6932f97164c46", 0xcd) [ 293.962318] rpcbind: RPC call returned error 13 [ 293.965999] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.973704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.980919] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.987650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.144311] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 294.150497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.172507] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 294.186810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.204166] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.219310] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.232462] dccp_close: ABORT with 88 bytes unread [ 294.244874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 294.278531] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 294.285637] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.312275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.320812] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.327513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.345238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.353812] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.360324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.377392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 294.394925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 294.416847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 08:30:20 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0xa00, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000140)=ANY=[@ANYBLOB="0400000000000000010100000000000002000000ff0300000000000004000000900300000000000000000000000000000a0000000300000007000000b6e75b86020000003f0000000800000000000000000000000000000007000000000000000300000008000000050000000010000008000000000000000000000000000000060000003f0000000300000009000000050000000700000008000000000000000000000000000000"]) mbind(&(0x7f00004df000/0x3000)=nil, 0x3000, 0x2, &(0x7f00000000c0)=0x3, 0x3ff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40002, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 294.426906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.455863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 294.467191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.476716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.493357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 294.510570] mmap: syz-executor.0 (10775) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 294.524259] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.532915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.542249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.554546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 294.563733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.572552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.587273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 294.595085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.604684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.617994] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 294.624268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.686632] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 294.715148] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.852858] protocol 88fb is buggy, dev hsr_slave_0 [ 294.858705] protocol 88fb is buggy, dev hsr_slave_1 08:30:21 executing program 1: mkdir(&(0x7f0000000580)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) renameat2(r0, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4e, 0x0) 08:30:21 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) connect$packet(r0, &(0x7f0000000080)={0x11, 0x9, r1, 0x1, 0xa4, 0x6, @broadcast}, 0x14) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f00000000c0)={0x0, 0x100000}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x7, 0x0, 0x4, 0x6, 'syz1\x00', 0x2800000}) 08:30:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") open(&(0x7f0000000200)='./file0\x00', 0x40c5, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x4b0, 0x0, 0x120, 0x120, 0x120, 0x0, 0x418, 0x418, 0x418, 0x418, 0x418, 0x5, &(0x7f0000000240), {[{{@uncond, 0x0, 0xe0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x1f, 0x0, 0x401}}, @common=@socket0={0x20, 'socket\x00'}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x1, 0x20, "566aec51869d70ea30d050f90353723b45019fe01cfee10842b2e18be2b2"}}}, {{@uncond, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x4}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x5, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0xe}, @gre_key=0x200, @icmp_id=0x68}}}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x40, 0x810, 0x0, 0x1}}, @common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x70cb, 0xffff}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @local, @rand_addr=0x2, @port=0x4e21, @icmp_id=0x67}}}}, {{@ip={@multicast2, @empty, 0xffffffff, 0xff, 'vxcan1\x00', 'rose0\x00', {0xff}, {}, 0x37, 0x2, 0x2}, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @local, @loopback, @port=0x4e23, @port=0x4e23}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x510) 08:30:21 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x8000, 0x2, {0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x15182c}}}) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {r1, r2/1000+10000}}, &(0x7f0000000180)) r3 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x6, 0x1) ioctl$UI_DEV_DESTROY(r3, 0x5502) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "50a164c9"}, 0x0, 0x0, @offset, 0x4}) 08:30:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") open(&(0x7f0000000200)='./file0\x00', 0x40c5, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x4b0, 0x0, 0x120, 0x120, 0x120, 0x0, 0x418, 0x418, 0x418, 0x418, 0x418, 0x5, &(0x7f0000000240), {[{{@uncond, 0x0, 0xe0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x1f, 0x0, 0x401}}, @common=@socket0={0x20, 'socket\x00'}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x1, 0x20, "566aec51869d70ea30d050f90353723b45019fe01cfee10842b2e18be2b2"}}}, {{@uncond, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x4}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x5, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0xe}, @gre_key=0x200, @icmp_id=0x68}}}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x40, 0x810, 0x0, 0x1}}, @common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x70cb, 0xffff}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @local, @rand_addr=0x2, @port=0x4e21, @icmp_id=0x67}}}}, {{@ip={@multicast2, @empty, 0xffffffff, 0xff, 'vxcan1\x00', 'rose0\x00', {0xff}, {}, 0x37, 0x2, 0x2}, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @local, @loopback, @port=0x4e23, @port=0x4e23}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x510) 08:30:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2ba, &(0x7f0000000400)=[@assoc={0x18, 0x117, 0x4, 0x5d}], 0x18}], 0x49249249249272b, 0x0) recvmmsg(r2, &(0x7f00000035c0)=[{{0x0, 0x0, &(0x7f0000000500), 0x2, &(0x7f0000000580)=""/250, 0xfa}}], 0x40001c6, 0x0, &(0x7f0000001040)={0x77359400}) 08:30:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000010a00)=ANY=[@ANYBLOB="180000000000000000000000000073010000000000009500000000800000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 08:30:21 executing program 0: socketpair(0x3, 0x80000, 0xfffffffffffffffe, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x20052, r0, 0x0) unshare(0x2000400) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_buf(r1, 0x1, 0x0, 0x0, 0x0) 08:30:21 executing program 1: unshare(0x600) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20400, 0x23) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x100a, 0x3) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc002, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x1) sendto(r1, &(0x7f0000000100)="c495aa1ed61b31f18aeeb09afeec09c4128f24296bcdc1e8fa1db55a73500e131104558a9e2a8543a3537eb92bee4c599c2deb196c1dde92a23b6ce8f3ea99", 0x3f, 0x20000800, &(0x7f0000000180)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x3}}, 0x80) socket$inet6_sctp(0xa, 0x5, 0x84) ppoll(&(0x7f0000000140)=[{r2}], 0x1, &(0x7f0000000340)={0x0, 0x1c9c380}, 0x0, 0x0) 08:30:22 executing program 0: r0 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000840)={r0}, 0x0, &(0x7f0000000900)="ac69ca", 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x80) setsockopt$inet6_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000040)="45ba87412a326d409c7fff514fe2ad821bbd774ece9182e9a3eb2c39db5ce26c70ef3204a9b457e604af0167d28da9e910f5a043e742472269f5d58986ee66c7be30c71e4f7580f85e7d8ea30fbe9be3130d40d9f6dc7343f8b397f3ebf0a13e378ee19252f77e131bc8ea405dee3eca4a4ae66f985c6e", 0x77) 08:30:22 executing program 1: unshare(0x600) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20400, 0x23) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x100a, 0x3) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc002, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x1) sendto(r1, &(0x7f0000000100)="c495aa1ed61b31f18aeeb09afeec09c4128f24296bcdc1e8fa1db55a73500e131104558a9e2a8543a3537eb92bee4c599c2deb196c1dde92a23b6ce8f3ea99", 0x3f, 0x20000800, &(0x7f0000000180)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x3}}, 0x80) socket$inet6_sctp(0xa, 0x5, 0x84) ppoll(&(0x7f0000000140)=[{r2}], 0x1, &(0x7f0000000340)={0x0, 0x1c9c380}, 0x0, 0x0) 08:30:22 executing program 0: socketpair$unix(0x1, 0x4000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) 08:30:22 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) accept4(r0, &(0x7f0000000140)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000001c0)=0x80, 0x800) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800001c0}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=@ipv4_getnetconf={0x54, 0x52, 0x120, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x1}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xc3}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7ff}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x44014) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x34000}], 0x1}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x4, 0x1ff}, {0x8, 0x4}]}, 0x14, 0x3) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 08:30:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x0, 0x1f}, {}], 0x30) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000100)=0x5) clone(0x6102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)=0x5) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 08:30:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0xfffffffffffffd57, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @remote}}}, 0x90) 08:30:22 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) accept4(r0, &(0x7f0000000140)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000001c0)=0x80, 0x800) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800001c0}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=@ipv4_getnetconf={0x54, 0x52, 0x120, 0x70bd26, 0x25dfdbfc, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x1}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xc3}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7ff}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x44014) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x34000}], 0x1}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x4, 0x1ff}, {0x8, 0x4}]}, 0x14, 0x3) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 08:30:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)='#', 0x1}], 0x1}}], 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)=0x5, 0x4) recvfrom(r1, &(0x7f0000003540)=""/68, 0x44, 0x0, &(0x7f0000003640)=@hci, 0x70e000) 08:30:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000020002507eaffffff000000000a000000000f937c0000000023000300697036746e6c30000000000000"], 0x34}}, 0x0) 08:30:23 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200140, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000040)={@local, @multicast2}, &(0x7f0000000080)=0x8) getrandom(0xfffffffffffffffd, 0x17b, 0x40000000000) getpeername$packet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 296.955079] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 297.004470] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 08:30:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) chroot(&(0x7f0000000400)='./file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000180)='./file0/../file0\x00') umount2(&(0x7f00000001c0)='./file0/../file0\x00', 0x2) 08:30:23 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x101, 0x12f00) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)=')+\x00', 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="1ceb54599817112759da7a5e5a515a4fe78fe0506a678126fa51a0772cc980e22d582bd8e16f8f69068e607bd685af075f09e293d43c3ab10c759baac878aea65bf05f721b99f65635a7e0e5b664314067d625cfb1f818f6fe0e5d3606fbb085018bd11e28594ddfd14700f826d424d21ab77f25c428", 0x76, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="8da384cbd52b4f22369dbdfa", 0xc, 0xfffffffffffffffa) keyctl$dh_compute(0x19, &(0x7f0000000000)={0x0, r1, r2}, &(0x7f0000000340)=""/83, 0x28, 0x0) rt_sigprocmask(0x1, &(0x7f00000000c0)={0x80000000}, &(0x7f0000000040), 0xa6) 08:30:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffbfffffffffc, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x8, 0x303102) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r2 = dup(r0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x3, 0x8, 0xffffffffffffffff}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x9eb}, &(0x7f0000000100)=0x8) read(r2, 0x0, 0x0) 08:30:23 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00', 0x57}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = semget(0x3, 0x1, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x15}, 0x45c) [ 297.482545] input: syz1 as /devices/virtual/input/input5 [ 297.516009] input: syz1 as /devices/virtual/input/input6 08:30:23 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000d67000)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa}}, {{@in, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8) syz_emit_ethernet(0x66, &(0x7f0000183f92)={@random="cd39f2081b0b", @random="9a8c87bcb5a4", [], {@ipv6={0x86dd, {0x0, 0x6, "0aff0f", 0x30, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @loopback}}}}}}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x24) 08:30:23 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000d67000)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa}}, {{@in, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8) syz_emit_ethernet(0x66, &(0x7f0000183f92)={@random="cd39f2081b0b", @random="9a8c87bcb5a4", [], {@ipv6={0x86dd, {0x0, 0x6, "0aff0f", 0x30, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @loopback}}}}}}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x24) 08:30:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysfs$1(0x1, &(0x7f0000000000)='reiserfs\x00') 08:30:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = gettid() r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40000, 0x0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f00000000c0)=0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000180)="6295ac3dc8cb4a52686d36d0f4e2f64bc9aafefb2ae55a82cc1989b0a276deef25bde817967ce8e335e984940ddda62277026215157e98252fba8aa9deef6afdbc639ed4698e70f15ca6f90eff00017db2a37704bc9545936dcad494ac8962aa54466bd82f23bf4211bb4f4905a6703dd3d30c58667a318cdc4a8766ed38a332d7b41fa2f4e28123ba55ae3520a4a71748c20a0ea6b5242dce3227164581f0b42d934078d54fcb667c5d7eb24a8e7bf0adc318213b8b451541ecd6cd878372f11beb20d00d1698bd9e4d3a3f665b808e95e923b9d6662cffa51275606417ee") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x4a) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) fsetxattr$security_selinux(r2, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:dhcpc_state_t:s0\x00', 0x23, 0x2) fcntl$setstatus(r0, 0x4, 0x2800) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x200000003fffffd, 0x0, 0x0) 08:30:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) memfd_create(&(0x7f0000000040)='proc,\x00', 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xb4, r2, 0x800, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf74}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x34b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6000}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb7a}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000805}, 0x90) 08:30:24 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) quotactl(0x80000101, 0x0, 0x0, 0x0) 08:30:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000000), 0x80000002, 0x0) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2b) recvmmsg(r0, &(0x7f000000b000)=[{{&(0x7f00000000c0)=@alg, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/90, 0x5a}, {&(0x7f00000001c0)=""/124, 0x7c}, {&(0x7f0000000240)=""/222, 0xde}, {&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000440)=""/75, 0x4b}], 0x6, &(0x7f0000000540)=""/178, 0xb2}, 0x7}, {{&(0x7f0000000600)=@can, 0x80, &(0x7f0000000840)=[{&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/21, 0x15}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/117, 0x75}, {&(0x7f0000000800)=""/16, 0x10}], 0x5, &(0x7f00000008c0)=""/225, 0xe1}, 0x8}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/64, 0x40}, {&(0x7f0000000a00)=""/123, 0x7b}, {&(0x7f0000000a80)=""/66, 0x42}, {&(0x7f0000000b00)=""/254, 0xfe}], 0x4, &(0x7f0000000c40)=""/165, 0xa5}, 0x5}, {{&(0x7f0000000d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000d80)=""/194, 0xc2}, {&(0x7f0000000e80)=""/96, 0x60}, {&(0x7f0000000f00)=""/66, 0x42}, {&(0x7f0000000f80)=""/180, 0xb4}, {&(0x7f0000001040)=""/211, 0xd3}], 0x5, &(0x7f00000011c0)=""/247, 0xf7}, 0x4fa8}, {{&(0x7f00000012c0)=@generic, 0x80, &(0x7f0000003640)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/76, 0x4c}, {&(0x7f00000023c0)=""/187, 0xbb}, {&(0x7f0000002480)=""/141, 0x8d}, {&(0x7f0000002540)=""/194, 0xc2}, {&(0x7f0000002640)=""/4096, 0x1000}], 0x6, &(0x7f00000036c0)=""/4096, 0x1000}, 0x1}, {{&(0x7f00000046c0)=@nfc_llcp, 0x80, &(0x7f0000005b00)=[{&(0x7f0000004740)=""/236, 0xec}, {&(0x7f0000004840)=""/4096, 0x1000}, {&(0x7f0000005840)=""/255, 0xff}, {&(0x7f0000005940)=""/11, 0xb}, {&(0x7f0000005980)=""/254, 0xfe}, {&(0x7f0000005a80)=""/90, 0x5a}], 0x6, &(0x7f0000005b80)=""/178, 0xb2}, 0x200}, {{&(0x7f0000005c40)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000006000)=[{&(0x7f0000005cc0)=""/104, 0x68}, {&(0x7f0000005d40)=""/242, 0xf2}, {&(0x7f0000005e40)=""/17, 0x11}, {&(0x7f0000005e80)=""/8, 0x8}, {&(0x7f0000005ec0)=""/61, 0x3d}, {&(0x7f0000005f00)=""/99, 0x63}, {&(0x7f0000005f80)=""/20, 0x14}, {&(0x7f0000005fc0)=""/30, 0x1e}], 0x8, &(0x7f0000006080)=""/36, 0x24}, 0x10000}, {{&(0x7f00000060c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000008480)=[{&(0x7f0000006140)=""/4096, 0x1000}, {&(0x7f0000007140)=""/54, 0x36}, {&(0x7f0000007180)=""/107, 0x6b}, {&(0x7f0000007200)=""/185, 0xb9}, {&(0x7f00000072c0)=""/4096, 0x1000}, {&(0x7f00000082c0)=""/183, 0xb7}, {&(0x7f0000008380)=""/61, 0x3d}, {&(0x7f00000083c0)=""/119, 0x77}, {&(0x7f0000008440)=""/27, 0x1b}], 0x9, &(0x7f0000008540)=""/222, 0xde}, 0xbfe}, {{&(0x7f0000008640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000008880)=[{&(0x7f00000086c0)=""/219, 0xdb}, {&(0x7f00000087c0)=""/88, 0x58}, {&(0x7f0000008840)=""/63, 0x3f}], 0x3, &(0x7f00000088c0)=""/76, 0x4c}, 0x7}, {{&(0x7f0000008940)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f000000af00)=[{&(0x7f00000089c0)=""/138, 0x8a}, {&(0x7f0000008a80)=""/4096, 0x1000}, {&(0x7f0000009a80)=""/164, 0xa4}, {&(0x7f0000009b40)=""/230, 0xe6}, {&(0x7f0000009c40)=""/71, 0x47}, {&(0x7f0000009cc0)=""/89, 0x59}, {&(0x7f0000009d40)=""/4096, 0x1000}, {&(0x7f000000ad40)=""/200, 0xc8}, {&(0x7f000000ae40)=""/147, 0x93}], 0x9, &(0x7f000000afc0)=""/41, 0x29}, 0x6}], 0xa, 0x40000002, &(0x7f000000b280)) sendmsg$nl_netfilter(r2, &(0x7f000000b5c0)={&(0x7f000000b2c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f000000b580)={&(0x7f000000b300)={0x260, 0xf, 0x2, 0x100, 0x70bd2c, 0x25dfdbfc, {0x7, 0x0, 0xa}, [@nested={0x24c, 0x13, [@typed={0x10, 0x8c, @str='vboxnet1\x00'}, @generic="f786ee886662be6f336b1054988007de03db4a12b159a8df78f1098555ec1121aa340042d43a064cc758c7f34ef528c4c1ebb6b2f532b5abd78be493927381e7a4818681463d004e5f7ccbbb8233127f9de23f09d1359ee85de812e750c758e781e929db5a", @generic="353e718e997e76cc8c3a44b48dc9f8a26f426ac357353690369bc59e04a2ba35de216cbc4ae5de844833682b97b1e9609d5541ae5bbefa84b45d05ef2a39e08d0f87b8b2c0fa4bb3719397f43f0fff43d35d3cf3f6453cbbcd1f56642441135c56e3e8468b8506eaa853110917929173d727b0880dda2f8a29a8f7dcac37cd533a7545672f3f9a066a01eeffd96475e6aadf3121f04ff7976369f16037f5143ec0711a0120638222581128608329037ccf6d2253abb334fa34d6c57cf0a96148fed2a3805e5d62ecdae27fe40292f54d", @typed={0x10, 0x8f, @str='/dev/vcsa#\x00'}, @generic="8a08362c5e5a47a1fe1960f61643a0681a2dcc1f136821e666ff2a7e600a4bab12334011b77452ea038caa713bd09e7ee1a5eef54df1d6f6bf3468c1064b445f9508dadfdc81cde1184a2ae555a21fb12870c2acd1d6e93662e4c7723a6c7e16c2b2019620c8ad422a7759e0e73e20a6d5d51d3f", @generic="ccdca0e1c14fadcd9406bb5790e4cc8d59f09fe2e1a94830bd53695220a56d34b65369dd866f27b012e4df4cfe1057a905b77f65ca105cb4242fbf2649", @generic="d2f800e29ae6909828c0dc92647954f30651a86a71ed1253c34aed1c9eb156f7bcb35944823029f5bbdeb9181ffaa065628db4c781033eda4ccecfb97d1ff2f8"]}]}, 0x260}, 0x1, 0x0, 0x0, 0x10}, 0x1) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1f, 0x200000) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f000000b600)={0x28, 0x2, 0x0, {0x2, 0x3, 0xee}}, 0x28) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) 08:30:24 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) quotactl(0x80000101, 0x0, 0x0, 0x0) 08:30:24 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) quotactl(0x80000101, 0x0, 0x0, 0x0) 08:30:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x1, 0x2, 0x5, 0x10000, 0xffffffffffff0001, 0x1, 0x0, 0x0}, &(0x7f0000000080)=0x20) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)) preadv(r3, &(0x7f0000000300)=[{&(0x7f0000000000)=""/146, 0x92}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000000c0)={r2, 0xe1, "81a9b1433db4b5ab0feaa90818749a12f8420ac39880f9a60b5bb13c98bb43a82c1b06043b968ca82a9afaa723c38f80d57ea6474cd3778948738d61b71a94d7b210ef9abf62fb457da240beb267003c33c3d00086ee04bdcfae0290e93b1dab727632dad0a82803b0efa06c4a38420d768ac7523694d6a744ff87f8e27dc29d0198943940884d519140cf83ae409118de7079e0ea111a210a2fc3872138d304b47b31250e34c93fa74d0ece56a4c1acdd85f59555f5e99fe6363f38717b68f4bb220f4522d406a359ce598313b3d6e978dacb456465069cf07ed59b9b27a1e8ff"}, &(0x7f00000001c0)=0xe9) 08:30:24 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) quotactl(0x80000101, 0x0, 0x0, 0x0) 08:30:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000005c0)={@remote, r2}, 0x14) close(r1) 08:30:24 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) quotactl(0x80000101, 0x0, 0x0, 0x0) 08:30:25 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 08:30:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000005c0)={@remote, r2}, 0x14) close(r1) 08:30:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000005c0)={@remote, r2}, 0x14) close(r1) 08:30:25 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000005c0)={@remote, r2}, 0x14) close(r1) 08:30:25 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) r4 = socket$rds(0x15, 0x5, 0x0) r5 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)={0x0}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x154, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10630840030000000000000001634040030000000000000004000000000000000000000000000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="5800000000000000ca4dbe53c6d54d4c40000000000000002000000000000000780000000000000030000000000000003800000000000000"], @ANYBLOB="00634040030000000000000003000000000000000000000000000000000000000000000030000000000000003000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f8b963c200000000", @ANYRES64=r2, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="280000000000000020000000000000001800000000000000280000000000000018000000000000003000000000000000"], @ANYBLOB="056304400100000012634840020000000000000004000000000000000000000001000000000000000000000050000000000000003800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000300000000000000852a6a770a000000", @ANYRES64=r5, @ANYBLOB="00000000000000008561646600000000070000000000000002000000000000000800000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="06000000000000000e630c4003000000040000000000000000634040000000000000000001000000000000000000000001000000000000000000000030000000000000005000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6a7301000000", @ANYRES64=r6, @ANYBLOB="0300000000000000852a646600000000", @ANYRES32=r7, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000780000000000000030000000000000000000000000000000480000000000000040000000000000003800000000000000280000000000000038000000000000002000000000000000"], @ANYBLOB="0563ffffffdeb416db630c40020000000100000000000000"], 0x41, 0x0, &(0x7f0000000580)="8ec50701c4b1fa13897ee03a3d6456b64cd4eabd38f4607c78e843aa10b08273cce58959c9e0f7f346c86b306f4069bc67caef02470f0609c86657e245f6a770b8"}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000005c0)={@remote, r2}, 0x14) 08:30:25 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) socket$rds(0x15, 0x5, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x200000, 0x0) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1\x00'}) 08:30:25 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) socket$rds(0x15, 0x5, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:26 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) socket$rds(0x15, 0x5, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000008, 0x20010, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:26 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) socket$rds(0x15, 0x5, 0x0) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000005c0)={@remote, r2}, 0x14) 08:30:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:26 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xf49, 0x8}, 0xc) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:26 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:27 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) socket$inet_smc(0x2b, 0x1, 0x0) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) [ 301.074923] IPVS: ftp: loaded support on port[0] = 21 08:30:27 executing program 0: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x303000) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:27 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:27 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x400) 08:30:27 executing program 0: syz_open_dev$usbmon(0x0, 0x4, 0x400) [ 301.531294] chnl_net:caif_netlink_parms(): no params data found [ 301.725156] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.731891] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.740432] device bridge_slave_0 entered promiscuous mode [ 301.784297] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.790867] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.799573] device bridge_slave_1 entered promiscuous mode [ 301.837165] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.849293] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 301.886755] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 301.895710] team0: Port device team_slave_0 added [ 301.904262] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 301.913321] team0: Port device team_slave_1 added [ 301.920541] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 301.930329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 302.167286] device hsr_slave_0 entered promiscuous mode [ 302.322569] device hsr_slave_1 entered promiscuous mode [ 302.513495] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 302.521194] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 302.564753] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.654667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.671117] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 302.685040] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 302.693574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.701598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.718051] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 302.724909] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.745384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 302.752763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.763051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.771546] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.778240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.795051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 302.809918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 302.820208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.828585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.837597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.846587] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.853151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.861085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.881824] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 302.895165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 302.908347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 302.921313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 302.929070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.938734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.947978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.957479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.966723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.975718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.984312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.994720] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 303.012173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 303.019217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 303.027969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.052139] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 303.058287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 303.087252] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 303.109057] 8021q: adding VLAN 0 to HW filter on device batadv0 08:30:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(aegis128-aesni)\x00'}, 0xfffffffffffffe76) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f00000000c0)={0x3, 0x6}) sendmmsg(r1, &(0x7f0000000000)=[{{&(0x7f00005fafe4)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}}, {{&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}}], 0x2, 0x0) 08:30:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:29 executing program 0: syz_open_dev$usbmon(0x0, 0x4, 0x400) 08:30:29 executing program 0: syz_open_dev$usbmon(0x0, 0x4, 0x400) 08:30:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:29 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200040, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000140)) r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x103, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x9) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x3, 0xa, 0x0, "7f09e7efa4d1be3cc4f35018ff58d0bfda55f8a2188710649d774660d382da21", 0x38717f73}) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000000)={0x1, 0x0, {0x100000001, 0x5, 0x9, 0x4}}) 08:30:29 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x0, 0x400) 08:30:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x80) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rfkill\x00', 0x2100, 0x0) connect$unix(r1, &(0x7f0000001900)=@file={0x0, './file1\x00'}, 0x6e) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000200)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000", @ANYRESOCT]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af30, &(0x7f0000000180)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r3 = socket$inet(0x2b, 0x801, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000022c0)={0x0, 0x38, &(0x7f0000000880)=[@in6={0xa, 0x4e20, 0x0, @local, 0x1ff}, @in6={0xa, 0x4e22, 0x9, @remote, 0x80}]}, &(0x7f00000023c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000002400)={r4, 0x9, 0x1}, &(0x7f0000002440)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000000300)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, 0x0}, 0x20000081) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) r5 = openat$cgroup_procs(r2, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000340), 0x6) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$EBT_SO_GET_INIT_ENTRIES(r6, 0x0, 0x83, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x8c, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000240)=""/140}, &(0x7f0000000300)=0x78) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000400), &(0x7f0000000440)=0x4) sendmmsg(r2, &(0x7f0000002340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000580)={0x0, 0x1f, 0x7}, &(0x7f0000000600)=0x8) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r6, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 08:30:30 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x0, 0x400) 08:30:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000000)={@remote}, 0x14) 08:30:30 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x0, 0x400) 08:30:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000000)={@remote}, 0x14) 08:30:30 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000000)={@remote}, 0x14) 08:30:30 executing program 0 (fault-call:0 fault-nth:0): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) [ 304.645778] FAULT_INJECTION: forcing a failure. [ 304.645778] name failslab, interval 1, probability 0, space 0, times 1 [ 304.657238] CPU: 0 PID: 11061 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 304.664477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.673887] Call Trace: [ 304.676580] dump_stack+0x173/0x1d0 [ 304.680275] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 304.685560] should_fail+0xa19/0xb20 [ 304.689362] __should_failslab+0x278/0x2a0 [ 304.693681] should_failslab+0x29/0x70 [ 304.697637] kmem_cache_alloc+0xff/0xb60 [ 304.701776] ? getname_flags+0x12f/0xb10 [ 304.705902] ? fsnotify+0x2092/0x20a0 [ 304.709780] getname_flags+0x12f/0xb10 [ 304.713742] getname+0x55/0x60 [ 304.716995] do_sys_open+0x53e/0xa30 [ 304.720789] __se_sys_open+0xad/0xc0 [ 304.724576] __x64_sys_open+0x4a/0x70 [ 304.728448] do_syscall_64+0xbc/0xf0 [ 304.732238] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 304.737478] RIP: 0033:0x411f11 [ 304.740733] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 304.759732] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 304.767508] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 304.774821] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 304.782144] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 304.789460] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 304.797565] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) 08:30:31 executing program 0 (fault-call:0 fault-nth:1): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000009000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:30:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) [ 305.174280] FAULT_INJECTION: forcing a failure. [ 305.174280] name failslab, interval 1, probability 0, space 0, times 0 [ 305.185849] CPU: 0 PID: 11079 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 305.193087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.202494] Call Trace: [ 305.205177] dump_stack+0x173/0x1d0 [ 305.208876] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 305.210770] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 305.214127] should_fail+0xa19/0xb20 [ 305.214211] __should_failslab+0x278/0x2a0 [ 305.236724] should_failslab+0x29/0x70 [ 305.240685] kmem_cache_alloc+0xff/0xb60 [ 305.244791] ? __alloc_file+0xa3/0x710 [ 305.248729] __alloc_file+0xa3/0x710 [ 305.252754] alloc_empty_file+0x1f5/0x4b0 [ 305.256953] path_openat+0x18a/0x6b90 [ 305.260838] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 305.266111] ? __msan_poison_alloca+0x1f0/0x2a0 [ 305.270830] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 305.276068] do_filp_open+0x2b8/0x710 [ 305.279945] do_sys_open+0x642/0xa30 [ 305.283723] __se_sys_open+0xad/0xc0 [ 305.287505] __x64_sys_open+0x4a/0x70 [ 305.291349] do_syscall_64+0xbc/0xf0 [ 305.295133] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.300352] RIP: 0033:0x411f11 [ 305.303599] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 305.322547] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 305.330308] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 305.337619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 305.344929] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 305.352234] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 305.359540] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:31 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 305.537326] FAULT_INJECTION: forcing a failure. [ 305.537326] name failslab, interval 1, probability 0, space 0, times 0 [ 305.548836] CPU: 1 PID: 11083 Comm: syz-executor.1 Not tainted 5.0.0-rc1+ #9 [ 305.556067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.565466] Call Trace: [ 305.568137] dump_stack+0x173/0x1d0 [ 305.571826] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 305.577164] should_fail+0xa19/0xb20 [ 305.580952] __should_failslab+0x278/0x2a0 [ 305.585259] should_failslab+0x29/0x70 [ 305.589217] __kmalloc+0xaf/0x3a0 [ 305.592731] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 305.598158] ? sock_kmalloc+0x165/0x2c0 [ 305.602203] sock_kmalloc+0x165/0x2c0 [ 305.606082] ipv6_sock_ac_join+0x524/0xbe0 [ 305.610407] do_ipv6_setsockopt+0x3658/0x72f0 [ 305.614992] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 305.620452] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 305.625717] ipv6_setsockopt+0xf8/0x350 [ 305.629756] ? ipv6_update_options+0x4f0/0x4f0 [ 305.634417] tcp_setsockopt+0x1c0/0x1f0 [ 305.638487] ? tcp_disconnect+0x18c0/0x18c0 [ 305.642864] sock_common_setsockopt+0x13b/0x170 [ 305.647598] ? sock_common_recvmsg+0x290/0x290 [ 305.652242] __sys_setsockopt+0x493/0x540 [ 305.656465] __se_sys_setsockopt+0xdd/0x100 [ 305.660854] __x64_sys_setsockopt+0x62/0x80 [ 305.665232] do_syscall_64+0xbc/0xf0 [ 305.669025] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.674256] RIP: 0033:0x457e29 [ 305.677508] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.696461] RSP: 002b:00007f1ed9381c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 305.704224] RAX: ffffffffffffffda RBX: 00007f1ed9381c90 RCX: 0000000000457e29 [ 305.711536] RDX: 000000000000001b RSI: 0000000000000029 RDI: 0000000000000003 [ 305.718846] RBP: 000000000073bf00 R08: 0000000000000014 R09: 0000000000000000 [ 305.726160] R10: 0000000020000000 R11: 0000000000000246 R12: 00007f1ed93826d4 [ 305.733466] R13: 00000000004c5b9a R14: 00000000004da010 R15: 0000000000000004 08:30:31 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:31 executing program 0 (fault-call:0 fault-nth:2): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 305.983583] FAULT_INJECTION: forcing a failure. [ 305.983583] name failslab, interval 1, probability 0, space 0, times 0 [ 305.995036] CPU: 0 PID: 11091 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 306.002315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.011714] Call Trace: [ 306.014395] dump_stack+0x173/0x1d0 [ 306.018092] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 306.023337] should_fail+0xa19/0xb20 [ 306.027134] __should_failslab+0x278/0x2a0 08:30:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000009000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:30:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0x15) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote, r1}, 0xdc) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000003c0)={0x100010000000000, 0x2, 0xa, 0x0, 0x0, [{r0, 0x0, 0x7}, {r0, 0x0, 0x5}, {r0, 0x0, 0x9}, {r0, 0x0, 0x7}, {r0, 0x0, 0x134}, {r0, 0x0, 0xff}, {r0, 0x0, 0xab9}, {r0, 0x0, 0x4}, {r0, 0x0, 0x5}, {r0, 0x0, 0xfff}]}) [ 306.031450] should_failslab+0x29/0x70 [ 306.035429] kmem_cache_alloc_trace+0x125/0xb40 [ 306.040192] ? apparmor_file_alloc_security+0x23b/0x6e0 [ 306.045637] apparmor_file_alloc_security+0x23b/0x6e0 [ 306.050897] ? apparmor_file_permission+0x490/0x490 [ 306.055974] security_file_alloc+0xcf/0x1a0 [ 306.060354] __alloc_file+0x1bf/0x710 [ 306.064223] alloc_empty_file+0x1f5/0x4b0 [ 306.068441] path_openat+0x18a/0x6b90 [ 306.072342] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 306.077606] ? __msan_poison_alloca+0x1f0/0x2a0 [ 306.082343] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 306.087620] do_filp_open+0x2b8/0x710 [ 306.091520] do_sys_open+0x642/0xa30 [ 306.095298] __se_sys_open+0xad/0xc0 [ 306.099062] __x64_sys_open+0x4a/0x70 [ 306.102916] do_syscall_64+0xbc/0xf0 [ 306.106697] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 306.111923] RIP: 0033:0x411f11 [ 306.115162] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 306.134447] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 306.142209] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 306.149520] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 306.157118] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 306.164426] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 306.171728] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:32 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000225bd7000fcdbdf25050000003000010014000300fe8000000000000000000000000000aa080004004e240000080009000e0000000800060072720000"], 0x44}}, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4000, 0x0) bind$rxrpc(r3, &(0x7f0000000080)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x200, @local, 0x3f}}, 0x24) 08:30:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@mcast2, 0x0}, &(0x7f00000000c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@remote, r1}, 0x14) 08:30:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000000540)=@newsa={0xf0, 0x1a, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1}, {}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x20c000) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000100)={0x3, 0x0, [{0x8000001b, 0xcde2, 0x8, 0x0, 0x7}, {0xc0000007, 0xe82, 0x0, 0x81, 0x5}, {0x80000008, 0x6, 0x1f, 0x7fff, 0x1}]}) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x200) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) r3 = getpgrp(0x0) sched_rr_get_interval(r3, &(0x7f0000000080)) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000040)) 08:30:32 executing program 0 (fault-call:0 fault-nth:3): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 306.602956] FAULT_INJECTION: forcing a failure. [ 306.602956] name failslab, interval 1, probability 0, space 0, times 0 [ 306.614433] CPU: 1 PID: 11112 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 306.621690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.631091] Call Trace: [ 306.633779] dump_stack+0x173/0x1d0 [ 306.637474] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 306.642726] should_fail+0xa19/0xb20 [ 306.646519] __should_failslab+0x278/0x2a0 [ 306.650823] should_failslab+0x29/0x70 [ 306.654784] kmem_cache_alloc_trace+0x125/0xb40 [ 306.659515] ? mon_bin_open+0x19c/0xb20 [ 306.663557] mon_bin_open+0x19c/0xb20 [ 306.667436] ? chrdev_open+0x6fa/0xe00 [ 306.671418] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 306.676667] ? mon_bin_mmap+0x230/0x230 [ 306.680705] chrdev_open+0xc5b/0xe00 [ 306.684482] ? cd_forget+0x320/0x320 [ 306.688258] do_dentry_open+0xf4f/0x1750 [ 306.692399] vfs_open+0xaf/0xe0 [ 306.695735] path_openat+0x185b/0x6b90 [ 306.699723] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 306.704997] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 306.710246] do_filp_open+0x2b8/0x710 [ 306.714141] do_sys_open+0x642/0xa30 [ 306.717932] __se_sys_open+0xad/0xc0 [ 306.721716] __x64_sys_open+0x4a/0x70 [ 306.725577] do_syscall_64+0xbc/0xf0 [ 306.729383] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 306.734627] RIP: 0033:0x411f11 08:30:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000080)=0xffffffffffffff74) [ 306.737873] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 306.756822] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 306.764587] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 306.771899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 306.779212] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 306.786527] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 306.793840] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:32 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffc, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000480)={0x20071026, r0}, &(0x7f0000000580)={0x1, 0x1, 0x901, 0x4000000000001, 0x6, 0x9}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000540), 0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'bridge_slave_0\x00'}, 0x18) syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x5, 0x34000) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) sched_setaffinity(r0, 0x8, &(0x7f0000000900)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000400)='bonsla\x80K\xca\x00\x80\x00\x00\xe3\n\x00') r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000500]}, 0x0, 0x0, 0x3, 0x3}, 0x20) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$selinux_attr(r2, &(0x7f0000000000)='system_u:object_r:v4l_device_t:s0\x00', 0x22) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffc9a) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:30:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x47e, 0x16, 0x8, 0x4, "8deb3a17b4c3b6e51dcedd2e462705c6906fb5b8c3d6450b258c8d4e511e5e92"}) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x810, r1, 0x80000000) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) 08:30:33 executing program 0 (fault-call:0 fault-nth:4): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 307.062798] FAULT_INJECTION: forcing a failure. [ 307.062798] name failslab, interval 1, probability 0, space 0, times 0 [ 307.074184] CPU: 0 PID: 11127 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 307.081431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.090827] Call Trace: [ 307.093499] dump_stack+0x173/0x1d0 [ 307.097224] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.102473] should_fail+0xa19/0xb20 [ 307.106270] __should_failslab+0x278/0x2a0 [ 307.110570] should_failslab+0x29/0x70 [ 307.114535] kmem_cache_alloc_trace+0x125/0xb40 [ 307.119266] ? mon_bin_open+0x2fd/0xb20 [ 307.123303] mon_bin_open+0x2fd/0xb20 [ 307.127164] ? chrdev_open+0x6fa/0xe00 [ 307.131524] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.136766] ? mon_bin_mmap+0x230/0x230 [ 307.140799] chrdev_open+0xc5b/0xe00 [ 307.144603] ? cd_forget+0x320/0x320 [ 307.148388] do_dentry_open+0xf4f/0x1750 [ 307.152528] vfs_open+0xaf/0xe0 [ 307.155864] path_openat+0x185b/0x6b90 [ 307.159851] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.165120] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.170382] do_filp_open+0x2b8/0x710 [ 307.174282] do_sys_open+0x642/0xa30 [ 307.178072] __se_sys_open+0xad/0xc0 [ 307.181850] __x64_sys_open+0x4a/0x70 [ 307.185709] do_syscall_64+0xbc/0xf0 [ 307.189515] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.194752] RIP: 0033:0x411f11 08:30:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x68a80, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000080)=""/94) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x3) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[0xfdbc, 0x2890, 0x5, 0x7]}) [ 307.198013] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 307.216963] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 307.224728] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 307.232052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 307.239356] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 307.246678] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 307.253983] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 [ 307.267347] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure 08:30:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f00000001c0)={r4, r5, 0x6}) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) 08:30:33 executing program 0 (fault-call:0 fault-nth:5): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1e, &(0x7f0000000040)={@mcast2}, 0x1) [ 307.645303] FAULT_INJECTION: forcing a failure. [ 307.645303] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 307.657622] CPU: 0 PID: 11143 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 307.664873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.674274] Call Trace: [ 307.676943] dump_stack+0x173/0x1d0 [ 307.680662] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.685947] should_fail+0xa19/0xb20 [ 307.689763] should_fail_alloc_page+0x212/0x290 [ 307.694565] __alloc_pages_nodemask+0x4a2/0x5e30 [ 307.699415] ? __msan_poison_alloca+0x1f0/0x2a0 [ 307.704202] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.709504] alloc_pages_current+0x69d/0x9b0 [ 307.713984] ? mon_bin_open+0x2fd/0xb20 [ 307.718033] get_zeroed_page+0x47/0xd0 [ 307.721981] mon_bin_open+0x43d/0xb20 [ 307.725855] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.731103] ? mon_bin_mmap+0x230/0x230 [ 307.735140] chrdev_open+0xc5b/0xe00 [ 307.738920] ? cd_forget+0x320/0x320 [ 307.742690] do_dentry_open+0xf4f/0x1750 [ 307.746822] vfs_open+0xaf/0xe0 [ 307.750166] path_openat+0x185b/0x6b90 [ 307.754145] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.759431] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 307.764968] do_filp_open+0x2b8/0x710 [ 307.768869] do_sys_open+0x642/0xa30 [ 307.772659] __se_sys_open+0xad/0xc0 [ 307.776440] __x64_sys_open+0x4a/0x70 [ 307.780307] do_syscall_64+0xbc/0xf0 [ 307.784090] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.789329] RIP: 0033:0x411f11 [ 307.792604] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 307.811580] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 307.819353] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 307.826694] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 307.834010] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 08:30:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x100, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000140)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x1, 0x3, 0x1, {0xa, 0x4e21, 0x0, @local, 0x264}}}, {&(0x7f0000000080)=""/83, 0x53}, &(0x7f0000000100)}, 0xa0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000200)) [ 307.841333] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 307.848658] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:34 executing program 0 (fault-call:0 fault-nth:6): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:34 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400080) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0xff, 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000100)={@remote, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@mcast1, 0x6c, r1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 308.135194] FAULT_INJECTION: forcing a failure. [ 308.135194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.147065] CPU: 1 PID: 11156 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 308.154271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.163648] Call Trace: [ 308.166274] dump_stack+0x173/0x1d0 [ 308.169946] should_fail+0xa19/0xb20 [ 308.173717] should_fail_alloc_page+0x212/0x290 [ 308.178435] __alloc_pages_nodemask+0x4a2/0x5e30 [ 308.183253] ? rmqueue+0xbb/0x1340 [ 308.186846] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.192087] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.197365] kmsan_internal_alloc_meta_for_pages+0x80/0x580 [ 308.203142] kmsan_alloc_page+0x7e/0x100 [ 308.207256] __alloc_pages_nodemask+0x137b/0x5e30 [ 308.212148] ? __msan_poison_alloca+0x1f0/0x2a0 [ 308.216936] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.222189] alloc_pages_current+0x69d/0x9b0 [ 308.226644] ? mon_bin_open+0x2fd/0xb20 [ 308.230684] get_zeroed_page+0x47/0xd0 08:30:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x6000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000100)={0x0, 0x5, 0x20, [], &(0x7f00000000c0)=0x8000}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000140)=0xfff) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) [ 308.234610] mon_bin_open+0x43d/0xb20 [ 308.238468] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.243713] ? mon_bin_mmap+0x230/0x230 [ 308.247726] chrdev_open+0xc5b/0xe00 [ 308.251545] ? cd_forget+0x320/0x320 [ 308.255728] do_dentry_open+0xf4f/0x1750 [ 308.260363] vfs_open+0xaf/0xe0 [ 308.263694] path_openat+0x185b/0x6b90 [ 308.267668] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.272926] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.278161] do_filp_open+0x2b8/0x710 [ 308.282083] do_sys_open+0x642/0xa30 [ 308.285865] __se_sys_open+0xad/0xc0 [ 308.289626] __x64_sys_open+0x4a/0x70 [ 308.293463] do_syscall_64+0xbc/0xf0 [ 308.297225] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 308.302448] RIP: 0033:0x411f11 [ 308.305666] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 308.324597] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 308.332342] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 308.339658] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 308.346973] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 308.354284] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 308.361582] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1c5, 0x400) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000080)={{0x3, @name="0b7f233cf6088a5ec33956a353b7e6a4232ee12bca2b2adffc15977fe8eb5615"}, 0x8, 0x6, 0x8}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:34 executing program 0 (fault-call:0 fault-nth:7): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 308.584265] FAULT_INJECTION: forcing a failure. [ 308.584265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.596171] CPU: 0 PID: 11171 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 308.603387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.612767] Call Trace: [ 308.615406] dump_stack+0x173/0x1d0 [ 308.619075] should_fail+0xa19/0xb20 [ 308.622850] should_fail_alloc_page+0x212/0x290 [ 308.627568] __alloc_pages_nodemask+0x4a2/0x5e30 [ 308.632399] ? rmqueue+0xbb/0x1340 [ 308.635988] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.641275] kmsan_internal_alloc_meta_for_pages+0xf2/0x580 [ 308.647037] kmsan_alloc_page+0x7e/0x100 [ 308.651150] __alloc_pages_nodemask+0x137b/0x5e30 [ 308.656041] ? __msan_poison_alloca+0x1f0/0x2a0 [ 308.660823] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.666067] alloc_pages_current+0x69d/0x9b0 [ 308.670523] ? mon_bin_open+0x2fd/0xb20 [ 308.674557] get_zeroed_page+0x47/0xd0 [ 308.678497] mon_bin_open+0x43d/0xb20 [ 308.682350] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.687590] ? mon_bin_mmap+0x230/0x230 [ 308.691600] chrdev_open+0xc5b/0xe00 [ 308.695364] ? cd_forget+0x320/0x320 [ 308.699171] do_dentry_open+0xf4f/0x1750 [ 308.703306] vfs_open+0xaf/0xe0 [ 308.706627] path_openat+0x185b/0x6b90 [ 308.710606] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.715853] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 308.721085] do_filp_open+0x2b8/0x710 [ 308.724981] do_sys_open+0x642/0xa30 [ 308.728760] __se_sys_open+0xad/0xc0 [ 308.732527] __x64_sys_open+0x4a/0x70 [ 308.736361] do_syscall_64+0xbc/0xf0 [ 308.740131] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 308.745351] RIP: 0033:0x411f11 [ 308.748593] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 308.767529] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 308.775285] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 08:30:34 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x20000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0x101, 0x1000}}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='/dev/adsp#\x00') r1 = socket$unix(0x1, 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x2) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000100)={{0x7f, 0x1f}, 'port1\x00', 0x1, 0x22, 0x3, 0x92, 0x4, 0x3, 0x5, 0x0, 0x3}) socket$unix(0x1, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000001c0)={'IDLETIMER\x00'}, &(0x7f0000000200)=0x1e) mlockall(0x4) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000240)={0x8001}, 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x8}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000300)=@sack_info={r2, 0xfffffffffffffff7, 0x3f}, 0xc) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000380)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) setfsuid(r3) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000440)=0x7) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000480)=0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0x50, &(0x7f00000004c0)}, 0x10) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000580)=0x7) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000005c0)={0x1f, 0x101}) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r5, &(0x7f0000000640), &(0x7f00000006c0)=0x6e, 0x80000) bind(r1, &(0x7f0000000700)=@in6={0xa, 0x4e20, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}, 0x80) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000780)=""/67, &(0x7f0000000800)=0x43) fgetxattr(r4, &(0x7f0000000840)=@random={'btrfs.', 'wlan1(,\x00'}, &(0x7f0000000880)=""/235, 0xeb) ioctl$CAPI_NCCI_GETUNIT(r4, 0x80044327, &(0x7f0000000980)=0x51d4) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000009c0)={0x1, 0x0, [{}]}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f0000000b40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x4c, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040}, 0x4000) [ 308.782586] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 308.789873] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 308.797162] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 308.804492] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x141000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000000)={@mcast1, r2}, 0x4) 08:30:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000b1d000)='.', 0x2) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8040, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e23, @local}, {0x2, 0x4e21, @multicast1}, 0x120, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)='yam0\x00', 0x3, 0x1, 0x10001}) creat(&(0x7f0000000240)='./file0\x00', 0x0) 08:30:35 executing program 0 (fault-call:0 fault-nth:8): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 309.061712] kauditd_printk_skb: 3 callbacks suppressed [ 309.067297] audit: type=1804 audit(1551774635.117:31): pid=11176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="ramfs" ino=27019 res=1 [ 309.090412] FAULT_INJECTION: forcing a failure. [ 309.090412] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.102502] CPU: 0 PID: 11180 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 309.109740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.119145] Call Trace: [ 309.121823] dump_stack+0x173/0x1d0 [ 309.125549] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.131195] should_fail+0xa19/0xb20 [ 309.135004] should_fail_alloc_page+0x212/0x290 [ 309.139768] __alloc_pages_nodemask+0x4a2/0x5e30 [ 309.144613] ? __msan_poison_alloca+0x1f0/0x2a0 [ 309.149415] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.154720] alloc_pages_current+0x69d/0x9b0 [ 309.159199] ? mon_bin_open+0x2fd/0xb20 [ 309.163255] get_zeroed_page+0x47/0xd0 [ 309.167217] mon_bin_open+0x43d/0xb20 [ 309.170838] audit: type=1804 audit(1551774635.167:32): pid=11182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="ramfs" ino=27019 res=1 [ 309.171113] ? mon_bin_mmap+0x230/0x230 [ 309.194418] chrdev_open+0xc5b/0xe00 [ 309.198223] ? cd_forget+0x320/0x320 [ 309.202059] do_dentry_open+0xf4f/0x1750 [ 309.206318] vfs_open+0xaf/0xe0 [ 309.209704] path_openat+0x185b/0x6b90 [ 309.213706] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.218997] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.224255] do_filp_open+0x2b8/0x710 [ 309.228140] do_sys_open+0x642/0xa30 [ 309.231936] __se_sys_open+0xad/0xc0 [ 309.235720] __x64_sys_open+0x4a/0x70 [ 309.239576] do_syscall_64+0xbc/0xf0 [ 309.243379] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 309.248631] RIP: 0033:0x411f11 [ 309.251879] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 309.270838] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 309.278685] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 309.286049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 309.293364] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 309.300691] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 309.308012] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:35 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getown(r0, 0x9) [ 309.337653] QAT: Invalid ioctl [ 309.355957] QAT: Invalid ioctl 08:30:35 executing program 0 (fault-call:0 fault-nth:9): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 309.593639] FAULT_INJECTION: forcing a failure. [ 309.593639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.605548] CPU: 1 PID: 11191 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 309.612748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.622108] Call Trace: [ 309.624727] dump_stack+0x173/0x1d0 [ 309.628397] should_fail+0xa19/0xb20 [ 309.632158] should_fail_alloc_page+0x212/0x290 [ 309.636859] __alloc_pages_nodemask+0x4a2/0x5e30 [ 309.641668] ? rmqueue+0xbb/0x1340 [ 309.645250] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.650480] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.655739] kmsan_internal_alloc_meta_for_pages+0x80/0x580 [ 309.661487] kmsan_alloc_page+0x7e/0x100 [ 309.665584] __alloc_pages_nodemask+0x137b/0x5e30 [ 309.670468] ? __msan_poison_alloca+0x1f0/0x2a0 [ 309.675237] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.680465] alloc_pages_current+0x69d/0x9b0 [ 309.684895] ? mon_bin_open+0x2fd/0xb20 [ 309.688910] get_zeroed_page+0x47/0xd0 [ 309.692824] mon_bin_open+0x43d/0xb20 [ 309.696665] ? mon_bin_mmap+0x230/0x230 [ 309.700662] chrdev_open+0xc5b/0xe00 [ 309.704430] ? cd_forget+0x320/0x320 [ 309.708179] do_dentry_open+0xf4f/0x1750 [ 309.712293] vfs_open+0xaf/0xe0 [ 309.715602] path_openat+0x185b/0x6b90 [ 309.719573] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.724822] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 309.730051] do_filp_open+0x2b8/0x710 [ 309.733923] do_sys_open+0x642/0xa30 [ 309.737690] __se_sys_open+0xad/0xc0 [ 309.741446] __x64_sys_open+0x4a/0x70 [ 309.745279] do_syscall_64+0xbc/0xf0 [ 309.749024] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 309.754234] RIP: 0033:0x411f11 [ 309.757444] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 309.763508] IPVS: ftp: loaded support on port[0] = 21 [ 309.776354] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 08:30:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0x2000) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40808001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x9, 0xffff, 0xfff, 0x4}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) [ 309.776389] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 309.776403] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 309.776427] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 309.776441] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 309.776488] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:36 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xa0}}, 0x0) 08:30:36 executing program 1: timer_create(0x4, &(0x7f0000000140)={0x0, 0x37, 0x2, @thr={&(0x7f0000000040)="b8c78192c14e5e14625ede9c433bfa464d530263b90298a595aa3cb875b683db2e3ed42f2009bc347d0f86b6fc6260cbae8066adcde5bee5f3bae00f97ca497dd975903cdfa355dadf1e336e03658a2373de3c0cdabd12c9b191deeae8ac1844b83e1c39e2d14850aab4183f59bbda886d76ca8c", &(0x7f00000000c0)="9aaeb5342c9e006f9db8ccc2104e13ae3086492b8e3ddefd3cc8f8225baf8b183f4ffc9de75f46ab08cfd173e4a8900839ca5036583781c27dbcc5a0ec4181dcda"}}, &(0x7f0000000180)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000440)={0x3, 0xffffffffffffffff, 0x1}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000480)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x200, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) fstatfs(r1, &(0x7f00000003c0)=""/92) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x2, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x4000, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000200)) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 310.083727] chnl_net:caif_netlink_parms(): no params data found 08:30:36 executing program 0 (fault-call:0 fault-nth:10): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 310.268712] FAULT_INJECTION: forcing a failure. [ 310.268712] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 310.280596] CPU: 0 PID: 11208 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 310.287792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.297414] Call Trace: [ 310.300032] dump_stack+0x173/0x1d0 [ 310.303695] should_fail+0xa19/0xb20 [ 310.303968] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.307450] should_fail_alloc_page+0x212/0x290 [ 310.313947] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.318431] __alloc_pages_nodemask+0x4a2/0x5e30 [ 310.326916] device bridge_slave_0 entered promiscuous mode [ 310.329517] ? rmqueue+0xbb/0x1340 [ 310.338683] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 310.343953] kmsan_internal_alloc_meta_for_pages+0xf2/0x580 [ 310.349707] kmsan_alloc_page+0x7e/0x100 [ 310.353791] __alloc_pages_nodemask+0x137b/0x5e30 [ 310.358770] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 310.363358] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.363984] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 310.370448] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.375759] ? ___slab_alloc+0x1ba1/0x2060 [ 310.375823] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 310.375853] alloc_pages_current+0x69d/0x9b0 [ 310.384225] device bridge_slave_1 entered promiscuous mode [ 310.386412] ? mon_bin_open+0x2fd/0xb20 [ 310.405608] get_zeroed_page+0x47/0xd0 [ 310.409545] mon_bin_open+0x43d/0xb20 [ 310.413398] ? mon_bin_mmap+0x230/0x230 [ 310.417404] chrdev_open+0xc5b/0xe00 [ 310.420648] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 310.421180] ? cd_forget+0x320/0x320 [ 310.432421] do_dentry_open+0xf4f/0x1750 [ 310.433056] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 310.436530] vfs_open+0xaf/0xe0 [ 310.447320] path_openat+0x185b/0x6b90 [ 310.451288] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 310.456536] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 310.461756] do_filp_open+0x2b8/0x710 [ 310.465633] do_sys_open+0x642/0xa30 [ 310.467500] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 310.469397] __se_sys_open+0xad/0xc0 [ 310.478107] team0: Port device team_slave_0 added [ 310.479766] __x64_sys_open+0x4a/0x70 [ 310.487111] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 310.488413] do_syscall_64+0xbc/0xf0 [ 310.497131] team0: Port device team_slave_1 added [ 310.498796] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 310.505736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 310.508813] RIP: 0033:0x411f11 [ 310.517346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 310.518843] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 310.544567] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 310.552288] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 310.559565] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 08:30:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000200)={0x5, @pix_mp}) ioctl$NBD_DO_IT(r0, 0xab03) 08:30:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@initdev, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@ipv4={[], [], @multicast2}, r1}, 0x14) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000100)) [ 310.566841] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 310.574119] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 310.581401] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 [ 310.619616] device hsr_slave_0 entered promiscuous mode [ 310.665835] device hsr_slave_1 entered promiscuous mode [ 310.705705] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 310.737406] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 310.792069] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.798639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.805860] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.812453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.940612] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 310.947392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.979725] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 310.995538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 311.006254] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.016702] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.028359] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 311.050860] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 311.057197] 8021q: adding VLAN 0 to HW filter on device team0 [ 311.074318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 311.081510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.090390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.098828] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.105456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.122725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 311.136250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 311.149707] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 311.160044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.169040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.177517] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.184060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.191899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 311.201196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 311.225231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 311.234641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 311.245967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.265261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 311.275456] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 311.283788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 311.293259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.310327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 311.323763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 311.332696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 311.341132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.349699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 311.358293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.371834] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 311.377921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 311.407021] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 311.426690] 8021q: adding VLAN 0 to HW filter on device batadv0 08:30:37 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x200100, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000002c0)=0x7) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x9, 0x2000000000}, 'port0\x00', 0x40, 0x80000, 0x1, 0x1, 0x362, 0x81, 0x5f9, 0x0, 0x3, 0xd5c}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="070002001200010100238cdc583a2fa1aae82f2c475d74140000000000000000000898bfd1e41a05900400000069a223552d93cef948394b795e91fbbfa592efa194f2e94356c358a2c114e3bdfc6a16408ecadb7dbe847b421d9ff91853688281d998230a5db4f5a4c34d3fdf78986cbf2d12c8d7da3351e7bb7ab0bc2a8dbcc011ea1c77a5637552223f5b5af336e24f33f0810ccaf88330c722dc41060c0639040138c7ce089fd58f9766c6b47258a485de57997ae8d243b910f85aed695816ac5ef177cb1e5c74528b20f8"], 0x2d, 0x1) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r1, 0x20, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x800}}, [""]}, 0x24}}, 0x4004000) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/186, 0x305) utime(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x7f, 0xfffffffffffffffd}) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000500)) getdents(r0, &(0x7f0000000000)=""/2, 0x2) getdents64(r2, 0x0, 0x81cd53d) 08:30:37 executing program 0 (fault-call:0 fault-nth:11): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r1 = shmget$private(0x0, 0x2000, 0x83564ea96e569c70, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x416001, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000200)=0x1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000240)={0xa66c, 0x6, 0x2}) poll(0x0, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000380)={{0x2, 0x4e24, @remote}, {0x6, @local}, 0x10, {0x2, 0x4e23, @broadcast}, 'bond0\x00'}) write(r0, &(0x7f0000000280)="d6142db74909944079672b1693077a1dde98fc7308db4b5cf398318fde6f77935fe96496648840d4806ab8b8a3d0d1", 0x2f) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000400)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @mss, @window, @sack_perm], 0x20000000000001f4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) ioctl$VT_DISALLOCATE(r2, 0x5608) shutdown(r0, 0x2) 08:30:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x21}, 0x71}}, 0x0, 0x7, 0x0, "02c23f4488e30add97444cf4bec51318c377001d02e0ff514e6d38a3fa10e5812879bb0089114aa69aadccce72a54cedac74c2967e7005d99b8d915e60afc5dea06de1c22f3c9e55735de35efac88c53"}, 0xd8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 311.648676] FAULT_INJECTION: forcing a failure. [ 311.648676] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 311.660851] CPU: 0 PID: 11227 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 311.668082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.677472] Call Trace: [ 311.680134] dump_stack+0x173/0x1d0 [ 311.683824] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.689077] should_fail+0xa19/0xb20 [ 311.692872] should_fail_alloc_page+0x212/0x290 [ 311.697610] __alloc_pages_nodemask+0x4a2/0x5e30 [ 311.702447] ? __msan_poison_alloca+0x1f0/0x2a0 [ 311.707229] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.712494] alloc_pages_current+0x69d/0x9b0 [ 311.716956] ? mon_bin_open+0x2fd/0xb20 [ 311.721000] get_zeroed_page+0x47/0xd0 [ 311.724946] mon_bin_open+0x43d/0xb20 [ 311.728811] ? mon_bin_mmap+0x230/0x230 [ 311.732838] chrdev_open+0xc5b/0xe00 [ 311.736614] ? cd_forget+0x320/0x320 [ 311.740394] do_dentry_open+0xf4f/0x1750 [ 311.744530] vfs_open+0xaf/0xe0 [ 311.747866] path_openat+0x185b/0x6b90 [ 311.751849] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.757112] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.762359] do_filp_open+0x2b8/0x710 [ 311.766263] do_sys_open+0x642/0xa30 [ 311.770059] __se_sys_open+0xad/0xc0 [ 311.773839] __x64_sys_open+0x4a/0x70 [ 311.777698] do_syscall_64+0xbc/0xf0 [ 311.781495] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.786731] RIP: 0033:0x411f11 [ 311.789976] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 311.808926] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 311.816690] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 311.823995] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 311.831303] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 311.838609] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 08:30:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000200)={0x6, @output={0x1000, 0x1, {0xffff, 0x10000}, 0x95, 0x8}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$eventfd(r0, &(0x7f0000000080), 0xff97) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x80000, 0x0) [ 311.845914] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:38 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x25) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_team\x00', r1}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:38 executing program 0 (fault-call:0 fault-nth:12): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 312.127748] FAULT_INJECTION: forcing a failure. [ 312.127748] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.140099] CPU: 0 PID: 11243 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 312.147290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.156655] Call Trace: [ 312.159269] dump_stack+0x173/0x1d0 [ 312.162930] should_fail+0xa19/0xb20 [ 312.166696] should_fail_alloc_page+0x212/0x290 [ 312.171404] __alloc_pages_nodemask+0x4a2/0x5e30 [ 312.176208] ? rmqueue+0xbb/0x1340 [ 312.179782] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.185007] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.190617] kmsan_internal_alloc_meta_for_pages+0x80/0x580 [ 312.196376] kmsan_alloc_page+0x7e/0x100 [ 312.200477] __alloc_pages_nodemask+0x137b/0x5e30 [ 312.205362] ? __msan_poison_alloca+0x1f0/0x2a0 [ 312.210162] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.215395] alloc_pages_current+0x69d/0x9b0 [ 312.219824] ? mon_bin_open+0x2fd/0xb20 [ 312.223837] get_zeroed_page+0x47/0xd0 [ 312.227750] mon_bin_open+0x43d/0xb20 [ 312.231601] ? mon_bin_mmap+0x230/0x230 [ 312.235598] chrdev_open+0xc5b/0xe00 [ 312.239354] ? cd_forget+0x320/0x320 [ 312.243105] do_dentry_open+0xf4f/0x1750 [ 312.247222] vfs_open+0xaf/0xe0 [ 312.250532] path_openat+0x185b/0x6b90 [ 312.254519] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.259911] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.265116] do_filp_open+0x2b8/0x710 [ 312.268991] do_sys_open+0x642/0xa30 [ 312.272756] __se_sys_open+0xad/0xc0 [ 312.276506] __x64_sys_open+0x4a/0x70 [ 312.280343] do_syscall_64+0xbc/0xf0 [ 312.284094] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 312.289297] RIP: 0033:0x411f11 [ 312.292510] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 312.311434] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 312.319165] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 08:30:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r1 = shmget$private(0x0, 0x2000, 0x83564ea96e569c70, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x416001, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000200)=0x1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000240)={0xa66c, 0x6, 0x2}) poll(0x0, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000380)={{0x2, 0x4e24, @remote}, {0x6, @local}, 0x10, {0x2, 0x4e23, @broadcast}, 'bond0\x00'}) write(r0, &(0x7f0000000280)="d6142db74909944079672b1693077a1dde98fc7308db4b5cf398318fde6f77935fe96496648840d4806ab8b8a3d0d1", 0x2f) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000400)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @mss, @window, @sack_perm], 0x20000000000001f4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) ioctl$VT_DISALLOCATE(r2, 0x5608) shutdown(r0, 0x2) 08:30:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r1}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 312.326444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 312.333734] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 312.341028] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 312.348306] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:38 executing program 2: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000240)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = msgget$private(0x0, 0x20) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)=""/9) listen(r0, 0x5) setsockopt$sock_int(r0, 0x1, 0x3d, &(0x7f0000000000), 0x4) 08:30:38 executing program 0 (fault-call:0 fault-nth:13): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:38 executing program 3: socketpair(0xd, 0x7, 0xfffffffffffffffb, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)="e6ca6594294752a575e44893c0d3eb3f46e075297c138610b67266c2fffb3fad4a26510bdb68569fff0f1a65e2405ce003578959f7610a8d9a9384801137a1a206a733be12999c315893637a202ec19d5fc8f868a859b269070b5eed294079818ad64f914d0a4925859c83e3fb8fdd42730474b5c4b907aed6338e44c5767267c9eaf1d02d431ae804f5648ee54fc4b85b69cc2d18823562754a2b4086404f6af45e3d8b50f3a53fbdefaf4ce6e811b568268fed9de38883333d5ee3e8ec541f0387085749fb", 0xc6) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x74, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d9652b00140600fe8064000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5010000090780000"], 0x0) 08:30:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) [ 312.737048] FAULT_INJECTION: forcing a failure. [ 312.737048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.748910] CPU: 0 PID: 11257 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 312.756116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.765495] Call Trace: [ 312.768111] dump_stack+0x173/0x1d0 [ 312.771766] should_fail+0xa19/0xb20 [ 312.775538] should_fail_alloc_page+0x212/0x290 [ 312.780239] __alloc_pages_nodemask+0x4a2/0x5e30 [ 312.785045] ? rmqueue+0xbb/0x1340 [ 312.788969] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.794251] kmsan_internal_alloc_meta_for_pages+0xf2/0x580 [ 312.800000] kmsan_alloc_page+0x7e/0x100 [ 312.804094] __alloc_pages_nodemask+0x137b/0x5e30 [ 312.808975] ? __msan_poison_alloca+0x1f0/0x2a0 [ 312.813756] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.818992] alloc_pages_current+0x69d/0x9b0 [ 312.823419] ? mon_bin_open+0x2fd/0xb20 [ 312.827440] get_zeroed_page+0x47/0xd0 [ 312.831356] mon_bin_open+0x43d/0xb20 [ 312.835220] ? mon_bin_mmap+0x230/0x230 [ 312.839216] chrdev_open+0xc5b/0xe00 [ 312.842967] ? cd_forget+0x320/0x320 [ 312.846709] do_dentry_open+0xf4f/0x1750 [ 312.850823] vfs_open+0xaf/0xe0 [ 312.854127] path_openat+0x185b/0x6b90 [ 312.858088] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.860752] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 312.863326] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 312.863358] do_filp_open+0x2b8/0x710 [ 312.863453] do_sys_open+0x642/0xa30 [ 312.893696] __se_sys_open+0xad/0xc0 [ 312.897443] __x64_sys_open+0x4a/0x70 [ 312.901273] do_syscall_64+0xbc/0xf0 [ 312.905012] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 312.910214] RIP: 0033:0x411f11 [ 312.913425] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 08:30:39 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSETLED(r0, 0x4b32, 0x100000000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0)=r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="0a456b0001c3abb740c8d6696e00000000000600d3020200"], &(0x7f0000000200)=0x18) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0xffffffffffffffff, {{0xa, 0x4e24, 0x1, @remote, 0x1000}}}, 0x88) capset(&(0x7f0000000000)={0x20080522, r2}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mq_getsetattr(r3, &(0x7f0000000240)={0x0, 0x9, 0x8000, 0x7, 0x20, 0x7fff, 0x100000000, 0x8}, &(0x7f0000000280)) pread64(r3, &(0x7f0000000440)=""/38, 0x26, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) bind$packet(r0, &(0x7f0000000400)={0x11, 0xf6, r4, 0x1, 0x0, 0x6, @random="931e403f75c3"}, 0x14) [ 312.932339] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 312.940071] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 312.947351] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 312.954641] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 312.961924] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 312.969203] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) mkdir(&(0x7f0000000040)='./file0\x00', 0x11) 08:30:39 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xcc, 0xa38fd23b19a3609d) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f0000000080)={{0x7fffffff, 0xa}, {}, 0xfdfdffff}) 08:30:39 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\xbc\xf6', 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) lseek(r0, 0x0, 0x1000000000004) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x208000, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) 08:30:39 executing program 0 (fault-call:0 fault-nth:14): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 313.466082] FAULT_INJECTION: forcing a failure. [ 313.466082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.478149] CPU: 1 PID: 11283 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 313.485390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.494778] Call Trace: [ 313.497448] dump_stack+0x173/0x1d0 [ 313.501138] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 313.506395] should_fail+0xa19/0xb20 [ 313.510194] should_fail_alloc_page+0x212/0x290 [ 313.514932] __alloc_pages_nodemask+0x4a2/0x5e30 [ 313.519767] ? __msan_poison_alloca+0x1f0/0x2a0 [ 313.524540] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 313.529796] alloc_pages_current+0x69d/0x9b0 [ 313.534273] ? mon_bin_open+0x2fd/0xb20 [ 313.538339] get_zeroed_page+0x47/0xd0 [ 313.542309] mon_bin_open+0x43d/0xb20 [ 313.546173] ? mon_bin_mmap+0x230/0x230 [ 313.550204] chrdev_open+0xc5b/0xe00 [ 313.553996] ? cd_forget+0x320/0x320 [ 313.557770] do_dentry_open+0xf4f/0x1750 [ 313.561902] vfs_open+0xaf/0xe0 [ 313.565237] path_openat+0x185b/0x6b90 [ 313.569220] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 313.574481] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 313.579726] do_filp_open+0x2b8/0x710 [ 313.583614] do_sys_open+0x642/0xa30 [ 313.587409] __se_sys_open+0xad/0xc0 [ 313.591183] __x64_sys_open+0x4a/0x70 [ 313.595044] do_syscall_64+0xbc/0xf0 [ 313.598839] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.604068] RIP: 0033:0x411f11 [ 313.607313] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 313.626270] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 313.634035] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 313.641345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 313.648657] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 313.655964] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 08:30:39 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbfb, 0x10000000}, 0xc) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x7, [0x7ff, 0x769, 0x0, 0x4, 0x0, 0x200, 0x0, 0x6, 0x2, 0x4, 0x50, 0x790, 0x9, 0x3, 0x3, 0x200, 0x9, 0x3, 0x8, 0x101, 0x7, 0xdc4d, 0x10001, 0x1ff, 0x0, 0x7, 0xe3, 0x20, 0x1000, 0x101, 0x6, 0x1f, 0x1, 0x1, 0x4, 0x20, 0x6, 0x10001, 0x8, 0x8001, 0x4, 0x9, 0x6, 0x3ff, 0x9, 0x4, 0x0, 0x3], 0xe}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@mcast1, @ipv4={[], [], @rand_addr=0x8}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3ff, 0xdba, 0xffffffffffffffff, 0x500, 0x800, 0x40000002, r2}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000200)=0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x180000000) move_pages(r3, 0x3, &(0x7f0000000100)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000140)=[0x0, 0x7, 0x7, 0x1000, 0x1000], &(0x7f0000000180)=[0x0, 0x0], 0x4) 08:30:39 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000380)='/dev/capi20\x00', 0x0, 0x0) unshare(0x2000400) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0x7f, 0x6}) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000080)) [ 313.663278] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:39 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x40) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x1) r1 = userfaultfd(0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000000c0)=0x3) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f0000000080)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}}) 08:30:39 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000000)=['Leth1\x81-)\x00'], 0x9, [], [0x5, 0x1]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e24, 0x100, @local, 0x7fffffff}, {0xa, 0x4e21, 0x3, @mcast2, 0x2}, 0x10000, [0x0, 0x1000000000000, 0xf6af, 0x0, 0x0, 0x2, 0x9, 0x8]}, 0x5c) 08:30:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@local, @in6}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@initdev, @broadcast, 0x0}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@rand_addr="8a4544464873768fd785ece594c34ab3", r1}, 0x14) 08:30:40 executing program 3: socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xc) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 314.045206] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 08:30:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) getsockopt$inet6_buf(r0, 0x29, 0x3b, &(0x7f00000000c0)=""/126, &(0x7f0000000140)=0x7e) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:40 executing program 0 (fault-call:0 fault-nth:15): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000001140)={'vxcan1\x00', @ifru_names='syzkaller0\x00'}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000280)={@remote, r2}, 0x14) [ 314.303872] FAULT_INJECTION: forcing a failure. [ 314.303872] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.315735] CPU: 1 PID: 11316 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 314.322935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.332297] Call Trace: [ 314.334921] dump_stack+0x173/0x1d0 [ 314.338589] should_fail+0xa19/0xb20 [ 314.342357] should_fail_alloc_page+0x212/0x290 [ 314.347068] __alloc_pages_nodemask+0x4a2/0x5e30 [ 314.351874] ? rmqueue+0xbb/0x1340 [ 314.355454] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.360686] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.365943] kmsan_internal_alloc_meta_for_pages+0x80/0x580 [ 314.371896] kmsan_alloc_page+0x7e/0x100 [ 314.376010] __alloc_pages_nodemask+0x137b/0x5e30 [ 314.380889] ? __msan_poison_alloca+0x1f0/0x2a0 [ 314.385655] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.390876] alloc_pages_current+0x69d/0x9b0 [ 314.395308] ? mon_bin_open+0x2fd/0xb20 [ 314.399317] get_zeroed_page+0x47/0xd0 [ 314.403231] mon_bin_open+0x43d/0xb20 [ 314.407074] ? mon_bin_mmap+0x230/0x230 [ 314.411067] chrdev_open+0xc5b/0xe00 [ 314.414817] ? cd_forget+0x320/0x320 [ 314.418554] do_dentry_open+0xf4f/0x1750 [ 314.422669] vfs_open+0xaf/0xe0 [ 314.425971] path_openat+0x185b/0x6b90 [ 314.429945] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.435183] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.440413] do_filp_open+0x2b8/0x710 [ 314.444287] do_sys_open+0x642/0xa30 [ 314.448059] __se_sys_open+0xad/0xc0 [ 314.451806] __x64_sys_open+0x4a/0x70 [ 314.455635] do_syscall_64+0xbc/0xf0 [ 314.459391] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.464624] RIP: 0033:0x411f11 [ 314.467840] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 314.486755] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 314.494478] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 314.501759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 314.509043] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 314.516325] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 314.523605] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, &(0x7f0000000280)=@tipc=@name, &(0x7f00000001c0)=0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @rand_addr=0x6}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e22, @remote}], 0x50) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x7fffe) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, [], [{0x8, 0x80, 0x80000001, 0x7, 0x3, 0x1f}, {0x39, 0x3, 0x1000, 0x2, 0x3}], [[]]}) accept4$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000000)={0x5, [0x5, 0x8001, 0x8001, 0x81, 0x3]}, &(0x7f0000000040)=0xe) 08:30:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x280000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="f4000000", @ANYRES16=r2, @ANYBLOB="010029bd7000fbdbdf250400000038000700080002000900000008000100040000000c00030009000000000000000800010005000000080001000700000008000200000000001c0006000800010000e0211a04000200040002000800010006000000200005001c0002000800020000fc0700080003001f00000008000100180000000c0009000829bd00080000000c00050008000100696200000c00090008000200008000004800010044000400200001000a004e2300eddec3fe8000000000000000000000000000aa03000000200002000a004e200000fffffe8000000000000000000000000000bb03000000"], 0xf4}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x154, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xdde6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x3, @mcast1, 0x7f}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x2, @rand_addr="dbc4fe2166b2f7f7aa3039b63c2017db", 0x6}}}}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x91a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb53}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x51}, 0x48000) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000004c0), 0x4) 08:30:40 executing program 0 (fault-call:0 fault-nth:16): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0xe3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000001200)=""/145, &(0x7f0000000040)=0x91) [ 314.920091] FAULT_INJECTION: forcing a failure. [ 314.920091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.931966] CPU: 0 PID: 11333 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 314.939168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.948539] Call Trace: [ 314.951163] dump_stack+0x173/0x1d0 [ 314.954826] should_fail+0xa19/0xb20 [ 314.958587] should_fail_alloc_page+0x212/0x290 [ 314.963292] __alloc_pages_nodemask+0x4a2/0x5e30 [ 314.968101] ? rmqueue+0xbb/0x1340 [ 314.971675] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.976949] kmsan_internal_alloc_meta_for_pages+0xf2/0x580 [ 314.982690] kmsan_alloc_page+0x7e/0x100 [ 314.986790] __alloc_pages_nodemask+0x137b/0x5e30 [ 314.991692] ? __msan_poison_alloca+0x1f0/0x2a0 [ 314.996499] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 315.001740] alloc_pages_current+0x69d/0x9b0 [ 315.006170] ? mon_bin_open+0x2fd/0xb20 [ 315.010184] get_zeroed_page+0x47/0xd0 [ 315.014100] mon_bin_open+0x43d/0xb20 [ 315.017951] ? mon_bin_mmap+0x230/0x230 [ 315.021949] chrdev_open+0xc5b/0xe00 [ 315.025705] ? cd_forget+0x320/0x320 [ 315.029444] do_dentry_open+0xf4f/0x1750 [ 315.033569] vfs_open+0xaf/0xe0 [ 315.036877] path_openat+0x185b/0x6b90 [ 315.040849] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 315.046088] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 315.051309] do_filp_open+0x2b8/0x710 [ 315.055187] do_sys_open+0x642/0xa30 [ 315.058959] __se_sys_open+0xad/0xc0 [ 315.062703] __x64_sys_open+0x4a/0x70 [ 315.066543] do_syscall_64+0xbc/0xf0 [ 315.070289] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.075502] RIP: 0033:0x411f11 [ 315.078711] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 315.097633] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 315.105378] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 315.112678] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 08:30:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) fcntl$setown(r0, 0x8, r2) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="9c", 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r4, r4}, &(0x7f00000000c0)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'md5-generic\x00'}}) recvmsg(r1, &(0x7f0000000240)={&(0x7f00000002c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000140)}, {&(0x7f0000000340)=""/164, 0xa4}, {&(0x7f0000000480)=""/198, 0xc6}, {&(0x7f0000000600)=""/108, 0x6c}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000700)=""/101, 0x65}, {&(0x7f0000000780)=""/124, 0x7c}, {&(0x7f0000000800)=""/200, 0xc8}], 0x8}, 0x100) r6 = add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r3, 0x4, r6) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000400)={@empty, r5}, 0x14) r7 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000980)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, r3, 0x8, 0x3, r7) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@loopback}, 0x14) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f0000000a40)=""/4096, &(0x7f0000001a40)=0x1000) 08:30:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = open(&(0x7f0000000100)='./file1\x00', 0x800, 0x10000000000085) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0xfffffffffffffff9, 0x7fff, 0x200, 0xfffffffffffff800, 0x10001}) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x5, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000000c0)=0xf8) r4 = fcntl$getown(r2, 0x9) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000380)={[], 0x10001, 0x8000, 0x3, 0x6, 0x6, r4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 315.119995] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 315.127288] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 315.134573] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x103, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080), 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x3, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x514}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000001c0)={r2, 0x9, 0x0, 0x6, 0x9, 0x4, 0x100000000, 0x31e, {r3, @in={{0x2, 0x4e23, @local}}, 0x5, 0xff, 0x0, 0x1000, 0x906}}, &(0x7f0000000280)=0xb0) ioctl$FICLONE(r0, 0x40049409, r0) 08:30:41 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="d81cac611aa0b8e5247a301b6b59f50430ef9d8086ca031dfffd946f610500070000001d9effffff000000421ba3a20400ff7e190000001100ffffba16a0aa1c090000000002001300000000", 0x4c}], 0x1, 0x0, 0x3ca}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000005c0)={0x9a0000, 0x5, 0xfffffffffffffff7, [], &(0x7f0000000580)={0xbb0bfb, 0x1, [], @p_u32=&(0x7f0000000540)=0xffffffffffffffff}}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/191, 0xbf}], 0x1, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000380)='./file0\x00', 0x40000020) openat$capi20(0xffffffffffffff9c, &(0x7f0000000200)='/dev/capi20\x00', 0x202000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000300)={r4, 0x3, 0x726}, &(0x7f0000000600)=ANY=[@ANYBLOB="656e633d6f61657020526173683d63726333324519a3f3e08cee9aebeb67c73bfd00000000080000000000000000000000000000000000000000000000000000000000000000fe1f47a93a0000000000000000000000000000000000"], &(0x7f00000003c0)="7149adb63461ebebdec08ed5a1c77bda38bb6433d3b8a10e0e6a592aba21b79489e0472bfb5e54ac15e566ba810e6aa5d2aee6a614c1df53ae64909fc2faa239f4917314a6758bbad9b21d0ae7ae15edb9d445b36be48ddc5422efd19ff74a42b5c5f9e0fd36", &(0x7f0000000440)=""/198) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = semget(0x2, 0x1, 0x2) semctl$SEM_STAT(r5, 0x1, 0x12, &(0x7f0000000680)=""/183) preadv(r0, &(0x7f00000017c0), 0x23f, 0x0) 08:30:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) poll(&(0x7f0000000040)=[{r0}], 0x20000000000000f7, 0x0) socket$inet6(0xa, 0x800, 0x1d443e) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xfa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10008020}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x84, r3, 0x808, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf58}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004}, 0x48004) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = request_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000003c0)={r4, 0x5e54, 0x4}, &(0x7f0000000400)={'enc=', 'raw', ' hash=', {'sm3\x00'}}, &(0x7f0000000480)="612c10c14e3b8d0d60aabea2108e2277ed7548949f83a5c9c0a2e4d46627a97e735a70a9731a303a4f84554cf32044dc8b9996e2806aefdebd7ed1438fe7d486ac39c18d5395b94cc6a2c8a73ac723c243c1afc4c3252423ccaacf1cefe1db6b828a944a1a50d716ead15132cc5ba754f21ea1783561953487f2e40bd8c2d6d499198982ba10807af565a0", &(0x7f0000000540)=""/99) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x0) 08:30:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc0006020}, 0xc, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="c8020000", @ANYRES16=r2, @ANYBLOB="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"], 0x2c8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) 08:30:41 executing program 0 (fault-call:0 fault-nth:17): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:41 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f00001ba000/0x4000)=nil, 0x4000, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0xab) 08:30:41 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000001c0)=""/187) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e21, 0x7fffffff, @remote, 0x2}}}, 0x90) shmctl$SHM_LOCK(r1, 0xb) shmat(r1, &(0x7f0000ffc000/0x1000)=nil, 0x4003) shmctl$SHM_LOCK(r1, 0xb) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0x68, r4, 0x828, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x1ff, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40090) socket$key(0xf, 0x3, 0x2) sendmsg$can_bcm(r2, &(0x7f0000000380)={&(0x7f0000000080), 0x10, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="0700000010000000ff000000000000008a577ab528ab0d654bc4c696383452638d80e235280f8c3c7383a4fb114d94fc7e0c85f9f51f10f1598895c2428e829021cff2ef9eeb699be163b3178d30a206fed729f5cb69bc93123fe70e8a2dc100aef31a657e9c68df8c1763420f05b798815ceded3b324d41d4c2612da59bc3d08daaf8fae80d65a9fbe8", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="010000c00100000000000040290300008de099ad5eb4dd03b79c60531ee483620701886231db990947d901841444e994567102d50ce7935412ed1388209096da085d3a3739739488511ffc5796bec6d8"], 0x80}, 0x1, 0x0, 0x0, 0xc000}, 0x50) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) shmctl$IPC_RMID(r1, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) [ 315.825263] FAULT_INJECTION: forcing a failure. [ 315.825263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.837262] CPU: 1 PID: 11367 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 315.844499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.853897] Call Trace: [ 315.856564] dump_stack+0x173/0x1d0 [ 315.860261] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 315.865511] should_fail+0xa19/0xb20 [ 315.869318] should_fail_alloc_page+0x212/0x290 [ 315.874065] __alloc_pages_nodemask+0x4a2/0x5e30 [ 315.878894] ? __msan_poison_alloca+0x1f0/0x2a0 [ 315.883674] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 315.888929] alloc_pages_current+0x69d/0x9b0 [ 315.893409] ? mon_bin_open+0x2fd/0xb20 [ 315.897458] get_zeroed_page+0x47/0xd0 [ 315.901410] mon_bin_open+0x43d/0xb20 [ 315.905278] ? mon_bin_mmap+0x230/0x230 [ 315.909315] chrdev_open+0xc5b/0xe00 [ 315.913104] ? cd_forget+0x320/0x320 [ 315.916870] do_dentry_open+0xf4f/0x1750 [ 315.921030] vfs_open+0xaf/0xe0 08:30:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 315.924375] path_openat+0x185b/0x6b90 [ 315.928384] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 315.933659] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 315.938905] do_filp_open+0x2b8/0x710 [ 315.942793] do_sys_open+0x642/0xa30 [ 315.946581] __se_sys_open+0xad/0xc0 [ 315.950357] __x64_sys_open+0x4a/0x70 [ 315.954246] do_syscall_64+0xbc/0xf0 [ 315.958064] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.963326] RIP: 0033:0x411f11 [ 315.966624] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 315.985621] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 315.993430] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 316.000811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 316.008141] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 316.015478] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 316.022843] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:42 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x40031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) 08:30:42 executing program 1: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000040)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_generic(r0, &(0x7f00000014c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001480)={&(0x7f0000000180)={0x12e0, 0x2a, 0x400, 0x70bd2a, 0x25dfdbfd, {0x13}, [@typed={0xec, 0x6f, @binary="e2e5585cec0adc6bb9084834a4fc4a95887ecd122aaf26933045c7d069c8097484190b6c7204f86f79341ccd7e4eb7ea1ddc08accaa992d5957b89287939f3f22b408b3c89792afc226072a2dc6038375341b7cccc79179efda33e70b57fd575705d64fc2d0e054d4627b338b9abb18e6fea59981155adad123bd5905d6d9425edec9485f480f34884562fc858bc052123b4c6974439433ed9609d183c120cc14b97300b812992417c9922aec567f2846f12731335263c45ea6fbc83e527024c6e03724337f3c13f4a958c0881cce22280bcbe3cdae3bafe52cd60cfd8ad74cebe3e19f9c0623d"}, @generic="2f3633b56ec74e8d21bf1158546fe9a29b0e5713fefba21f33f711f957d46994e2df630d2dae73920be1e5a4708737a97ecaf1ad52675a10e5c08059e0da52898d30", @nested={0x101c, 0x3b, [@typed={0x8, 0xf, @ipv4=@local}, @typed={0x8, 0x19, @fd=r1}, @generic="705d9714c2", @generic="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"]}, @typed={0xc, 0x49, @u64=0x6}, @generic="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", @generic="6e2d27245baedbd131823f31811e2fbf7d55972b82604c10068444d312697334ef740271baa4284d1cba7a7d9bd82a13903de43259130e8835fb15cb3bfea5d961042b381ae029e0c18d95da5d6ef7ccc7101a852142633aab70e2ee6b22fdb8eb9480c8a757b324c5d473eef848b0dc", @typed={0x4, 0x71}]}, 0x12e0}, 0x1, 0x0, 0x0, 0x24008010}, 0x4000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 08:30:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r0, 0x0, 0x0, &(0x7f0000000240)='\x00'}, 0x30) r3 = syz_open_procfs(r2, &(0x7f00000003c0)='net/hci\x00') ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0x5, 0xfffffffffffff706, 0x7f, 0x40, 0x5e0, 0x1ff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800040}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x84, r4, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4eab}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x55e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf38d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xc31}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffff001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}]}, 0x84}}, 0x4008011) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='em8>0\x80\n\xd4evW#\\m\xac~\xc2{typmG-\x00\x00\x00\xa3\x05\x97\xa7M\xd1\x91\xa9\x03\xe0\xa7\xe9qy\xc7?\xee\xae\xec\xad\x96@/,\x95\xb4&K:\x9bE\xd6\x11\x8d\x99\x8f\x14c\x850\xf7\xf0\x98\xbbH :W\xf6\x92.Y\b\xb8\x99\xc2\x9d\x87\xda\xbf\xab\xdc\xaaAi\rN\xf2\x81\x10V;L~\xd9\xdf/K\x19\x1baW\xdf\x7f.\xd0|xP\xd2\xbf\xf7\xd3\x97&\xdc\xbd\x008>\x8d\xe7\x8d\x0f\x81)\xd7\x95Wg\xc4\xf0\x92`\xa7\xd8a\xfb\x01\xe4o\xb4\xda\xca\xcd\xf2\x8dZ\x9d\xbf\xe7&\x9fA~Y\xa5\x99\xa9b\x9c0\x16B&\xa4\xc5\xcc(\xfd\xcf+_\xff\x1c\xe3N\x7fr5h\xdd@\x87\x00\xc9N\xfd_\x06\xaao\x9a@\x9d)\x19\xaa\xdd\x03\x80\xba\xc5}\x1cUf\x87o79?\xf8\x9aM\x8f\x86\xcc\vp\x11 |\xb1DF2\x91\xf4\fef\f\x93\xc1\xb4zP\x89\xac\xbb\x1a\t\xddRZ\x0f\xdd~)=S\x042\x05\xcb:\xc0\x1f^>\xd2\xf5K\xa2\f\x8d>\xdb\x03\xd1\xa7\xd5\xd8\xe9\x93\x86\x1a\x87\x06(\xeb9F\x9fz\xddZ\xdd\xec\xf8H\xe9\xbbt\xe7/\xd4\x01\x9d>x|\"\xb8\xe7\x8a\x90O\x14t1f)g') ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000000)=0x6) sendfile(r1, r0, 0x0, 0x71c) 08:30:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x0) r2 = eventfd2(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000700)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x1, r2}]) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r0}) 08:30:42 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) socket$inet6_dccp(0xa, 0x6, 0x0) 08:30:42 executing program 0 (fault-call:0 fault-nth:18): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:42 executing program 3: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000001fc0)=""/148, 0x94}, {&(0x7f0000002180)=""/223, 0xdf}], 0x2, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005a40)=[{{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000003200)=""/162, 0xa2}, {&(0x7f00000032c0)=""/74, 0x4a}], 0x2}}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x102) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) getpgrp(r1) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 08:30:42 executing program 2: futex(0xfffffffffffffffe, 0x400000088, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) r0 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="59a9a241d0b598259f18dd3f886e53c0feae5c30260f3c4b1cd4e02947e9170795be7df8f17117d1d38fd75f8b8f914466c177de12f8544ded4be828a42745727979eaa4b7191032426af998624a859987124590d7732f065e5f8a2b0ab62874168cec4fd04bad9ab6bf4c5e02fcd314ae1e4f6441aa55fa11daeb00b0863e7dec39ade3c30d6a68546f0cfcf187cd94f89517a9bbd5142e20d777ad8266af5eb9413972efa02a1398e266cd0777b94cc10a5ad57c643517dba189ab3327e39e967a466be3161360607a6ad766145e76a70d9e708174bf59767ff19135c34b71d4", 0xe1, 0xfffffffffffffffc) r1 = request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='trusted\x00', 0xfffffffffffffffb) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x40, 0x8000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40102420}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r3, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [""]}, 0x1c}}, 0x0) r4 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x2, 0x40) getsockname$inet6(r4, &(0x7f0000000380)={0xa, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000300)={r5, 0xc1c0}, 0x8) keyctl$unlink(0x9, r0, r1) 08:30:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x8, 0x10000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x400, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000002c0)={0x2, r2}) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x3, {0xda2, 0xc97, "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", 0x1c, 0x8001, 0x10000ff, 0x8, 0x3, 0x8, 0x0, 0x1}, r4}}, 0x128) [ 316.640292] FAULT_INJECTION: forcing a failure. [ 316.640292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.652166] CPU: 1 PID: 11401 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 316.659374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.668746] Call Trace: [ 316.671379] dump_stack+0x173/0x1d0 [ 316.675049] should_fail+0xa19/0xb20 [ 316.678822] should_fail_alloc_page+0x212/0x290 [ 316.683533] __alloc_pages_nodemask+0x4a2/0x5e30 [ 316.688352] ? rmqueue+0xbb/0x1340 [ 316.691947] ? apic_timer_interrupt+0xa/0x40 [ 316.696426] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.701684] kmsan_internal_alloc_meta_for_pages+0x80/0x580 [ 316.707435] kmsan_alloc_page+0x7e/0x100 [ 316.711529] __alloc_pages_nodemask+0x137b/0x5e30 [ 316.716422] ? __msan_poison_alloca+0x1f0/0x2a0 [ 316.721202] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.726428] alloc_pages_current+0x69d/0x9b0 [ 316.730856] ? mon_bin_open+0x2fd/0xb20 [ 316.734870] get_zeroed_page+0x47/0xd0 [ 316.738790] mon_bin_open+0x43d/0xb20 [ 316.742639] ? mon_bin_mmap+0x230/0x230 [ 316.746635] chrdev_open+0xc5b/0xe00 [ 316.750411] ? cd_forget+0x320/0x320 [ 316.754160] do_dentry_open+0xf4f/0x1750 [ 316.758285] vfs_open+0xaf/0xe0 [ 316.761595] path_openat+0x185b/0x6b90 [ 316.765566] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.771509] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.776736] do_filp_open+0x2b8/0x710 [ 316.780615] do_sys_open+0x642/0xa30 [ 316.784400] __se_sys_open+0xad/0xc0 [ 316.788156] __x64_sys_open+0x4a/0x70 [ 316.791987] do_syscall_64+0xbc/0xf0 [ 316.795739] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.800949] RIP: 0033:0x411f11 [ 316.804168] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 316.823094] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 316.830836] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 316.838126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 316.845425] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 316.852720] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 316.860015] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20400, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$CAPI_NCCI_GETUNIT(r2, 0x80044327, &(0x7f0000000040)=0x80000000) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d01, 0x5]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f00000000c0)={0x3, 0x1}) 08:30:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x43, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000240)={{0x0, 0x6}, 'port0\x00', 0x22, 0x10000, 0x8, 0x5, 0x9, 0x0, 0x7000000000000000, 0x0, 0x5, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 08:30:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x204801, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xb53d, 0x5, 0x0, 0x56, 0x7fff}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x4}, &(0x7f0000000140)=0x8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:43 executing program 0 (fault-call:0 fault-nth:19): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 317.344727] FAULT_INJECTION: forcing a failure. [ 317.344727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.356630] CPU: 0 PID: 11431 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 317.363840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.373221] Call Trace: [ 317.375854] dump_stack+0x173/0x1d0 [ 317.379537] should_fail+0xa19/0xb20 [ 317.383335] should_fail_alloc_page+0x212/0x290 [ 317.388075] __alloc_pages_nodemask+0x4a2/0x5e30 [ 317.392902] ? rmqueue+0xbb/0x1340 [ 317.396507] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.401789] kmsan_internal_alloc_meta_for_pages+0xf2/0x580 [ 317.407563] kmsan_alloc_page+0x7e/0x100 [ 317.411699] __alloc_pages_nodemask+0x137b/0x5e30 [ 317.416947] ? __msan_poison_alloca+0x1f0/0x2a0 [ 317.421732] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.426994] alloc_pages_current+0x69d/0x9b0 [ 317.431448] ? mon_bin_open+0x2fd/0xb20 [ 317.435487] get_zeroed_page+0x47/0xd0 [ 317.439430] mon_bin_open+0x43d/0xb20 [ 317.443292] ? mon_bin_mmap+0x230/0x230 [ 317.447306] chrdev_open+0xc5b/0xe00 [ 317.451086] ? cd_forget+0x320/0x320 [ 317.454844] do_dentry_open+0xf4f/0x1750 [ 317.458966] vfs_open+0xaf/0xe0 [ 317.462281] path_openat+0x185b/0x6b90 [ 317.466257] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.471518] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.476739] do_filp_open+0x2b8/0x710 [ 317.480623] do_sys_open+0x642/0xa30 [ 317.484402] __se_sys_open+0xad/0xc0 [ 317.488156] __x64_sys_open+0x4a/0x70 [ 317.491980] do_syscall_64+0xbc/0xf0 [ 317.495725] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.500931] RIP: 0033:0x411f11 [ 317.504141] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 317.523066] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 317.530802] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 317.538095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 317.545391] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 317.552687] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 317.559984] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f0000000140)='}vmnet1:wlan1\'mime_typemd5sumself\x00', 0x22, 0x3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100), &(0x7f00000000c0)=0x4) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000180)="a027f5b8389297c97198be6eda90400d55787de167645dfcbf8a293502c3c446969ec2448ee173168566818e42a98aa28c09f4a7e5c38b44c4b6754306b481f3df72aad0d7aebebddc3a4ba0a0cb3fc78ba2603ea6b9ac8ee78163aa3b8bbf954d9ce7f466469d94f027af0c431713a3ae3d7f5f7db197724b9e4eed0bf4081587121dfee1e1f2b3b1ae3a21b88b4963d32a8d4f1de7fbf062143962a3a14adc", 0xa0) 08:30:43 executing program 0 (fault-call:0 fault-nth:20): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:43 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000040)=""/33) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000280)=0x4) r1 = semget$private(0x0, 0x100000000003, 0xfffffffffffdfffd) semop(r1, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 317.830422] FAULT_INJECTION: forcing a failure. [ 317.830422] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.842475] CPU: 0 PID: 11439 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 317.849718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.859118] Call Trace: [ 317.861791] dump_stack+0x173/0x1d0 [ 317.865506] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.870783] should_fail+0xa19/0xb20 [ 317.874582] should_fail_alloc_page+0x212/0x290 [ 317.879340] __alloc_pages_nodemask+0x4a2/0x5e30 [ 317.884202] ? __msan_poison_alloca+0x1f0/0x2a0 [ 317.888983] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.894254] alloc_pages_current+0x69d/0x9b0 [ 317.898729] ? mon_bin_open+0x2fd/0xb20 [ 317.902786] get_zeroed_page+0x47/0xd0 [ 317.906754] mon_bin_open+0x43d/0xb20 [ 317.910631] ? mon_bin_mmap+0x230/0x230 [ 317.914681] chrdev_open+0xc5b/0xe00 [ 317.918469] ? cd_forget+0x320/0x320 [ 317.922258] do_dentry_open+0xf4f/0x1750 [ 317.926418] vfs_open+0xaf/0xe0 [ 317.929758] path_openat+0x185b/0x6b90 [ 317.933747] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.939027] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 317.944289] do_filp_open+0x2b8/0x710 [ 317.948192] do_sys_open+0x642/0xa30 [ 317.951993] __se_sys_open+0xad/0xc0 [ 317.955779] __x64_sys_open+0x4a/0x70 [ 317.959648] do_syscall_64+0xbc/0xf0 [ 317.963532] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.968766] RIP: 0033:0x411f11 [ 317.972287] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 317.991249] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 317.999028] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 318.006350] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 318.013681] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 318.020996] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 08:30:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1f}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xfffffffffffffffa}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000280)={r4, 0xd3, 0x10001, 0x8, 0x1}, &(0x7f00000002c0)=0x14) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000080)='/dev/kvm\x00'}, 0x30) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 318.028316] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:44 executing program 2: ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x4, 0x2, 0xf7, 0xd517, 0x2, 0x8, 0x4, 0x1}}) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80000000006, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0x12d, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r1, 0x4, 0x70bd2f, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000001c0)={0x3f, 0x2, 0x0, "37aa5adbf1caa08ead588308007c87cc76312cda5007c68e92820d40d69401c6"}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x80, 0x0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xac, r1, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffff7fff}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5915}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffffd}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="4ad66e61b0cd8d5c9ad07114e8cd93c9"}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000004c0)=[@in6={0xa, 0x4e22, 0x7fff, @ipv4={[], [], @multicast2}, 0xecd6}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x5c) 08:30:44 executing program 1: r0 = inotify_init1(0x800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r2}, 0x14) r3 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0xfffffffffffffffc, 0x240) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="0400000000000000ef02000000a100000000000000000000b00700c0000000000500000000000000bf0b0000000000000800000000000000bd0b000000000000f2a6000000000000"]) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r4 = fcntl$dupfd(r0, 0x406, r0) fchmodat(r4, &(0x7f0000000040)='./file0\x00', 0x168) 08:30:44 executing program 0 (fault-call:0 fault-nth:21): syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)="484eaafb55a308a205b3e0f7e0f4cb79689b6cebbb3c1be39f87dfc27755b1f60d3a7df7ddbee5464da5824fe8cbf132f433ec7bd91dbc17b7a92f8b1c72e208c2310f4b7e00f2f05a894ee73798aa0794b72b2ebd7652bbdee34bc1da39a75dedc0161dad2812a14944cf159dfa67f3f8caca8014ace9440c0dcdde9a9ded27ed5298a26d4b84baec44aba45a97", 0x8e}, {&(0x7f0000000100)="c65a18ef68582d34456fad4e23c2535b101a2847599309d1388247ce5e34ab95fe9af13105c2a395927e85675c2386d06ba529815cbba22beea687d052943cedf85003b8ba309dc794494b623c8204162d8da7e4c6c1942729d81b72974f8e8230305acbf053d43ad39b84db13ce9d3e3f018e44551ce4bff632de04bb01824cb7293a3b63f98020e71b4555dcb455a29d9d2fb001d3b9a6e416c0368edb18779c7c27817f4aef3af48a45da2c90a7a73839a0fcccfd", 0xb6}, {&(0x7f00000001c0)="81de4ada4e1c5363d2da8b458b945098300793c6802c6a3ef2b7ed53c3eea2d24a925f6f2acf0cfa042d3150d74f20a8c281ad0f460542e5d5be882a34fc620beeafd04d4f9b610f0b23ebd11fae483b62929f4bf9112a1869fc63cb58057026aa3b41796c7cdddf7e69c075bc35823357bdf822ba2858310c4dc92b11ef9ae7be23c249535a5a", 0x87}, {&(0x7f0000000280)="87fb218eeb5b4ab2659ea1a14684b836c57c0d08585cbe46f96b9b5e25dce658d357b66b2572d1bb8c67272bb534378ff823ac95684d6a9e7843788af41bbc84ea5aec4b085de482415db2a8e18d3a1591dbe0c1e1b705d1ddce540a37a2b5ebb3a623909595517cfe5d7a6bbce46c903ffd3ce8", 0x74}, {&(0x7f0000000300)="2a5701618c07c6f2ee1dba963b290df4746e3469966bfd5f287e93e89148318f10fc5e3fe8c7d72aadf3093663768195c1e81065370a8af1e1eb179624f4a3f8aa4d9e423b382e61aedc4541eba592960b21b35512cd705a8923dec1793896229a2b4a528dc955472772b58636e9bce78575e9d7593cf4fd2b92d21705795248f4b85f15b2f322b121f9b36f1efc67c659c1af7040adf2b64cc00bb60dd396ffa549638e5767a09da89f1ea9424ec80a0d6abcbef76f40052eb1676187a4", 0xbe}], 0x5, 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x40000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000740)) sendmsg$nl_route(r1, &(0x7f00000007c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000780)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001c00200025bd7000fddbdf2500000000", @ANYRES32=r2, @ANYBLOB="7ea8c80b3e365a090300000008070000000000000000", @ANYRES32=r3, @ANYBLOB="0c000200ffffffffffff0000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1a8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4014) 08:30:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1f}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, 0x0}], 0x1, 0x44, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffff9c, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000080)='/dev/kvm\x00', r3}, 0x30) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 318.643131] FAULT_INJECTION: forcing a failure. [ 318.643131] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.655002] CPU: 0 PID: 11459 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 318.662197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.671561] Call Trace: [ 318.674188] dump_stack+0x173/0x1d0 [ 318.677855] should_fail+0xa19/0xb20 [ 318.681613] should_fail_alloc_page+0x212/0x290 [ 318.686313] __alloc_pages_nodemask+0x4a2/0x5e30 [ 318.691551] ? rmqueue+0xbb/0x1340 [ 318.695128] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.700351] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.705615] kmsan_internal_alloc_meta_for_pages+0x80/0x580 [ 318.711359] kmsan_alloc_page+0x7e/0x100 [ 318.715494] __alloc_pages_nodemask+0x137b/0x5e30 [ 318.720382] ? __msan_poison_alloca+0x1f0/0x2a0 [ 318.725147] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.730378] alloc_pages_current+0x69d/0x9b0 [ 318.734810] ? mon_bin_open+0x2fd/0xb20 [ 318.738828] get_zeroed_page+0x47/0xd0 [ 318.742739] mon_bin_open+0x43d/0xb20 [ 318.746592] ? mon_bin_mmap+0x230/0x230 [ 318.750595] chrdev_open+0xc5b/0xe00 [ 318.754351] ? cd_forget+0x320/0x320 [ 318.758094] do_dentry_open+0xf4f/0x1750 [ 318.762203] vfs_open+0xaf/0xe0 [ 318.765517] path_openat+0x185b/0x6b90 [ 318.769487] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.774723] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.779941] do_filp_open+0x2b8/0x710 [ 318.783816] do_sys_open+0x642/0xa30 [ 318.787579] __se_sys_open+0xad/0xc0 [ 318.791321] __x64_sys_open+0x4a/0x70 [ 318.795141] do_syscall_64+0xbc/0xf0 [ 318.798882] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.804090] RIP: 0033:0x411f11 [ 318.807300] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 318.826217] RSP: 002b:00007f84b29827a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 318.833947] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000411f11 [ 318.841229] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f84b2982850 [ 318.848520] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 318.855801] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f84b29836d4 [ 318.863085] R13: 00000000004c6ade R14: 00000000004dc140 R15: 0000000000000003 08:30:45 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$pptp(0x18, 0x1, 0x2) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:45 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x2d, &(0x7f0000000080)={0x37, 0x2, 0xffffffffffff7fff}) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000000)={0x2f, 0x0, 0x4}) 08:30:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x1, 0xfffffffffffff9d5, 0x7}}, 0x28) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 08:30:45 executing program 1: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x3, 0x7fff, 0xccb9}) r2 = open(&(0x7f0000000100)='./file0\x00', 0x200200, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xffc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:45 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) 08:30:45 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000100)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0xc34, 0x100}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000002d0081aee4050cecff0e00fa078b5b9b01000000000000007d0200000eb9a607000000b57d45993adb94", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) 08:30:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x4fa) 08:30:45 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x600, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000180)=0x4) 08:30:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={@remote, 0x48, r1}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x5, 0x100) ioctl$BLKRRPART(r2, 0x125f, 0x0) 08:30:45 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5, 0x5}, 0x10) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0585605, &(0x7f0000000080)) 08:30:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f00000000c0)={0x1a, 0x2, 0x5}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0x38, 0x3}, {0x4, 0x8, 0x100, 0x9}, {0xa0, 0x9, 0x0, 0x145}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x16f) 08:30:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000080)=0xfffffffffffffffb) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:46 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8000, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) readahead(r0, 0x30, 0x101) 08:30:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) 08:30:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400203) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x20400) fcntl$dupfd(r4, 0x0, r4) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x2, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\fc'], 0x1, 0x0, &(0x7f0000000200)='k'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xffffff48, 0x0, &(0x7f00004ee64e)}) 08:30:46 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x4) ioctl$FICLONE(r0, 0x40049409, r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200040, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x100}}, 0x1fb1, 0x4, 0xfffffffffffffffe, 0x80000001, 0x5}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r2, 0xb5b7}, &(0x7f0000000180)=0x8) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000200)={0x4, 0x9, 0x8, 0xff, 0x0, 0x100000000}) 08:30:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, r2, 0x222, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x50) [ 320.475712] binder: 11530 RLIMIT_NICE not set [ 320.492420] binder: 11528:11530 got transaction to context manager from process owning it [ 320.500929] binder: 11528:11530 transaction failed 29201/-22, size 0-0 line 2887 08:30:46 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x56000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xafa5b07, &(0x7f0000000440), 0x0, &(0x7f00000001c0)}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000002000bbb83000c6805e270000003e99000004"]) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f9, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) 08:30:46 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x444000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000100)="b66a5f8a357bb5e97783749a9cb160cc0684c9e4e5db7fdfefcf2ad733a526fe668465b48c27ec56a0180597072b8b2d3cf13f0be9703d894e9c11fc9331a5817f5ae46200d0bd04e6489f6e74d7cfc2b8d8bb429d1b1fc30c8e94c42b13b514b9f3967f8dcd2226881353ac89e6aeae2afdae38d0c698c709398398e49c547ea551038482f22ac95d7b23548b67dcb8bb3bb9be1bd40897a158fceec1ae5d79e6751a9dab2082be1f2f99842da9215de9caea00e937cdce791ffc13e5e1d5f26bb9b070f847155390", &(0x7f0000000200)="180234967be63fc33fbb24ad16c0937464f9ceecb986d388f83218f0726494", 0x1}, 0x20) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x100, 0xd, 0xffff, 0x2, r2}, 0x10) 08:30:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@loopback, r1}, 0x0) 08:30:46 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000200)={{0xa, 0x7, 0x6, 0x3, '\x00', 0x3780}, 0x0, [0x298, 0x100, 0x1ff, 0x9, 0x6, 0x8, 0x5, 0x3, 0x8000, 0x4, 0x9, 0x8, 0x7f, 0x101, 0x0, 0x80, 0x2, 0x7, 0x4, 0xdb, 0x7fff, 0x7, 0xfffffffffffffffd, 0x80000000, 0x8, 0x80000001, 0x20, 0x1, 0x3ff, 0xcf, 0x9, 0x9, 0x5, 0x1, 0xff, 0x6, 0xd3, 0x401, 0x40, 0x10000, 0x20, 0x3f, 0x2, 0x2, 0x2, 0x9f, 0x2, 0x3a, 0x7f, 0xfff, 0x80000000, 0x800, 0xef, 0x2, 0xfffffffffffffffd, 0x9, 0xffffffffffffff00, 0x5, 0x0, 0x6, 0x1, 0xd087, 0x1f9, 0x7fff, 0x7ff, 0x553b69b4000000, 0x6, 0x20f5a963, 0xe7, 0x1, 0x200, 0x2d, 0x20, 0x27, 0x4, 0xfff, 0x1, 0x0, 0x1099, 0x6, 0x94f2, 0x8, 0xfff, 0x1, 0x1, 0x5, 0x0, 0x1, 0xff6, 0x2, 0x5, 0x2, 0xff, 0x100000000000, 0x401, 0xfffffffffffffff9, 0x3, 0x5, 0xc292, 0x5, 0x20, 0x6, 0x4, 0x4, 0x100000000, 0x80, 0x401, 0x81, 0xffffffffffffffc0, 0x8, 0x2, 0x4, 0x6, 0x6f97, 0x6, 0x80000000, 0x7, 0x80000000, 0xbf95, 0x60defca1, 0x800, 0x2, 0x858, 0x20, 0x68cb, 0x80000000, 0xffffffffffffff8e, 0x1], {r1, r2+30000000}}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000001800)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) rt_sigtimedwait(&(0x7f0000000040)={0x98b}, &(0x7f0000000080), &(0x7f0000000100)={0x77359400}, 0x8) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x44000, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000180)) 08:30:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="8f28bfd467fc18c7ec05dff66d202481386d4b5b55813850e0d7ebfad702fcd78b0ee9956176a837db0a9319b75bbd3fb72cce266360ef4d78be7bc0bc8d6f721c5bc17dd1ee049ca8ef1e082b6ccc4da48bdeaf51a58ca5bc2dc85a7aa848df721d9c81cf0959eafd32952586fdf8a7a158ac8a2bc5a05c6b7b1f9d993efab08a624cf93663c71e8fa621fa4bc9dfd7755b6bb1587916de13ff1db45556c3587918b66d9f86a8533df3936205a3cf34", &(0x7f0000000040)=""/39}, 0x18) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0x2}) r3 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000180)={0x0, 0x0, 0x0, r3, 0xf}) 08:30:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x16) listen(r0, 0xad) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) 08:30:47 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000000)={0x3000}) 08:30:47 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @empty}, 0x8, 0x1, 0x0, 0x0, 0x6a1, 0x1}, 0x20) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000013000), 0x0) sendto$inet(r0, &(0x7f00000004c0), 0x21d, 0x0, &(0x7f0000000500)={0x2, 0xfffffffffffffffc, @dev}, 0x10) prctl$PR_SET_FPEMU(0xa, 0x0) listen(r0, 0x7) accept4(r0, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80, 0x0) 08:30:47 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000040)={0x20}) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000080)=""/153, &(0x7f0000000140)=0x99) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000180)=0x8) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x400000, 0x0) signalfd(r0, &(0x7f0000000200)={0xcc1}, 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000240)={0xd26, 0x2}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000280)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x802, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000340)={0x6, 0x4, 0x4, 0x100000, {r4, r5/1000+10000}, {0x3, 0xc, 0x9, 0x9, 0x6, 0x1, "bf3308eb"}, 0x100000000, 0x7, @offset, 0x4}) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x11) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000003c0)=0x4, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sched_yield() write$P9_RSTATFS(r0, &(0x7f0000000400)={0x43, 0x9, 0x2, {0x1, 0x5, 0x1f, 0xb03, 0x6, 0x9, 0x0, 0x6, 0x20}}, 0x43) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480), 0x10) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r2) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000640)={&(0x7f0000000500), 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x50, r6, 0x4, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2f5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x2}}, 0x12f, 0x7, 0x2, 0x6, 0x8}, &(0x7f0000000740)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000780)={0x2, 0x2, 0x7, 0x7, r7}, 0x10) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000007c0), &(0x7f0000000800)=0x8) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000840)={0x7b67af74, 0x1}) ioctl$RTC_WIE_ON(r1, 0x700f) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000880)={"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"}) 08:30:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000040)=""/95, &(0x7f00000000c0)=0x5f) 08:30:47 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x907008efc60577c3) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000000)={0x1, 0x8010f000, 0x1000, 0xffffffffffffffff, 0x3}) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000040)={0x3, 0x0, [{0xfff, 0x0, 0x3}, {0x0, 0x0, 0x4}, {0x997, 0x0, 0x9}]}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, 0xfffffffffffffffe) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 08:30:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{}, 'syz0\x00\x00r\x9b\x86\xd7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\x00\x00\x00\x00\x00\x00\b\x00'}) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x42000, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 08:30:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) ptrace$setregset(0x4205, r2, 0x7, &(0x7f0000000140)={&(0x7f0000000100)="14943c52469d986cecb9f7dd2b624574b656047e24b5d44815b7974a4da69a10de53a2f5d204ee1ee712eca63ea11b264d20db3a", 0x34}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f00000001c0)=0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x1000) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x0) [ 321.968660] input: syz0 as /devices/virtual/input/input7 [ 322.031393] input: syz0 as /devices/virtual/input/input8 08:30:48 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x841}, 0xc) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x140) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bond_slave_0\x00', {0x2, 0x4e23, @local}}) accept4$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x80800) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f00000002c0)={@remote}, 0x14) getsockopt(r3, 0x101, 0xcb, &(0x7f0000000040)=""/7, &(0x7f0000000080)=0x7) 08:30:48 executing program 0: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x400) 08:30:48 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0xc9f2, 0x4000) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b0101400503000009020027bf4876cdc281ef000500e9000430ffffffff06938a8e2e08eac561ed100dff00000000459125ccd8c9ca91fc29cc49b7a9373224244d56b17bcc60266ba46047ad42e92b167d8268afb7d89b21e2fa437c09f747297bfd8e9a9c80395d9447f543108dfa2743e1a557cbe363799ce98049f588a24c670e53fc8443e1ad6527bb1ddf"], 0x2e) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x6, 0x1, 0x10001, 0x7, 0x0}, &(0x7f00000000c0)=0x10) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000001c0)={0x80, 0x5}) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x3, 0x2}, 0xc) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000800)=""/4096, 0x1000}], 0x2) 08:30:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000040)=0x400, 0x4) socket$inet(0x2, 0x6, 0x3) setsockopt$inet6_mreq(r0, 0x29, 0x20000000001b, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) 08:30:48 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80802, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x7d, &(0x7f0000000180)={r3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000240)={r4}, &(0x7f0000000280)=0x8) 08:30:48 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 322.949480] IPVS: ftp: loaded support on port[0] = 21 [ 323.150569] chnl_net:caif_netlink_parms(): no params data found [ 323.244264] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.250823] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.260178] device bridge_slave_0 entered promiscuous mode [ 323.272792] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.279327] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.287951] device bridge_slave_1 entered promiscuous mode [ 323.328016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 323.341024] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 323.377330] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 323.386531] team0: Port device team_slave_0 added [ 323.403592] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 323.412599] team0: Port device team_slave_1 added [ 323.420353] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 323.431136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 323.557222] device hsr_slave_0 entered promiscuous mode [ 323.712632] device hsr_slave_1 entered promiscuous mode [ 323.923532] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 323.931126] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 323.965362] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.971987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.979149] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.985788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.088345] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 324.095248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.112233] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 324.127050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.140838] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.149636] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.169809] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 324.195125] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 324.201323] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.222513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 324.232439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.241715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.252257] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.258821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.279599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 324.295692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.304706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.313156] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.319648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.341001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 324.349424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.369141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 324.376422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.395810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 324.405134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.415801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.430255] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 324.442395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 324.458308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 324.468265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.477592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.486599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.495816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.513919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 324.522389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.531089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.549393] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 324.556156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 324.589608] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 324.614609] 8021q: adding VLAN 0 to HW filter on device batadv0 08:30:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:50 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000140)={0xc834, 0x1, 0x0, [{0x477eba4, 0x8, 0x7fffffff, 0x2, 0x6, 0xa19, 0x100000001}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0a5c1f023c126285719070") r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x2, 0x4}]}}}]}, 0x3c}}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f00000000c0)) 08:30:50 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x2000) 08:30:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001500)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000043c0)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f00000044c0)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000004580)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x8013020}, 0xc, &(0x7f0000004540)={&(0x7f0000004500)=@deltclass={0x34, 0x29, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, r2, {0xffff, 0xb}, {0xffff, 0xfff1}, {0x16}}, [@TCA_RATE={0x8, 0x5, {0x10001, 0x2}}, @TCA_RATE={0x8, 0x5, {0xffffffffffff9ad6, 0x8}}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x8000000036, &(0x7f0000000180)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000)=0x7fff, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) recvmmsg(r0, &(0x7f00000069c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfa4, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000000100), 0x4) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f00000000c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000001c0)="d42319f617a023a945600ce5546c5e0ca06bce0f82d8c041965ed8f3beea1b58629aaa10aede5a2660c88c391a9566983f5c7a84ffe0bef02c37af8f0eed881488b56d93c7e720444792d85e36e11426deaad6530b20405018a1291f23db914dd7e875945351ace985ddf7a01dce5d5433e76827548287b34653994e26273d94fb5eac720b572fabef74f76de66c9f065aea8b4c7f7ce09b11357a127f43b1d1e661111cc34228be3cc479bc4a97f9fbd2aba9c3495f089c3d403410449dd18c167c09e4250d47c66bf58a2f6c9ee365a42749c45f4eb1338bd077bbef7948830976"}, 0x10) [ 325.019610] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode balance-rr(0) 08:30:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x1, 0x7729, 0x4ddc, 0x3f1}]}) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x10001, @mcast2, 0x7d}}, 0x1, 0x80000000}, &(0x7f0000000240)=0x90) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000300)="ee3714b8e40bda34fdb1ad7ce8ad63c7c2cd6b945ce2b33e841b89d6fa6db774334a68a59a45", 0x26, r2}, 0x68) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000280)={r3, 0x7ff}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x1000, 0xfffffffffffffbff, 0x0, 0xfffffffffffffffd}, 0x8) 08:30:51 executing program 0: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x5, 0x402080) [ 325.145851] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode balance-rr(0) 08:30:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) r2 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x8001, 0x200400) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000400)) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r2, r3, &(0x7f0000000440)=0xdfffffc, 0x5a6e) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000002c0)="626263b72643a31dc2a5d54aba974eea3392ffd7df4e0acb42368ee6bbd66ee38ac3b7c27ab97e0a2038692344f45ba94db7837e4f33f072b65dd4") sendmsg(r2, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r2, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r2, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000080)) 08:30:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x48, &(0x7f00000000c0)="04010000", 0x4) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x1, {{0x0, 0x4, 0x0, r1}}}, 0x28) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000002c0)=0x2, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40200}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xb8, r4, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) [ 325.401381] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) delete_module(&(0x7f0000000040)='vmnet0selinux.-em0vmnet1\f\x00', 0x200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000280)=0xe8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000400)=0x3, 0x8) r3 = getgid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) fstat(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x10, &(0x7f0000000540)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1e00}}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'vmnet0selinux.-em0vmnet1\f\x00'}}, {@obj_user={'obj_user', 0x3d, '/-/%vboxnet1mime_typeU}\'vboxnet1/vboxnet0/GPL-/--proc.vmnet0GPL!\xe4'}}, {@context={'context', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r5}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'wlan0-vmnet1'}}, {@uid_gt={'uid>', r6}}]}}) 08:30:51 executing program 0: r0 = syz_open_dev$admmidi(0xfffffffffffffffd, 0x4, 0x203) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x3, {0x6}}, 0x18) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x7fff, 0x200000) 08:30:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) r2 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x81, 0x4) bind$inet(r0, &(0x7f0000002940)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x213}]}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xc081, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000180)={@dev, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={@empty, @dev={0xfe, 0x80, [], 0x1f}, @empty, 0x6, 0xff, 0x1, 0x500, 0x5, 0x80000000, r2}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x100) 08:30:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x40, 0x4) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x2004e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400000000000}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0xffffffff) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000140)=""/4096, 0xadf, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 325.786092] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:51 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x10400) 08:30:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@loopback}, 0xffffffffffffff47) 08:30:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) r2 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) [ 326.186938] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r1}, 0x14) 08:30:52 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x25, &(0x7f0000000080)={0x3, 0x0, 0x100000000, 0x1, r1}) 08:30:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) r2 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x18, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000140)=0xfffffffffffffe1e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f0000000340), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) chown(&(0x7f0000000080)='./file0\x00', r2, r3) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x16}, r1}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000040)={@ipv4={[], [], @remote}, r1}, 0x14) 08:30:52 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 326.539078] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:52 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0xfffffffffffffff8, 0x2, 0xb000}, 0x4) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xfffffffffffffffc, 0x4) 08:30:52 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000631000/0x4000)=nil, 0x4000}}) r1 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0x8, 0x10000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x202, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000002c0)={0x5f9, 0x9, 0x8, 0x8, 0x8c2, 0x0, 0xfffffffffffffffa, 0xfffffffffffffffc, 0x0}, &(0x7f0000000300)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e22, 0x9, @mcast2, 0x9}}, 0x1, 0x10001}, &(0x7f0000000400)=0x90) r4 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x7, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000240)=0x8) ioctl$EVIOCGKEY(r4, 0xc0487c04, &(0x7f0000000000)=""/226) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r4, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{r5, r6/1000+10000}, {0x0, 0x2710}}) 08:30:53 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000480)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x1f5, 0x4) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000100)=""/103, 0x67}, {0x0}], 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x9e6) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x11, r0, 0x0) 08:30:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x8e, 0x4) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:53 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x2) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x9}, 0x4) unshare(0x10000000) 08:30:53 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000180)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000300)=""/244) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 08:30:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:30:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x200000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x101ff, 0x3, 0x100000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xed, "0180120c63c7f378363bc99ec50aed165c38a575dfb5cae4c6a9ee9fd698e58f7f57e9a7a68972f341a4382e406ee98bb3db5eb7270af771c03ffca8622d7270071916e87a3ff3d16f965f7a2e5fe30d4726b437e7e39db77fd20993166c3923a5416362fd897fb838bb29d09cc6d8d2a7cf23d18fd08d8e506af6e5917dd34f90692ae22b2892f77f16c1569cacce365d65b1cac3fc514c0150329143154963156b5ae7047117a3f2029d6ab8677958fad00005e04a4322847add28cc3312a6f731f1fdebb95a2e0aea5cb01b50b12bfca9bcd28da6144220d4999a740fe2fc0182a8c3aee850a0a5815cb6c1"}, &(0x7f0000000180)=0xf5) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0xffff}, 0x8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:53 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400000, 0x0) 08:30:53 executing program 2: unshare(0x20400) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x40004) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x589002) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000000c0)={{0xa, 0xdc5b5583706cb61a, 0x1, 0x4, '\x00', 0x9e8e}, 0x0, [0xfffffffffffffff7, 0x4, 0x9, 0x6, 0x1, 0x6, 0xd431, 0x6, 0x6, 0x3, 0x7ff, 0x1, 0x100000001, 0x8, 0x200, 0x0, 0x6, 0x1000, 0x0, 0x5088, 0x8, 0x3, 0x3, 0x6, 0x3, 0x20, 0x8000, 0x5cbd, 0x9, 0xd0b, 0x3, 0x7ff, 0x2, 0x2, 0x8, 0x40, 0x8, 0x7, 0xffffffff, 0x2, 0x3, 0x235, 0x40, 0x5, 0x3ff, 0x3, 0x101, 0x36ff, 0xffff, 0x100000001, 0x2, 0x44ff031b, 0x2, 0x9, 0x0, 0x81, 0x0, 0x800, 0xffffffffffff0001, 0xfff, 0x7ff, 0x1, 0x0, 0x7fff, 0xcfe, 0xfffffffffffffffa, 0x1, 0x4, 0x3, 0x10000, 0x8001, 0x40, 0x1, 0x8b, 0xd6, 0x7f, 0x12f, 0x6b, 0xffff, 0x80000001, 0x6, 0x6, 0x80000001, 0x2f, 0x1ff, 0x0, 0x0, 0x7, 0x7, 0x4, 0x8, 0x8, 0x8, 0x4, 0x0, 0x5, 0xe73, 0x1f, 0x7, 0x2, 0x2, 0x4, 0x3e3, 0x0, 0x3, 0x800, 0x0, 0x7, 0xae, 0x5, 0xfff, 0x9, 0x4, 0x1000, 0x3, 0x2, 0x41d9, 0xc7d, 0xfffffffffffeffff, 0xe9, 0x3fc0000, 0x7fff, 0x48000, 0x9, 0x7, 0x9, 0x6, 0x3ff], {r2, r3+10000000}}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000080)='\x00') 08:30:53 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x401, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0xea63, 0xfa00, {r1, 0x33, "cba410", "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"}}, 0xfffffffffffffd86) r2 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x40, 0x1) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@getspdinfo={0x28, 0x25, 0x1, 0x70bd2d, 0x25dfdbfd, 0xec, [@ipv6_hthresh={0x8, 0x4, {0x4d, 0x1a}}, @policy_type={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x44000}, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000540)=0x5, 0x4) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000000)={0x5, 0x1, 0x2}) r4 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x181000) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000580), 0x111, 0x2}}, 0x20) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000180)={r5, 0x4}, &(0x7f00000001c0)=0x8) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000040)={0x5000000, 0x1, 0x4, [0x2000000, 0x2000000000000000]}) 08:30:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") accept4(r0, &(0x7f0000000080)=@ll, &(0x7f0000000000)=0x80, 0x80000) r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 08:30:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x40002, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000002c0), 0x4) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e23, 0x7, 0x4e21, 0x8c, 0xa, 0xa0, 0xa0, 0x3b, 0x0, r1}, {0x7, 0x3, 0x2, 0x2, 0x5, 0x40, 0x47, 0x1}, {0x80000001, 0x67, 0x0, 0x8}, 0xfff, 0x0, 0x0, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4d2, 0xff}, 0xa, @in=@rand_addr=0x9a, 0x3505, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x1, 0xffffffffffffcd63}}, 0xe8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x84, 0x400000) 08:30:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x1, 0x2) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4004e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffe84, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xdd) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080)=0x5, 0xffb0) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffffb5, 0xc0, 0x0, 0xffffffff00000000) [ 327.967773] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x4, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x40040, 0x0) ioctl$NBD_DISCONNECT(r2, 0xab08) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f00000000c0)={{}, {0x80000001, 0x20}, 0xbc, 0x2, 0xff}) 08:30:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000000)={@ipv4={[], [], @empty}}, 0x14) 08:30:54 executing program 0: r0 = syz_open_dev$usbmon(0xfffffffffffffffe, 0x1, 0x7fe) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/229) close(r0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x2000, 0x0) 08:30:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:30:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x7, @loopback, 0xb59}}, 0x4, 0x6, 0x4, 0x1, 0x2}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={r1, 0x9a, "c222d70d4cbef173c7c7b1fba91d6bcafd9927d033f23b10d337705e1093345ef16fbf8d3c15763e5588fc9f8581774384a7ae22984715adb6ba678602a10a4f08de5e79f1a523c25429e01c0aa54711222f1958a7dca5e3ec3459952409ba4eae620df498c825471dc902ef7c43e04bd47e5148b06060ea3a74350f45a90a1c4bfe15bf9c5e8240504f004b0b189b2f17f4d3961018fa2049c8"}, &(0x7f0000000200)=0xa2) memfd_create(&(0x7f0000000240)=')&\x00', 0x4) [ 328.417206] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x3, 0x0, @pic={0x3, 0x7fffffff, 0x20, 0x1, 0x3, 0x8000, 0x4, 0x8, 0x0, 0xffffffff00000001, 0x3, 0x81, 0x4, 0xffffffff, 0x6, 0x1}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 08:30:54 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x50e9, 0x40) r1 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000380)=0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10200090}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x68, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x85, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x40010) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000200)=ANY=[@ANYBLOB="0500000000000000a00b000077c0d759eeee33be10c7320cd99c7b000000000900000000000000fb0b0000000000000000040800000000000000bb0e0000000eb00007000000000000009b030000000000000900000000000000b923d7599514721d0ac731dd67b2c3d82adc393dce62bfecf71b9ceba4d2deb14ea151320e8c28d72db72cc11d51d0a7be2cd54b137fb9e0887ecd21d2d8ff7f9111c9c1b829614b4d40ba19cf8c40fef004b997a0e6057d32c96f2bd6a01788cd87992b9425810b3b2ac46d4a5c92"]) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000040)={{0x10001, 0x3f}, {0x5, 0x100}, 0x5, 0x3, 0x2}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x6}, 0x14) socket$can_raw(0x1d, 0x3, 0x1) 08:30:54 executing program 4: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) mlock(&(0x7f0000003000/0x4000)=nil, 0x4000) mmap$xdp(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1000003, 0x8050, r1, 0x0) mlock2(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x4, 0xfff}) mlock2(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) munlock(&(0x7f0000000000/0x4000)=nil, 0x4000) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000003000/0x4000)=nil, 0x4000}}) 08:30:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:30:54 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:ssh_keygen_exec_t:s0\x00', 0x27, 0x2) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000004, 0x410800) 08:30:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@local, r1}, 0xd) 08:30:55 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) pread64(r0, &(0x7f0000001400)=""/147, 0xfffffffffffffe41, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) r2 = creat(&(0x7f0000000100)='./file0\x00', 0xcac80da12bb1ae32) ioctl$VIDIOC_RESERVED(r2, 0x5601, 0x0) ioctl(r1, 0x20000008912, &(0x7f0000000ac0)="153f6234488dd25d766070") openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4109000, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000080)=@req={0x101, 0x7720, 0x3, 0x101}, 0x10) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) [ 328.949827] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:55 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x6) 08:30:55 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'team0\x00', {0x2, 0x4e21, @broadcast}}) [ 329.268611] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:55 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x200800, 0x0) dup2(r0, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) write$FUSE_IOCTL(r2, &(0x7f0000000040)={0x20, 0x0, 0x1, {0x7, 0x0, 0x7, 0x1ff}}, 0x20) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:30:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@local, r1}, 0xd) 08:30:55 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000180)={0x800, 0x7777765f, 0x3, @stepwise={0x6, 0x2, 0x8001, 0x8ef8, 0x27, 0x81}}) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000c00)=""/109, 0x2eb}, {&(0x7f00000006c0)=""/173, 0xad}, {&(0x7f0000000780)=""/41, 0x29}], 0x3, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f00000007c0)=""/186, 0xba}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000280)=""/37, 0x25}, {&(0x7f0000000900)=""/124, 0x7c}, {&(0x7f0000000d00)=""/226, 0xe2}, {&(0x7f0000000980)=""/69, 0x45}], 0x6, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) io_setup(0x80000002, &(0x7f00000008c0)) 08:30:55 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) recvmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/195, 0xc3}, {&(0x7f0000000140)=""/41, 0x29}, {&(0x7f0000000180)=""/86, 0x56}, {&(0x7f0000000200)=""/176, 0xb0}], 0x4, &(0x7f0000000300)=""/163, 0xa3}, 0xe00000000000}, {{&(0x7f00000003c0)=@nl, 0x80, &(0x7f0000001980)=[{&(0x7f0000000440)=""/58, 0x3a}, {&(0x7f0000000480)=""/197, 0xc5}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/194, 0xc2}, {&(0x7f0000001680)=""/21, 0x15}, {&(0x7f00000016c0)=""/221, 0xdd}, {&(0x7f00000017c0)=""/126, 0x7e}, {&(0x7f0000001840)=""/223, 0xdf}, {&(0x7f0000001940)=""/38, 0x26}], 0x9, &(0x7f0000001a40)=""/127, 0x7f}, 0x8001}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001ac0)=""/177, 0xb1}], 0x1, &(0x7f0000001bc0)=""/155, 0x9b}, 0x100000000}, {{&(0x7f0000001c80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002340)=[{&(0x7f0000001d00)=""/234, 0xea}, {&(0x7f0000001e00)=""/203, 0xcb}, {&(0x7f0000001f00)=""/156, 0x9c}, {&(0x7f0000001fc0)=""/80, 0x50}, {&(0x7f0000002040)=""/20, 0x14}, {&(0x7f0000002080)=""/233, 0xe9}, {&(0x7f0000002180)=""/171, 0xab}, {&(0x7f0000002240)=""/207, 0xcf}], 0x8, &(0x7f00000023c0)=""/4096, 0x1000}, 0x6}, {{&(0x7f00000033c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000004800)=[{&(0x7f0000003440)=""/179, 0xb3}, {&(0x7f0000003500)=""/163, 0xa3}, {&(0x7f00000035c0)=""/181, 0xb5}, {&(0x7f0000003680)=""/139, 0x8b}, {&(0x7f0000003740)=""/4096, 0x1000}, {&(0x7f0000004740)=""/154, 0x9a}], 0x6, &(0x7f0000004880)=""/4096, 0x1000}, 0x401}, {{&(0x7f0000005880)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000005b00)=[{&(0x7f0000005900)}, {&(0x7f0000005940)=""/88, 0x58}, {&(0x7f00000059c0)=""/52, 0x34}, {&(0x7f0000005a00)=""/224, 0xe0}], 0x4, &(0x7f0000005b40)=""/163, 0xa3}}], 0x6, 0x10020, &(0x7f0000005d80)={0x0, 0x1c9c380}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000005dc0)={0x0, 0x0, 0x20}, &(0x7f0000005e00)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000005e40)={r2, 0xffff, 0xa, [0x9, 0x8, 0x9, 0x10000, 0x0, 0xfffffffffffffff9, 0xff, 0x7ff, 0xd0b1, 0x401]}, &(0x7f0000005e80)=0x1c) 08:30:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@local, r1}, 0xd) 08:30:55 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000000)=""/202) [ 329.741977] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:56 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:56 executing program 4: r0 = socket$inet6(0xa, 0x4, 0x7) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0xffffffffffffff8f) 08:30:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x408000000008000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000002580)='yeah\x00', 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x40000000000000, &(0x7f0000000080)={@mcast2}, 0x14) 08:30:56 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x8b2, 0x800) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000280)=0x7) r1 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x118, r2, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x104, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x4004841) 08:30:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@local, r1}, 0xd) [ 330.112327] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:56 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) 08:30:56 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)=""/115, &(0x7f0000000080)=0x73) [ 330.494268] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, r0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:56 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040), 0x8) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x6, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$KDDELIO(r1, 0x4b35, 0x20) 08:30:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) 08:30:56 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) [ 330.813995] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:30:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000000)={@remote}, 0x7) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, {0x9, 0x7, 0x0, 0x7}}) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xed, 0x80100) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x80, 0x0) ioctl$int_out(r2, 0x2, &(0x7f0000000140)) inotify_rm_watch(r3, r1) [ 330.941881] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:57 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x3, 0x33a, 0x7}}, 0x28) write$P9_RLERROR(r0, &(0x7f0000000040)={0x16, 0x7, 0x2, {0xd, '/dev/usbmon#\x00'}}, 0x16) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000080)=""/73) 08:30:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:57 executing program 2: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) 08:30:57 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x200000) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000040)=""/38) timerfd_settime(r0, 0x0, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000080)={0x4, 0xfffffffffffffff9, 0x7, 0x7f, 0xffffffff, 0x9, 0x7f, 0x2}, &(0x7f00000000c0)={0x9, 0x4, 0x5, 0x8, 0x7f, 0xed3e, 0x6, 0x2}, &(0x7f0000000100)={0xfb, 0x80000000, 0x4, 0xfffffffffffffffa, 0x0, 0x0, 0x9, 0xeb}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={0x6}, 0x8}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x10000, 0x7, 0x4}) 08:30:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000019c0)={@remote}, 0xc2) r1 = syz_open_dev$swradio(&(0x7f0000001a00)='/dev/swradio#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001a80)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000001d00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x88000040}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001ac0)={0x1d0, r2, 0x40c, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x17a3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x981}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @local, 0x30f}}}}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xae}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x9, @remote, 0xd575}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1, @local, 0x9}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3970}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4040}, 0x40001) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x418000) sendmsg$tipc(r3, &(0x7f0000001980)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x2, {{0x42, 0x4}, 0x4}}, 0x10, &(0x7f0000001840)=[{&(0x7f00000000c0)="fb0704cd97b8a6e45d832e64a66384906aaa908bd4aa8651868661e35d8c60546c28b7dc5f5d10804f31dbd9bb3d0becc132ad429dd769b4c5e1d3510cfb64b1393c4cd877819ada0af99788420105c1317c8f88f50a92f9ffbd6fba0698fb25f350e68fb9ac1b085edca2df67bde7b978b5fb7c617454642aa49ee369390761e4d4d8ebe2d4cba541ca88990f5ba7f11050dda5a8245ca9cf33cf0a2e823038088c7b39cc23857a470fcbb25fc2f836f3e08e23cf20e574d38003876cce4be09dcec4ac4f2361e53563090be48de63c215e4cec029e6df95ab49297", 0xdc}, {&(0x7f00000001c0)='U', 0x1}, {&(0x7f0000000200)="37fcc5f382fb79d0fbd1ab9126794a85d9c9f157e7a1c80af0487e7a2aba5cf419318fffa1c649c5098ac158d949ce52f355f920b4076fa5e663cc448d850f165c0ab707760616b3a750e5ab3c5d398fb0f132c77d460be4d8f2520ec0a3fd2b5dabfad86a34cb38eec2cd6bd128e05bd7e46edc40fa79966402f488e2e3c0ad2e6d934cf82d12c3f23426ceccfbb6fd24fd73c5dc4cf2e3165b83d8a6aa874cc8470b3b3712c238288a11e90d4326ce0858dc8f7a9505b55370555a5c67d460b23f2f032f98b200cd18c41fcf6d71", 0xcf}, {&(0x7f0000000300)="5253b4738f95f2c2474d2dfde70ba09dc23ffeef35f5bfc3f576b0e44eff5d8f040598bbdb02681f0a0cffcc9b0a6c6725c1a5db6ff628d40301957a95bd96d075d75cdd038287f4c2b5b58e9435a20e103efc632621f32a92b3264bd1289d6a67e33ca3e64e3a2e6ee8bb2d522f71c6b824eb0493a3b33e9e01708048ce4d92f63563d10ca417010259b599e0b14ae2d4bf14261d30d63d6274ab4826224ca6cc0a868e57241ebda7a966d9", 0xac}, {&(0x7f00000003c0)="908a5239c329dd3cc78785f28d744b82d9f3e4d37f8ef5217e957a3bf4b3935c820ef3140e27cb9f54667099d857c9eaa0b0c00018e6134523eec3234a8ffe468af2b79a742c8df85576178cd8f65d56bcd22903ed086c076613ea13205301409dc85ab290166efdafa900c6e2f9636c15f2266aa28d195ff8cb565b85bc39e1325aaa4762437411c3c7fc1c4fa940b291c3cf90d8aa7925aa053c0a22f6cf8ab955ef1f6ca8b6e149ecf8a9961cb805c3f484127c66ad8dc2757250f50f7e78c0cc4c19a0acf132c715aa09197a3f320f34b17f9f972b05fe40f3a35e507fca12857830dda10876c29328d3ff1eb97a3c3a", 0xf2}, {&(0x7f00000004c0)="300e7954b88d2e073d4054dca56dd0d05461afe01681f2352c2002ecb13f59a8690f41090c140a02a3d05539e069ebe9323546072ad1d7748463848f498b3a20f3ffbdf26226139704b474e4781af5cc51d4d6128ec0eb03a567e2b46633b2140a9190eddd58fb4c8625cae908ca5715b0faa02d35e0e6ca1d78feb362a5a7a4742dca808850ab4d2fc1ab785029392cdbb6a370e2d99a8154c591bec2d4404c1897e5671e2363f1b05b80e295f36742d97891eacad4a97ba9e77cdd0d0a63af029b79289719f691a1bd56c702f27447722671833926569ef46d0d7dc6", 0xdd}, {&(0x7f00000005c0)="a214113dd31477a423e7a657d0d98cee96bfff08ffd66e391ce64f40eae156346029fc387848b66735c1c88a7b361f87fe24380b07ded80030dbabbbbfe210b61e8e8f1dc8d1af45649de6ba109c44ed4c1c4edf0b7c9452d0f0634c6f443bf78e49374860df6ab725ce46594e5eb15851c93d20660d6f39ba505b41eeffa94df06f927dbcf59a18b197f86d06a0f6dbf247591772d0e56f9808febecedb4ae50bd27935a871d4995e7afa0da777b4ce6f148130f0222803161a615c385141204021d9923406232a809a4f84755c486cd911ec5b7eaafc5a4e0718520b99e06fafe0dfa5d4def4fd7de9844438bf9a791dff4a23", 0xf4}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="b01a66c27100834a18bdd6fcc4e38f0d84631361faa7a8069756671b1c30f102d28b46ad135c94e13c2992b2e58a56376ec2279800e79c45aa078cdbb9cd6551d15cfe76936dd22376782e2943bc42b46b4f3cd4d9765b5d4411fe295bd41a0639fe1246df19c4ca9c44261fee6cd6e820821198c760dd4a79d5a95bfe72d9f39b87a3e13aaaab865b994f61a5981b1930266678f7d5745e6f", 0x99}, {&(0x7f0000001780)="f0962e44ae08ecd59b70901b922a4b53711f3aea7198eb73c2f56d87fdb5cc3f8563be454aef0ae0766d5e50b23795d2b809875471b65e1b9fe2a1e5cf39f60434cc5867aa3230f293c8968ad8c8a33f4d181d0e4ff49030e88ef72f287ca6515a05e7639bbad85f41aea412ed333041a3d54043990b253ff329cd30746e71c8f5bfcbb6d8ae13ac12333d116f67a024ed", 0x91}], 0xa, &(0x7f0000001900)="20864fcd45a8a63a4ed4ba6d46b9bc822761125f745c124accd80db6aeec0ce669a147f828487065951925a23e8babfcd340b4c8929a4639fdaf372e34db29646961abc3c1305a5976b1bec6950fc35ab729f6156140dc96aeb1e89e932400085ad9e425ffb0", 0x66, 0x20000000}, 0x4000080) bind$vsock_dgram(r3, &(0x7f0000001d40)={0x28, 0x0, 0x2710, @hyper}, 0x10) [ 331.237471] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:57 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="00012dbd7000ffdbdf2513000000200007000c0003007f000000000000000800010000fcffff080002000900000014000900080002000800000008000100f8ffffff2400090008000100a3000000080002003600000008000100090000000800010003000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000000) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x190) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) 08:30:57 executing program 2: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) 08:30:57 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x7ff, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e20, 0x900000000000000, @dev={0xfe, 0x80, [], 0xe}, 0x3}}, 0x40, 0x5, 0x7fff, 0x401, 0xc3}, 0x98) 08:30:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x400000001, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x13, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r3) 08:30:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x840, 0x0) 08:30:57 executing program 2: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) [ 331.864532] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:58 executing program 4: unshare(0x8000000) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xc7}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r1, 0x3, 0x917}, &(0x7f00000002c0)=0x8) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000140)={0x0, @reserved}) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x9, 0x8, 0x401, 0x80000, @tick=0x2, {0x6, 0x7}, {0x9}, @queue={0x8, {0x725f69ca, 0x7fffffff}}}, {0x1000, 0xff, 0x7b51, 0x8, @tick=0x3, {0x5, 0x400}, {0x7ff, 0x3}, @connect={{0xffffffff, 0x9}, {0x4, 0x7}}}, {0x7, 0x7, 0xfffffffffffff814, 0x3, @tick=0x5, {0x2, 0x3a}, {0x1f, 0x5}, @queue={0x7ff, {0x9, 0x2}}}, {0x80000000, 0xffff, 0x2, 0x10a2, @time={0x0, 0x989680}, {0x3, 0x6}, {0x2, 0xfffffffffffffffa}, @raw8={"1b86d05f96d54053c8cd601e"}}], 0xc0) 08:30:58 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x20, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000080)={@empty, @multicast1}, &(0x7f00000000c0)=0x8) 08:30:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7d0005e5, 0x82) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0xeb9, 0x30, 0x100, 0x3ff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x1000000000, 0x5}, &(0x7f0000000140)=0x8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:58 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:58 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) [ 332.286493] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:58 executing program 4: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@permit_directio='permit_directio'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'fuse\x00'}}, {@dont_hash='dont_hash'}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) clone(0x202102001fe7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) 08:30:58 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x40000000000009, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x7, 0x40000) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000240)={0x65}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x200, @empty, 0x2}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e23, 0xbd6f, @dev={0xfe, 0x80, [], 0xa}, 0x7ff}], 0x88) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0xf6b}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYBLOB="00000500ac0d0100fcff335a0500c3233fcc703b4c07ba4c4479864d28f985992d3f68617f4bccc04dd9f5370f787390fa96578f42dc37689533c3d3a9f72bfd7c0d59d2e83bc20beb42f9d05dfce6711e9dd8ee67a4178493"], 0x12) 08:30:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000200)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/182, 0xb6}], 0x1}, 0x40010040) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'caif0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) accept4(r0, &(0x7f00000005c0)=@hci={0x1f, 0x0}, &(0x7f0000000640)=0x80, 0x80000) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@ipv4={[], [], @rand_addr=0x7}, r1}, 0xfffffffffffffe34) 08:30:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:58 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) 08:30:58 executing program 4: r0 = socket(0x10, 0x802, 0x2) signalfd(r0, &(0x7f0000000080)={0x9}, 0x8) write(r0, &(0x7f0000000480)="240000001a0025e0046bbc04fef70f1c020b49ff00000000801108000800030001000000", 0x24) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x80, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@sha1={0x1, "e8903a5a369f825e03c7c70faf8b4796308ceb2b"}, 0x15, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x44800, 0x0) [ 332.641705] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:58 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0xd) 08:30:58 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:30:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:59 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 08:30:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0xc00, 0x70bd2d, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 333.061130] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:59 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='Fu\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000480)={0x0, 0x5, 0x59, "0ba1206630e62acad06e53277b2889ee1af91452425ca27d980cc604d1efdf3e90153c82d0859a4f90edb189514e996a398aec2b63f8215691c20b53db19a0db99f97a9dbe88d4301c6b94f1e1ce50be0cedc1215b38df7b79"}, 0x61) r1 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="cbad2b7e2427c707ee223c2b1eed4adff4650265314b3c0b17ab7baec7f5ec2e9ca125621e77f4af4b8e6b5e403b9afdb8bfcb58c7395442b59d75f35dd77e34b85cc6cf5b8a864553aca64ba72e1c52d778e668c8973f87ff33ea6be4bab872eea9ee57779c0da4a64a71bdf94f1820f4585a21f6e521f4169049d36843e10d4f5e3eb0c7ca66a6bd5a20c2768312728eadaf76325e64b6055acc439ff120ddf95eae70f673d69fa27e46fef540e6ccc9ae6f05bde4ba14500bf3a5889a9ab0a1fd979cc87686616d", 0xc9, 0x0) r2 = request_key(&(0x7f0000000280)='.dead\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='vmnet0eth1*\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r1, 0x1, r2) 08:30:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000200)={@local}, 0xd) 08:30:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) [ 333.342398] libceph: resolve 'Fu [ 333.342398] ' (ret=-3): failed [ 333.348977] libceph: parse_ips bad ip 'Fu [ 333.348977] :d]:.,[' 08:30:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x2001, 0x0) sendmsg$tipc(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)="e974904d435199a3880734ade7a1186ee0aac4909ab17ae8259f03e5d32412edebec3b231f793368674e2ed6b3d80bb601b2f30f298f840201312587ace5741b06a086e712dc8b6bc5343a218a1a4be483d0bd57b9cbc90f7cdf7870f865dab2b173fa59cbd48b71fec17be2d180578a97604eea3e56f123d27530736f2bbc899e5cea2f14c70e618e17b038d9781de5c163813d1508a73af0b62abc0057fd0a75daa2d9d5d2b609cc5be61b6d40211be21357c5d769b7509c9bdb70cf5ae2d96187450f7b11920fd04b45887aa1cf991c4715bd4564d0c15d9bc002d274656a6b3094da1f9470149cf7687c020184c5d6dd93", 0xf3}, {&(0x7f0000000140)="b308691102d18cfd00625403f5b2885e01a47d9b1e44240b35d9a2467389fb8fb4a873f4b4faefc490e59684312c3442328851d4bfd32a3fc128915ac67ae34f2797c68627469f68da25aac00519c9d08bfb736f281c514e92c2bc4325029f5b755d2521209fc9d61573d2acb1c886577b9a0aabcf76577c53e7d73411190c1ac649fa1da5ca231cd941e05ca9c37d970c0564de0efc52431c625eb662f86f3ba60a5b4fbd66", 0xa6}, {&(0x7f0000000200)="40248dd4bd891cc3f37f6a3d77e5f9dc9738b4420358219f7757a6501d2ae5b4b115786ae607b4a120e5cf5faf19c686e0566fe018f8b7d49dfb12", 0x3b}, {&(0x7f0000000240)="768841b8ba200424ea7b5454e98a76afbdeabd2c578f0bc4091e199cf03c3ca5e3569c62f4a7a4bb77c7e274cc1393aaba582c4fd7607a7aab7d780309e4bcdbd317cc1ec1837ab556a0afdeeb2655e26ab9e000fac4a733d388cd73948bbe9b3b8c3506adef417104fea029d3ba9f77f4415f08c580e7ebb9597bc927ab4f7920427c364c90695339fefe645ace0841e145f61e973d4b7a0040a03a0d91a29b69693fd3135730923f822d9729f458a32fd2daf3d36cd35302990e378965bbe2c75f2202e59d75d4faa76b3f967048819a2bbf10e1e58d88532c3fd3f7db36ddbfac8d0a320e", 0xe6}, {&(0x7f0000000380)="929d38d288229e826f4b126463a83df9d773951543cedbd550243d419ef5df061962b5ac4a1e8e035c49a53af7350ccc246c0b7fa58bcdacc86097ce3065de7b13ea75820ca97dc7ff39afb9b97f0d72c8637e503ce2ee8d94bab395e6dc8c0dbb4dc349915e5eaa6d3413347ec8df8518fd4b9eedf8c947d5251095d5e43ca3e825c4dc118dc01f01631399340ee8250c67b22ba5479c78579663fd780845ec5dd617e86bd05baefae4c2aad58cf808e272f31954beccd1c6db7b4fc3718eac889275f9e1bbe25c92fb9a9a8d3b80b9d749b4be6f93c17d547d9af9ec36a4dffd0d7d5f", 0xe4}], 0x5, &(0x7f0000000500)="891b6628e73dd14a57cc8d5f363a1f960efe6cc2a96be503ee36eba26e32b231a684c11b4b1a289f2d8cbadd9dac3e77c450a8bc27e1404afe3c51a3129612f737aedb9f3a0d30851174b273129a65ca4380d779f78052d0c0a3d648f78a85a9440114dad288867df26a90c5a0368f317915b11aa0", 0x75, 0x4000}, 0xc000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') 08:30:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', r1}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r2}, 0x14) 08:30:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000200)={@local}, 0xd) [ 333.513783] libceph: resolve 'Fu [ 333.513783] ' (ret=-3): failed [ 333.520302] libceph: parse_ips bad ip 'Fu [ 333.520302] :d]:.,[' [ 333.602074] kernel msg: ebtables bug: please report to author: Wrong len argument 08:30:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x100) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x3a, @empty, 0x4e20, 0x0, 'lblcr\x00', 0x2, 0x3, 0x51}, 0x2c) 08:30:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:30:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000200)={@local}, 0xd) 08:30:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8800, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$vhci(0xffffffffffffff9c, &(0x7f0000003e40)='/dev/vhci\x00', 0x400000) io_setup(0x8, &(0x7f0000000300)=0x0) io_cancel(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r3, 0x1400, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2}]) 08:30:59 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2a400200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd27, 0x25dfdbff, {}, ["", "", ""]}, 0x14}}, 0x50) set_mempolicy(0x2, &(0x7f0000000180)=0x101, 0xd7b) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) 08:31:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x101800, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') write$P9_RLERROR(r0, &(0x7f0000000340)={0xc, 0x7, 0x2, {0x3, 'GPL'}}, 0xc) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x114, r1, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x79}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf59d}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffff8}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) chroot(&(0x7f0000000400)='./file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x800000000004) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet6_mreq(r2, 0x29, 0x100000001b, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x2ae) [ 333.998168] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 08:31:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x1000}, 0x10) mmap(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x2000004, 0x40030, r0, 0x54) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r2 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r2, 0x14000000000, &(0x7f0000000300)) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x14}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x1c0, r1, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x118}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x79a9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x400}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xe1a}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x80}, 0x40) [ 334.280894] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getegid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000100)=[0xee00, 0xee00, 0xffffffffffffffff, 0xee00]) setgroups(0x3, &(0x7f0000000140)=[r1, r2, r3]) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:00 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585605, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x0, 0x3001}}) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) 08:31:00 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 08:31:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:00 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x280800, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x14) connect(0xffffffffffffffff, &(0x7f0000000040)=@nfc={0x27, 0x1, 0x1, 0x7}, 0x80) prctl$PR_GET_FP_MODE(0x2e) 08:31:00 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x5, 0x0) 08:31:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x42982, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x11a, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r2, 0x0, 0x0, 0x0) dup2(r0, r4) 08:31:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x7614}, 0x28, 0x1) [ 334.864964] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:01 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000e80)=@nat={'nat\x00', 0x19, 0x3, 0xd60, [0x20000100, 0x0, 0x0, 0x20000280, 0x20000ca8], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x5, 0x8914, 'syz_tun\x00', 'irlan0\x00', 'syzkaller0\x00', 'nr0\x00', @remote, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0xb0, 0x118, 0x150, [@time={'time\x00', 0x18, {{0xffffffff80c3e17d, 0x7, 0xe4a5, 0x11adb, 0x6, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@broadcast, 0x10}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x7, 0x8, 0x890d, 'veth1\x00', 'nr0\x00', 'veth1_to_bond\x00', 'irlan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x950, 0x9c0, 0x9f8, [@among={'among\x00', 0x8b8, {{0x100, 0x0, 0x2, {[0x5, 0x4, 0x9, 0x0, 0x8, 0x3ff, 0x2, 0x5, 0x1, 0xfffffffffffffbff, 0x6d, 0x3, 0x5, 0x0, 0x8, 0x9, 0xffffffffffffffff, 0x0, 0x5, 0x40a, 0x4, 0x80000001, 0x0, 0x5, 0x7ff, 0x2, 0x5, 0x2, 0x1, 0x80, 0x207, 0x1, 0x4be6, 0x8000, 0x2, 0x80000000, 0xfffffffffffffffd, 0x2, 0x7f, 0x9, 0x0, 0x80, 0x6, 0x2c9, 0xb9e, 0xfffffffffffffa43, 0x42, 0x1ff, 0x8, 0x3f, 0x3, 0x5, 0x7, 0x0, 0x45, 0x358b, 0x100000001, 0xe9, 0x1, 0x401, 0x3, 0x6, 0x2ad, 0xffffffffffff8001, 0xfffffffffffffff9, 0x4, 0x0, 0x9, 0xfff, 0x4, 0x756e, 0x800, 0x89, 0x1, 0x80000000, 0xe6, 0x614f479e, 0x10001, 0x9, 0x40, 0x4, 0x5, 0x1, 0x3, 0x3, 0x100000000, 0x9, 0x3, 0x0, 0x200, 0x1, 0x3, 0x100000000, 0x7f, 0x8000, 0x3ff, 0x5e6, 0x7, 0x0, 0x3, 0xf5d, 0x19a1, 0x4, 0x19, 0x1, 0x9f2, 0x5, 0xffffffffffffff49, 0x7, 0x1c, 0xfffffffeffffffff, 0x562, 0x8110, 0x2000, 0x0, 0x9, 0x8d9, 0x0, 0x7, 0x0, 0x7, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x1, 0x8001, 0x101, 0x844f, 0x5, 0x7, 0x4, 0xffa1, 0x227, 0x1, 0x5, 0x0, 0x2f, 0x7fffffff, 0x7, 0x6625723a, 0xe88, 0x3ff, 0x2, 0x38, 0x7249, 0x1, 0x6, 0x6, 0x7f, 0x101, 0x7ff, 0xfff, 0x8, 0x9, 0x200, 0x5, 0x4, 0xa51e, 0x100000000, 0x3, 0x3f, 0x502, 0x4, 0x1, 0x8, 0x8, 0x6, 0x167, 0x5, 0x401, 0x8, 0x1, 0x7, 0x80000001, 0x1f, 0x7, 0xc1, 0xbf, 0x3f, 0x1, 0x7fff, 0x2, 0x4, 0x10001, 0x9, 0x2, 0x57, 0x1, 0xdf7f, 0xc52b, 0x41fd, 0x9, 0x1, 0x2, 0x3, 0x7, 0xa1c4, 0x10000, 0x2, 0x10001, 0x9, 0x5, 0xff6, 0x1, 0x4, 0x7, 0x2, 0x0, 0x5, 0x8, 0x6a4, 0x5, 0x6, 0x7, 0x2, 0x80000000, 0x53, 0x3f1, 0x100, 0x84c, 0x100000001, 0x6, 0x3f, 0x5, 0x7, 0x401, 0xffffffff, 0x8, 0x6, 0x2, 0xffffffffffff0001, 0xe1a, 0xffffffff, 0x2, 0x101, 0x9, 0x8, 0x0, 0x101, 0x7, 0x7fff, 0x100, 0x2, 0x4, 0x7f, 0x100, 0x0, 0x10001, 0x0, 0x20, 0x10001, 0x1, 0x2, 0x0, 0x5], 0x8, [{[0x6, 0x80000000], @multicast2}, {[0x1, 0x7], @dev={0xac, 0x14, 0x14, 0x16}}, {[0x1, 0x100000000], @multicast2}, {[0x86, 0xd2f], @multicast2}, {[0x3], @local}, {[0x5, 0x3], @remote}, {[0x1000, 0x9], @remote}, {[0x80, 0x9], @broadcast}]}, {[0x6, 0x6, 0x9, 0x1, 0x7ff, 0xffff, 0x668, 0x9, 0x92, 0x33c44bfe, 0x7, 0x30000, 0x8a, 0xf2b1, 0x8, 0x2, 0x64, 0x25, 0x2, 0x1f, 0x1, 0x4ae, 0x3800000000, 0x8, 0x7f, 0x0, 0x4, 0x4, 0x2ecb, 0xcc, 0x5, 0x7000, 0x80, 0x7, 0x7, 0x1, 0xc4, 0x87cd, 0xffffffffffff7fff, 0x7, 0x8, 0x8, 0x0, 0xffffffff7fffffff, 0x4, 0x2, 0x2, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe513, 0x4, 0x8000000000, 0x6, 0x4dd, 0xff, 0x3, 0x0, 0xea19, 0x101, 0x8, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x7, 0x5, 0xfff, 0x2, 0x0, 0x7ae0, 0xa7e9, 0x0, 0x8000, 0xa59, 0x6, 0x6, 0x40, 0x7f, 0x2, 0x8000, 0x9, 0x1, 0xffffffffffff8001, 0x7, 0x7, 0x200, 0x0, 0x7ca, 0x400, 0x8, 0x1aee, 0xd75, 0x1000, 0x8, 0x80000000, 0x5, 0x4, 0x8, 0x1, 0x2, 0x40, 0x3ff, 0xffffffff, 0x2, 0x20, 0x80000001, 0x7b5a921e, 0x5, 0xfffffffffffffff8, 0xaafe, 0x80, 0x3, 0x9, 0xfffffffffffffffc, 0x3, 0xfff, 0x1, 0xffff, 0x0, 0x3, 0xfff, 0x9, 0x0, 0x800000000000000, 0x0, 0x4, 0x0, 0x0, 0x69cf, 0x48000, 0x0, 0x8, 0x100, 0x3, 0x100, 0x1f, 0xfffffffffffff800, 0x4, 0x0, 0x7, 0x1, 0x8, 0x0, 0x80000000, 0x8, 0x9, 0x100, 0xdc3, 0x8, 0x0, 0x4, 0x1000, 0x3, 0x9, 0x100000000, 0x5a, 0x400, 0x1000, 0x0, 0x8c2, 0x80000001, 0x6, 0x200, 0x1, 0x4, 0x4, 0x6, 0x0, 0x7fffffff, 0x276, 0x3, 0xb0, 0x63, 0x3, 0x8, 0x9, 0xfffffffffffffffe, 0xffff, 0x6, 0x1, 0x1f, 0x101, 0x76f3, 0x80000001, 0x2, 0x188a, 0xfff, 0xff, 0x40, 0x65, 0x80, 0xef, 0xff, 0x4, 0x3, 0x8, 0x80000000, 0x325, 0x4, 0x2, 0x800, 0x10001, 0x2, 0xcf5, 0x1f, 0x7c000000000, 0x6, 0x0, 0x44, 0x0, 0x5, 0x10001, 0x3, 0x80000000, 0x6, 0xffff, 0x65b, 0x2, 0x7f000000, 0x8001, 0x8, 0xad, 0x1, 0x100000000, 0x7f, 0x2d74, 0x8c, 0x7fff, 0xffff, 0x80000000, 0x6, 0x101, 0x80, 0x0, 0x40, 0x2, 0x2, 0x8, 0x10001, 0xfbea, 0x8, 0x4f2b, 0x4, 0xba9, 0x3729, 0xffffffffffffffe0, 0x1c4, 0x401, 0x8, 0x6, 0x20, 0x3, 0x7, 0xef1a], 0x5, [{[0x74d7482f, 0x101], @multicast1}, {[0xfff, 0x4], @empty}, {[0x80000001, 0x1ff], @empty}, {[0x0, 0x5], @dev={0xac, 0x14, 0x14, 0x22}}, {[0x10000, 0xffffffffffffffd0], @initdev={0xac, 0x1e, 0x1, 0x0}}]}}}}]}, [@snat={'snat\x00', 0x10, {{@random="ebbc056ebed0", 0x10}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x3, 0x3, 0x8af9, 'ip6gretap0\x00', 'ipddp0\x00', 'lapb0\x00', 'lo\x00', @remote, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xe8, 0x120, 0x158, [@mark_m={'mark_m\x00', 0x18, {{0xfffffffffffff001, 0x100000000, 0x1, 0x1}}}, @cluster={'cluster\x00', 0x10, {{0xfffffffffffffff7, 0x0, 0x1}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0xdd8) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000f40)={0x0, {0x2, 0x4e23, @rand_addr=0x3ff}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @remote}, 0x1e, 0x0, 0x0, 0x0, 0xdd, &(0x7f0000000f00)='bond_slave_0\x00', 0x800000, 0xfffffffffffffffa, 0x80000001}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000fc0)=0x63, 0x2) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000001000)=""/70, &(0x7f0000001080)=0x46) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000010c0)={0x0, 0x20, 0x8, 0x73}, &(0x7f0000001100)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001140)={r1, 0x8f3, 0x1, 0x1}, &(0x7f0000001180)=0x10) ioctl$KDSKBLED(r0, 0x4b65, 0xffffffff) sendto(r0, &(0x7f00000011c0)="f7027c0879f8500289820a2ed70f54500db66e2347cc4f4d8b476d3494f5103b99408d35ea28b6dfaeca2d2dee393a193bd4599db7834385d61c0c0567146717a81035b9deb47096b6234e9d4bb2b56cf49c0bf1b026374988ca615d1a1e6a21954ba431f7f020145e5409877260a5048aeabab8c624245c67", 0x79, 0x80, &(0x7f0000001240)=@un=@file={0x0, './file0\x00'}, 0x80) rt_sigreturn() lsetxattr$trusted_overlay_redirect(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)='trusted.overlay.redirect\x00', &(0x7f0000001340)='./file0\x00', 0x8, 0x3) unlink(&(0x7f0000001380)='./file0\x00') ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000013c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001400)={r1, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x23}, 0x1ff}}}, 0x84) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000015c0)={r0, r0, 0x1, 0xd0, &(0x7f00000014c0)="7e22ddb7b84ff0df3c9b5a015c5f9dc25c200a28e8158f54d29d466efe5cd05df8303d71c597b41fd77eb218cbcd8bf5ef51eda60acaee7772e98c1a8052150232490b0df5dc94ae94867ac4af522c4bb1a886b298c27981a0a3826861b7b07fdf8d663ca98405134de30e2bace6b16c8d6d8faf7ffabaed0e6d86e927656ed8a637feb9cdffa1d823960fbc4ccf178b8ae62c18b70448bffbfd41fb82193095732dc40bfa76df45f9eca2f743c3e00c9601c68acd91cd6fcdfe25b30a01c77b4f65ce5ff233c45d330eb50654c1bd94", 0x5, 0x6, 0x3, 0xfffffffffffffffa, 0x1, 0x1, 0x0, 'syz1\x00'}) prctl$PR_SET_FP_MODE(0x2d, 0x1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000001680)={r1, @in={{0x2, 0x4e20, @multicast1}}}, 0x84) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000001740)) r3 = accept$packet(r0, &(0x7f00000017c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001800)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000001840)=r4) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000001880)) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000020c0)={0x1, {{0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}}}, 0x88) prctl$PR_SET_ENDIAN(0x14, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000002180)={0x40000, 0x0, [0x101, 0x9b, 0x9, 0xff, 0x3, 0x9, 0xffff, 0x3a90cacd]}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000002200)=""/17) getpeername(r3, &(0x7f0000002240)=@tipc=@name, &(0x7f00000022c0)=0x80) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000002300)=r2, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000002340)='/dev/net/tun\x00', 0x0, 0x0) 08:31:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x100) openat$cgroup_type(r1, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) [ 335.117081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:31:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x1, 0x8, 0xfffffffffffffffb, 0x9}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200400, 0x0) 08:31:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x81, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x40) [ 335.354445] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 08:31:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) accept$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={@rand_addr="9cf99e2eb549e033ff61d4a7dd6aab93", @rand_addr="b7af88072759bdf84d5a16e40f1431f9", @mcast1, 0x3, 0x3, 0x6, 0x500, 0x8, 0x0, r1}) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x0, 0x4, 0x7, 0x3, 0x3f, 0xfd, 0x145, 0x40, 0x30c, 0xffffffff, 0x9, 0x38, 0x1, 0x2, 0x6, 0x9}, [{0x7, 0x3ff, 0x5, 0x400, 0x4, 0x3, 0xde90, 0x5}, {0x60000000, 0x8, 0xc9, 0x6, 0x6, 0x80, 0x1faa0d9f, 0x1000}], "3a32b5a81cfe438b45b45ba9f476f3b52eb6a21bcbdb16ba783fb76e269f2430941327ebf9767c127f4d766c4e11b75e97bb175f5a85401aa0380635723ad81cdadd80ef0f2a2acb6c30ed9d3bee6075dd9204472d98900a7a1e421214c411d83a3b24c3164facb86118c1ddb34b5e4da2a31834a7efe0e5123a4582ff174a9c8d7b1b1dc0be12aef14bbdf5afa1757819e1280d8a1d57f7645f196f967b2cca379926ce55093c5432460120d1d5667c5c12d38ab974ec876c6fdfc57a3a9bba306d88b4a18a7b9bed50a05bc55ca5d7b047f9535926c658d9ad23d736f90894d861b90079ea687c31", [[], [], []]}, 0x499) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f00000005c0)={0x400, 0xffffffffffffff1a, 0x3, 0x100}) 08:31:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@empty}, 0xc) r1 = getpgid(0xffffffffffffffff) sched_setscheduler(r1, 0x3, &(0x7f0000000040)=0xfffffffffffffffc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x161882, 0x0) 08:31:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0xfffffffffffffd81) 08:31:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000080)) [ 335.934959] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) [ 336.464741] IPVS: ftp: loaded support on port[0] = 21 [ 336.610566] chnl_net:caif_netlink_parms(): no params data found [ 336.658874] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.665347] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.673889] device bridge_slave_0 entered promiscuous mode [ 336.682275] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.688715] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.696658] device bridge_slave_1 entered promiscuous mode [ 336.720561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 336.732014] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 336.755039] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 336.763073] team0: Port device team_slave_0 added [ 336.768944] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 336.777168] team0: Port device team_slave_1 added [ 336.783099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 336.790892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 336.865942] device hsr_slave_0 entered promiscuous mode [ 336.902446] device hsr_slave_1 entered promiscuous mode [ 336.952660] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 336.959879] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 336.982525] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.988959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.996128] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.002707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.065745] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 337.071888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.083276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 337.094253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.103641] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.110976] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.119635] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 337.134455] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 337.140527] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.154410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.163710] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.170198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.185164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.193636] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.200108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.226277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.236235] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.252732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.269453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.285254] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 337.298005] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 337.304181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.313598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.335711] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 337.350462] 8021q: adding VLAN 0 to HW filter on device batadv0 08:31:03 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x202000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/exec\x00') openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@initdev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f00000004c0)=0xe8) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, 0x0, r1) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="10002014007968000000000018ab"], 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x9002600}, 0xc, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x11e}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setuid(0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x1, 0x104) 08:31:03 executing program 1: msgget(0x1, 0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:03 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0xfffff7ffffffff01, 0x1) 08:31:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:03 executing program 4: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_SETMODE(r0, 0x5602, 0x0) r1 = inotify_init() setxattr$security_evm(0x0, &(0x7f0000000100)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000004000)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0], 0x29) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) stat(0x0, &(0x7f0000000680)) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000740)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) 08:31:03 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80000, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xf, &(0x7f0000000040)=""/60, &(0x7f0000000080)=0x3c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1f, 0x0, 0xfffffffffffffd83) [ 337.550643] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:31:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x6) 08:31:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x52f7, 0x0, 0x1, 0x4, 0x7c1, 0xa9, 0x8, 0xfffffffffffffffb, r2}, &(0x7f0000000140)=0x20) 08:31:03 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000040)={{0x3, 0x8}, {0x2, 0x100000000}, 0x7, 0x6, 0xfffffffffffffbff}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) [ 337.931319] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x4c, 0x0, 0x0) 08:31:04 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x1, 0x40002) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0xae, &(0x7f0000000040)="4dd14de561ce6d339be1b83d02a0da37bc94aea494c9a300b90aa5f95fa1f5a3973434f93904fe0596065ecf1c744b7baa5ae9c1dd396f7526187197f9d2e9fdc389c68c9332735b99f9786dc0402b64e155c707dd4691fdb0e4f46cd3fc7058015e0c296eabec2bd4d84d51811184e8eb957632b32b34bf1dcb00911f2aaf9da3737d9c5541a2c5fca5a3bce82b4435d3b9136239016ff22f20a08b54c290583036730cdd02f23626e58bc71c25"}) bind$rds(r0, &(0x7f00000001c0)={0x2, 0x4e20, @broadcast}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) 08:31:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000100)={@dev, @remote, 0x0}, &(0x7f0000000140)=0xc) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x81, 0x900) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000080)) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r1}, 0x14) 08:31:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0xfffffffffffffff3) 08:31:04 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) [ 338.350080] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:04 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') 08:31:04 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) fdatasync(r0) 08:31:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) r2 = accept$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000240)=0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x8, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x3, 0x20, [], 0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=""/32}, &(0x7f0000000480)=0x78) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000200)={@rand_addr="05d76c4df397c0b64977107ef12dfe48", r1}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) 08:31:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) 08:31:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6f1a, 0xfec3, &(0x7f0000000240)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r1, 0xd}, 0x10) [ 338.848546] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:04 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x113, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0xd6, "9a2d91", "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"}}, 0x110) 08:31:05 executing program 2: pause() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0xbe) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x0, 0xc) 08:31:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = dup(r0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000040)="e2367557afdfc626d2abe7c7414f9dfda6e2c6594656f0730874e71c056f46621c", 0x21) 08:31:05 executing program 4: add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 08:31:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x2, 0x3, 0x5, 0x6, 0xffffffffd7d6adc9, 0xf6, 0x8, 0x7fff8, 0x1, 0xfffffffffffffffe, 0x8d}, 0xb) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x1) 08:31:05 executing program 0: syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0xfffffffffffffffc) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xd18, 0x280000) [ 339.276525] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:05 executing program 1: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) setrlimit(0xf, &(0x7f0000000080)={0x10001, 0x8}) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) shutdown(r1, 0x1) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xee, 0x0) ioctl$TIOCCBRK(r2, 0x5428) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000000000)={0x1}) ioctl$FICLONE(r0, 0x40049409, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000380)={@local, r4}, 0xffffffffffffffd1) getsockopt$inet_buf(r2, 0x0, 0x2b, &(0x7f0000000180)=""/83, &(0x7f0000000100)=0x53) 08:31:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:05 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0xfe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 08:31:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x200, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x8, @media='eth\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x880}, 0x48014) [ 339.671992] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) 08:31:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200001, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000040)={0xec, 0xb, 0x2e, "03379ca71bb2eac1b7f2d1d8115d274f58482ab2de07ea973760d26bfb304270f53409069fb5b5465f0ae5c8a74b743ad5b1fa01e7b3abc5fbb1c6ef", 0x0, "f7d403dc14acd550dbefd4c71aa03e045f766491257dd42049898638d6db9dc9ff8cdf1c8795bdfe3205dee0d7c4900a6060d37b3c6a169c6681a92d", 0xc0}) 08:31:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000240)={0x6}, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) 08:31:06 executing program 4: ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) socket$kcm(0xa, 0x0, 0x11) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x1, &(0x7f00000000c0)=@raw=[@alu={0x0, 0x9, 0xf, 0xd, 0xf, 0x0, 0x8}], 0x0, 0x6}, 0x48) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008107e00f80ecdb4cb9d911631912080003003b000000120001000300000040d819a9060015000000", 0x2e}], 0x1}, 0x0) 08:31:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) [ 340.164871] kernel msg: ebtables bug: please report to author: Wrong len argument [ 340.198890] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 08:31:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) [ 340.302941] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 08:31:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:31:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000240)="fcde4f19649e88e8fae1e982da6d08f3436a22922786525e03a199a6892baf69aaaa11e2ed8141e4d2"}, 0x10) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80, 0x400000) readahead(r0, 0x3, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000200)={0x1, 0x9}) mq_timedsend(r2, &(0x7f0000000080)="0f9c68dc344aca800d28187416e06a9008ecea6ad0cdc1d6b992dee276ba34eeb717ca7a906f89d783bbaebe23e8ab707aa6bea6db62004ded57ccd60796e6205167a83677e4021df70b946b1085012d18dc7f798b884e62e029378cf5f943d577a4399e399731ec3b0ebc5fe4d4f44872ab621db42b72658e04037e99d4c2022b8579f1ff4b691f87ecc200e5ccb68a5d23ce390a2702fa573cb575818b4b38364063e2845aa9e32a40fdf2f09f02de1ac6beb3292065759f13834523da0490541f9ad6cf2e47", 0xc7, 0x7, &(0x7f0000000180)={0x0, 0x1c9c380}) sysfs$3(0x3) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f00000001c0)) fgetxattr(r1, &(0x7f00000002c0)=@random={'security.', '@\x00'}, &(0x7f0000000300)=""/77, 0x4d) 08:31:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="00fb540275ad99539ba80101b99b7dfbb2e39428251f8f0a8882f45443a4ad8333e7a55451f010dd171f173f2294945003a173c447b9b04313ee38c007c9c2fcce8e622d3232d56a8ca5f23449e177c064b70b62"], 0x54, 0x3) 08:31:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) 08:31:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x9, 0x5d6, 0x8, 0x4, 0x1}, 0x2c) [ 340.600708] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x200007, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x800, 0xf, 0x7}) 08:31:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000500)='t\n_\x8a\x06^r\xa7\xf5\x16u\f#S\xbfM\x92\a\x9f', 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 08:31:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000480)={0x42bc, 0x100000001, 0x20, 0x3, 0xb, 0x8, 0x20, 0x9, 0x1, 0x1, 0x7fff, 0x1ff}) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x88) sendmsg$nl_generic(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="780000003c00000327bd7000fedbdf251a00000008307b8bb7f30372c13fb4fbfa77a85c69862d1d3ae58558316f84c52e8cd4959dcfa8ff377fb1c8edfe9f84b69dada24c32430a8d18ba452be761e87b84c2d64d5bb00796b8b0e52572b1f6fcbb5c87f76d67d3485840c99ad5ece57437bf060d0000007793eab03e22a35b8dbcdc3e7ea0d295aefcff92d88ca610b2d35d612a0f91d751f9ed15c4ec5e4558809faebaa73b21af136ed5f0f302248737b6356b303db7e220e97458987bdad27f0e1c641371b5a065fc8464680007edcb6b3c26df0f3defee6146be2350b87b62df45fe4c472ecc874cca317638c1b861b2663dd8b1a7006b49bdd946ca1d5869a22c5738298564e5f5216d93afb10eefe1eab953b81702944e8046905777d5b2"], 0x78}, 0x1, 0x0, 0x0, 0x801}, 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x17, &(0x7f0000000380)={@remote}, 0x14) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x10000, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10002, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0xd50b, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e24, 0xfffffffeffffffff, @dev={0xfe, 0x80, [], 0x23}, 0x800000000}}}, &(0x7f0000000280)=0x84) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000340)={0xfff, 0x100000000, 0x100000001}, 0x10) connect$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0xffffffff, 0x3, 0x1f, 0x1, 0x4, 0x3c01}, 0x4}, 0xa) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000100), 0x4) bind$isdn_base(r3, &(0x7f0000000040)={0x22, 0x82, 0xffff, 0x84fa, 0x81}, 0x6) 08:31:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)="290000001800190000003fffffffda0602000000fde80001024000040d0005e3ff0400000005000000", 0x29}], 0x1) r2 = socket(0x2, 0x0, 0xb7) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000000)={0x9, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet6_mreq(r0, 0x29, 0x21, 0x0, 0xcd4) r3 = dup(r2) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000040)) socket$inet6(0xa, 0x7, 0xc5a9) 08:31:07 executing program 4: r0 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x4, 0x0, 0x1000000004) [ 341.099195] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:07 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f00000000c0)='schedstat\x00') syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x4) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 08:31:07 executing program 5: socket$packet(0x11, 0xffffffffffffffff, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) keyctl$clear(0x7, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 08:31:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:07 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) close(r0) 08:31:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000080)={{0x2, 0x2, 0x5, 0x6, 0x0, 0x7ff}, 0x3}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @window={0x3, 0x8001, 0x93}, @timestamp, @window={0x3, 0x7, 0x80000000}, @mss={0x2, 0x1}, @timestamp, @window={0x3, 0x200, 0xffffffffffffffff}, @timestamp, @window={0x3, 0x6, 0x6}, @window={0x3, 0x5, 0x7ee}], 0xa) [ 341.525659] kernel msg: ebtables bug: please report to author: Wrong len argument 08:31:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x0, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:07 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x14}, 0x14}}, 0x4880) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89a0, &(0x7f00000000c0)={r0}) 08:31:07 executing program 4: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x200) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 08:31:07 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x1, 0x0, 0x80, &(0x7f0000ffc000/0x2000)=nil, 0x3}) 08:31:07 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x3) r1 = accept(r0, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x14, 0x0, 0xe608d38cff8591eb) 08:31:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x159080) ioctl$TUNSETLINK(r1, 0x400454cd, 0x5) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x0, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) [ 342.049147] IPVS: ftp: loaded support on port[0] = 21 08:31:08 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000004, 0x10, r0, 0x0) 08:31:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x9, 0x200000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000200)={r1, 0x3, &(0x7f0000000100)=[0x9794, 0x8, 0x5], &(0x7f0000000140)=[0x4, 0x3, 0x4, 0xde], 0x77, 0x3, 0x7fff, &(0x7f0000000180)=[0x3ff, 0x1, 0x400], &(0x7f00000001c0)=[0xfffffffffffffeff, 0xd80]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x200200) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f0000000040)=0x5008) 08:31:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1000002, 0x32, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000080)) 08:31:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x0, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:31:08 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x81, 0x2) fcntl$addseals(r0, 0x409, 0x2) [ 342.561870] IPVS: ftp: loaded support on port[0] = 21 08:31:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) fallocate(r0, 0x3, 0x0, 0x1000) 08:31:08 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x464100, 0x0) chroot(&(0x7f0000000000)='./file0\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000340)=0x75) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), 0x8) write$sndseq(r0, &(0x7f0000000200)=[{0x6, 0x7b7, 0x1ff, 0x3, @time={0x0, 0x1c9c380}, {0x4, 0xd371}, {0x0, 0x3772e0c0}, @connect={{0x3, 0x3}, {0x7fffffff, 0x2}}}, {0x9, 0x4, 0x9, 0x2, @time, {0x1, 0x8}, {0x40, 0x8}, @note={0x3, 0x629, 0x4, 0x10000000000000, 0x10001}}, {0x0, 0x1, 0x81, 0x7, @tick=0x8, {0x0, 0x5}, {0x1ff, 0x7f}, @quote={{0x25, 0x4}, 0x7fffffff, &(0x7f00000001c0)={0x3, 0x3f, 0x101, 0x800000, @tick=0x1, {0x10000, 0x5}, {0x1f, 0x1ff}, @time=@tick=0xfffffffffffffff7}}}, {0x8, 0x3, 0x8, 0x8000, @time={0x77359400}, {0x7, 0x80000000}, {0xffd1, 0x81}, @result={0x4, 0x7ff}}, {0x7, 0x8302, 0x6, 0x0, @time, {0x8, 0x7}, {0x3, 0x400000008000}, @raw8={"8759e156ffc28659296d907a"}}, {0x7, 0x5, 0x1, 0x81, @time={0x0, 0x1c9c380}, {0xfff, 0x9}, {0x10001, 0x6}, @control={0xfff, 0x6}}], 0x120) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000003c0)=r2) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1c, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/136, 0x64) 08:31:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x80000000000802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x11, [0x7ff]}, 0x45c) 08:31:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) recvmmsg(r0, &(0x7f0000007c80)=[{{&(0x7f0000000040)=@x25={0x9, @remote}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/140, 0x8c}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000000280)=""/21, 0x15}, {&(0x7f00000002c0)=""/143, 0x8f}, {&(0x7f0000000380)=""/217, 0xd9}], 0x5, &(0x7f0000000500)=""/32, 0x20}, 0x10001}, {{&(0x7f0000000540)=@pppol2tpin6, 0x80, &(0x7f0000001840)=[{&(0x7f00000005c0)=""/190, 0xbe}, {&(0x7f0000000680)=""/91, 0x5b}, {&(0x7f0000000700)=""/81, 0x51}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/139, 0x8b}], 0x5, &(0x7f00000018c0)=""/188, 0xbc}, 0x5}, {{&(0x7f0000001980)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001a00)=""/238, 0xee}, {&(0x7f0000001b00)=""/144, 0x90}, {&(0x7f0000001bc0)=""/61, 0x3d}, {&(0x7f0000001c00)=""/39, 0x27}, {&(0x7f0000001c40)=""/189, 0xbd}], 0x5, &(0x7f0000001d80)=""/4096, 0x1000}, 0xffffffff}, {{0x0, 0x0, &(0x7f0000005180)=[{&(0x7f0000002d80)=""/164, 0xa4}, {&(0x7f0000002e40)=""/147, 0x93}, {&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000003f00)=""/90, 0x5a}, {&(0x7f0000003f80)=""/94, 0x5e}, {&(0x7f0000004000)=""/95, 0x5f}, {&(0x7f0000004080)=""/135, 0x87}, {&(0x7f0000004140)=""/17, 0x11}, {&(0x7f0000004180)=""/4096, 0x1000}], 0x9}, 0x20}, {{0x0, 0x0, &(0x7f0000006300)=[{&(0x7f0000005240)=""/4096, 0x1000}, {&(0x7f0000006240)=""/154, 0x9a}], 0x2, &(0x7f0000006340)=""/194, 0xc2}, 0x7}, {{&(0x7f0000006440)=@nfc_llcp, 0x80, &(0x7f00000065c0)=[{&(0x7f00000064c0)=""/207, 0xcf}], 0x1, &(0x7f0000006600)=""/225, 0xe1}, 0x5}, {{&(0x7f0000006700)=@sco, 0x80, &(0x7f0000006c00)=[{&(0x7f0000006780)=""/218, 0xda}, {&(0x7f0000006880)=""/193, 0xc1}, {&(0x7f0000006980)=""/194, 0xc2}, {&(0x7f0000006a80)=""/225, 0xe1}, {&(0x7f0000006b80)=""/127, 0x7f}], 0x5, &(0x7f0000006c80)=""/4096, 0x1000}, 0x6}], 0x7, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000007e40)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1a, r1}) 08:31:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:09 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x18) 08:31:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1f, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000000)=""/239) 08:31:09 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getuid() prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x22) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 08:31:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='schedstat\x00') pread64(r1, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 343.247424] input: syz1 as /devices/virtual/input/input9 08:31:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000001400)='./file0\x00', 0xf5a00376a3f2d14, 0x80) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001440)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x800) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000014c0)=0x14) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=@srh={0x2c, 0xc, 0x4, 0x6, 0x2, 0x30, 0xfffffffffffffffd, [@mcast1, @local, @mcast2, @mcast1, @rand_addr="36d4ab25402596caf90dbf83b7e6b40c", @empty]}, 0x68) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000001540)={r1, r2, 0x9, 0x1d, &(0x7f0000001500)="46d19d304d49eccf242b99d9ef61109e1b2d5ecf00769ee57ec5cbfda3", 0x83c, 0x180000, 0x200, 0x229f, 0x7, 0x3, 0x101, 'syz0\x00'}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0xd5e23647a2e597e4, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, &(0x7f00000000c0)="4aab4131a32a55ae8f6e028c1e3dcc040413c9c0e59635836c951c702ffe6b9d867da1b3c67c6dc800ca6dc4b5431157cf9b842b3f2461495a6019e54a149a2b86382586a5e5e417f2be40cfe04073f7c2c929dbd0496f7994be933682bc546192d3cc0ee412378954deff655744386054ed4d6e9879dd696432d30970be31cb059a1c207a4290f9a82be8660c408826563f23d0197bf52ce462dd1c8702dd3f3aea6a20467f4c8e25c728dca47343403b42953449d9dbdb641070beddf25ed6090f92adcddba027fbb247b0f6a447fd677b777e5eeb8322923440", &(0x7f00000001c0)=""/254}, 0x18) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8, 0x80) [ 343.378431] input: syz1 as /devices/virtual/input/input10 08:31:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20004010) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 08:31:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:31:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000240)='./control\x00', 0x0) r1 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) readlinkat(r1, &(0x7f0000000000)='./control\x00', &(0x7f0000000080)=""/218, 0xda) rmdir(&(0x7f0000000040)='./control\x00') 08:31:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x101002, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x4000, 0x1}) write$FUSE_BMAP(r1, &(0x7f0000000140)={0x18, 0x0, 0x8, {0x1}}, 0x18) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f00000000c0)={0x2, 0x0, [{}, {}]}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000180)={@remote}, 0x14) 08:31:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) 08:31:10 executing program 0: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfc, 0x0) 08:31:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x4b, 0x1e, 0x8000000001}, 0xd) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), 0x0, 0x2}, 0x20) 08:31:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000240)) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000200)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff3000/0x4000)=nil, 0x1000, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000fef000/0x10000)=nil, 0x10000}, &(0x7f0000000080)=0x10) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x20, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x4, 0x2, 0x1}) 08:31:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000000000000000000616f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000000000000007000000070000000a0000000434f4e4e5345434d41524b00000000000000000000000000000000000000000008000000000000000000000000000000282069f7319b78b117cd8ad12a02dc083f2a"]}, 0x2ba) 08:31:10 executing program 5: r0 = socket$inet(0x10, 0x80003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 08:31:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) 08:31:10 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc, 0x32, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000240), 0x0) 08:31:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@remote, r1}, 0xffffffa2) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000080)={0x3, 0x1000}) 08:31:10 executing program 0: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x80000007, 0xc000) 08:31:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:10 executing program 4: ioperm(0x0, 0x7, 0x0) 08:31:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm], 0x4) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) [ 344.900214] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 08:31:11 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0xc, 0x0) fcntl$notify(r0, 0x402, 0x20) 08:31:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@empty}, 0x14) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4a000, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x1, 0x46, 0x80000000, 0x9}, 0x6c07bf84) 08:31:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) 08:31:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000005140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[{0xc}], 0xc}}], 0x1, 0x0) 08:31:11 executing program 5: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0xffffffffffffffff}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 08:31:11 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x1) read$eventfd(r0, &(0x7f0000000300), 0xa76cb167f4837a6d) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'batadv0\x00', {0x2, 0x4e21, @loopback}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000003c0)={r2, 0x5, 0x8, 0xfff, 0x9c8, 0x3b}, &(0x7f0000000400)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syzkaller0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@local, @in6=@rand_addr="957461f7429393144021bf631ec68d9b", 0x4e24, 0x800, 0x4e22, 0x1, 0x2, 0x80, 0x80, 0x3e, r3, r4}, {0x9, 0x5, 0x3, 0x6, 0x4, 0x3, 0x2, 0x10000}, {0xc, 0xfffffffffffffffb, 0x80000001, 0x3}, 0xa9, 0x6e6bb1, 0x0, 0x1, 0x3, 0x2}, {{@in=@loopback, 0x4d2, 0xff}, 0x2, @in=@loopback, 0x34ff, 0x3, 0x2, 0xfff, 0x1, 0x40, 0x9}}, 0xe8) 08:31:11 executing program 0: socketpair(0x11, 0x6, 0x100000001, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x6, 0x9, 0x60a, 0x7fffffff, 0x0, 0xe473, 0x8, 0x7}, 0xb) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x200, 0x4) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000100)={0x5, 0x9, 0x1f, 0x506}) 08:31:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x102c2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000080)=""/209) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2ba) [ 345.603769] input input11: cannot allocate more than FF_MAX_EFFECTS effects 08:31:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1d, 0x0, 0x0) eventfd2(0x1000, 0x0) 08:31:11 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) dup2(r1, r0) 08:31:11 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0xfffffffb, @host}, 0x0) 08:31:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000000)={&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0xbf, 0x0}, 0x40000022) 08:31:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x2ba) 08:31:12 executing program 1: socketpair(0x12, 0x5, 0x5, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 08:31:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000002940)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000002980)={0x7fff, 0x101, 0x80000000, 0x7fffffff, 0x5, 0x8}) r2 = syz_open_dev$usbmon(&(0x7f0000002780)='/dev/usbmon#\x00', 0x8, 0x1) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000002800)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000002900)={&(0x7f00000027c0), 0xc, &(0x7f00000028c0)={&(0x7f0000002840)={0x50, r3, 0x700, 0x70bd25, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3f}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x21}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004841}, 0x4000000) setsockopt$inet6_mreq(r0, 0x29, 0x1d, 0x0, 0x0) sendmmsg(r0, &(0x7f0000002680)=[{{&(0x7f0000000140)=@ax25={{0x3, @null}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="4915e9b6b5be6345a35163c08864af4c37394761adf394131108da08910b627acd46c94b2f1e482ad06eba300abd6a1b869593484f92928d4e6c6811cde77d20a9d8ecc1efe5d873934adcccc561342d1839a68ebf8a22657d003baf4c0507fbc123eacfcb8e079c2dc7f9acbd62e979fe159fad36b70a917ac64a502cfbe0ef69570bef8067a45d00de166993f4025c2046be11b550a481a63168f7705e97550ed8815c8bf76c59b2c66235ac7c4b1baaefcfd9b3e944c078c69ee5545aa4562aacf01a739b94c34ec0eb512cb4271b1971eeda6f97bbe061d6", 0xda}], 0x1, &(0x7f0000000300)=[{0x38, 0xff, 0x3, "45a22ed9643ab822c3af1533d80fe39f589de444351765abb3865af386589157be149231fe05"}, {0x70, 0xff, 0x100000001, "ff808d767f67f2e370922b878f9431c12a80a66ce41da2a56476a66cbd3035119561af438cdffd09a040d25c0cc23d06b12b436ca204b7e35b1e7ebee053227ee588238b8d389e618b8a8497d7a00cac2ab15e749ab0ff6ccf2d"}, {0x88, 0x13a, 0x8001, "a8e62f9a37397944547565c2485acfd2d129cdbf867e14b59199c96e81f8df95d9eecaaad0e99697eeeea711c50dfa14654549e2f4a7b6f3f35bda1a76a584ae47a5ace4cc44b7a11f5798c06db3b7751606077fc908a4b186d47a953c48a0b86790ec6bdefa9bb00fe1c3c3d101229bb38487"}, {0x80, 0x10c, 0x3, "7e28e4e22a26626a6f023f859c693cf5cd741bef293f4fdd32aeeb5b2fee44b1e2c5863a4f449280a2cbfa1adf1e69c23f2536f9e1015daa6854799d5f1e135de49c9a494f04855ba78c85a0bc42f0cf2db3473c8b662879efa43201de4d22119b23d025922c71083574"}, {0x108, 0x3a, 0x8, "e8eb99c5d2e544cb3420bd338c6706a5127a3916f6c903f07b16d08e063ecce3cc8f2e7bc2e287cc0bd1a3e1cdd416424cf27b01b9817664ed2924e3a53b465a13c2f12871388f73b8fc6befe3c012120110276934b2c036bd8f2123d3c633086e2745ba4b9202fbc2329a1ee31099af9865805d136f4a70480f87b291fed03ca21587d7aa7c944b3f32b6132cbb415fb9f1c15c089fe326fb21c444cc9f2aa42ffdd416324323eb8445142fdada22cfbf4553eb3ff8a54a7f1f7eaf2f020f7aae5568b6805b1162b5fb41f46e44c75e761407ef5430f47bbf3f8df777989cbf5df965385e6a8a2bdd3ea18726e6935ffbc3"}], 0x2b8}, 0x7f}, {{&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @rand_addr=0x735b}, 0x4, 0x4, 0x2, 0x2}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)="d001d8cfa5c4d2bdfde74e70d8cd25a811f9c099d498e2d3b2476f3374e5bb9f4d75c048d89c1fe3aec9637d71117ed13da53e05e5ac35dedb2fe5f928a7b15456e0f1850b465037985c673ddf6b81c13240e492830001e2d8f5338ade651691e031a893132b392edac7d83ab6", 0x6d}, {&(0x7f00000006c0)="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", 0xff}, {&(0x7f00000007c0)="6a3806cc28a41dbd88ea4cb866ed686f5612e613653b7ad0a4ee7b9100318ff54ae571bdf7a4fac1e5363d2afc6523614200b9e66657052b11bbb545dd6915ec5028c537f428a9ebc008cf2054d357a4e9", 0x51}, {&(0x7f0000000840)="de51827696a144ac7cbd9a8e13cb4b2f55dc765472776ac1c8dc2652bd32a83dfba98e8a2470614ae47e4a136e8c092e2cd00d8eeeb6311859eec70a59211d9b5763a3e997e5fb69c85c885bb6113b18d898cc282e40e4d51e3bae451d7179f2bd139e0024d63890fef12bf59946e43342e8b3b8097788fcb44f19b182d67ba06c5f40b6acb6126efb7b976be9687bf7723b863f748c7bca6208e1a9e7683d23d315db67d6094ba5d570f6838595f4d944db6d35b2a55fa09176", 0xba}, {&(0x7f0000000900)="42d426b0d66e813af9fbcb89a492a6753cbe1cf1416a5fcacd962ce65611817a562bc2f48f0162ffc4a2beec2fa508f4c500bac93f4d39b6ef20cbd7bd9abe7f6453ff65cef08226765e951f9077a9553f03c311da303de9ba7a2f8126767d040e8f560b33b113e2040f508616afdb9b5a89799195bc7a02c73842892652de8e654f7bc5ebd5d3fe56194313f639108c19deabd9015a19891364", 0x9a}, {&(0x7f00000009c0)="2c30bb6121025f522f22c330c36d1031ff3aa3db4ea4d21735ffe7c1644d249104a69d12", 0x24}], 0x6, &(0x7f0000000a80)=[{0x1010, 0x115, 0x7, "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"}, {0x40, 0x13f, 0x1000, "e870224f312fc9d8efc27afcd8bdf245d1c0a73197864a68e5dba37fd7c5adcc980fc33a68048fc73f89cc6495d2d54b"}, {0x78, 0x105, 0x875, "59bb5fe491ff612785eb51e4503f750c3cf42be215656df6c2a2b98a492998ea5ca3e50807410d7ef4adca1cd85645141a375dd2a89d26c71485c047a9c30356067c37916c811190eb7a8f0a95bc38cb46c140e60d60d9ac2f7e20149cde00f304f356"}, {0xd0, 0x1, 0x6, "a241c6af5de2dc1cece294a7943bff11605b188c3b2b892bdc5e8729559afb0b8f407cf130938109de24331c5382bcad13cca9de9d2cc91273e7e5ac1402d058f420235b20ab86a542a996d3faa8354cf28a34425ca1f8ca8b1904799889ab106b980d985d82a6acfa8335cda0cac52afccebb3e07552f68b0bdfcc72a908a6e48609eb6e4f3f7f9a4c03f85df88e4601081b659e43423d9470766c5cad28f93dc771aeae01eefa45324414e5e95b3e01a2d947198db62826fec66a5e00223"}, {0x50, 0x13f, 0x5, "dc023f929acbe1a7ad383831f0ba7909607f7623613c23389c16e8e5ff4ff5226e8db06fe243b9b89132a6ddfcf42819b35928c3fe7a1ae541f881033a71"}, {0x70, 0x13f, 0x6, "635be6561261acd5b53a3818886ef1f4d2900b8e04fb50704e5a3e5df2340fa6452e4444b072d32754d77e49cc118d8834b929df03fbbc627a2f89ef5705407b49bfc278dbe9f7667c88b711139650ff15231f2974d9a3acc0a90276a1897b1d"}, {0xe8, 0x118, 0x0, "4fd49fcec197c8c888787ad99e1d59cf4e953b6e56a5006d49b5ead09ce197b974f6d68f7c9384e02210705a910e4ab44fd8157574737e286da3a395296c2e8b203443161efe2b2a6a09b6bdd532c509e24473d164077d290343535aa271d415dd09d03b901c499c5015881b6cba3bd608f23c855f22013ac94f8f6b2eab82db52f8a827ae54d46067451dc1030ffd0dcb05bc286336a54c2012c8c4949f9ec8373faf38dfd89721aa04aa596968290c46a6ba2a19596b84dc26c8c7cf4112b135689f369e648dc659ca2244a476c67dec24"}], 0x1340}, 0xfff}, {{&(0x7f0000001dc0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x156213c2, 0x0, 0x8001, 0x4}}, 0x80, &(0x7f0000002480)=[{&(0x7f0000001e40)="c9df75913fd241514e36ba3b401e13f9829083000fdb09151d2ff08ea87df3ee91f161495c4b43153d43536a715ed331c25ef4d0f140dd488fb599b3695573ba25bc028704b257448f628913c40ab387a6f8ee251037005aeed82f2d8ca2064dd82b7a5b177dd4beb8b41ae37c24dcc786e45ec1e40fcc8e57f83c819b78c16025a871d92f5aa0fd72a916ae51a4c6d331399418e75c71170988db240e0ad9e08b8a496adf5740013e6ad3d248375580b1f4f5ef21316845418aba82e3d59d", 0xbf}, {&(0x7f0000001f00)="f807092681fad2095b72dbef0d1ebe3651a9332f955ffdd862b132803e3cda5d29c0ee838a32bf7b06afb75bf6d659916b277b5bb963212c1ee31dd8f44b1788cf2d8ecd12030a53c10080945b9739f96964e84413bd9a0df93317291679750b479514a62c082a404f190282219faf3bf3d7eae6c6600697decab096e35b031232939fb3d7a611182d138c0773cd8974523ef55b5857b1d91774e461eb4b401beec5b58dca853a11e89f881eb1500127038fd08bf053e72657be78a6910a53a718a2d8030d", 0xc5}, {&(0x7f0000002000)="01f33e71ab866907ece5ab94611e2776ec6908f4169be90f4264547779bab35a9e64407bc515b6947d85f03f79413b07ba633d77e2d85c04ed9e16d0863da6a8cfd843e7e59ada04cbb42f6d5c2747f31c2337708face6f57501e212072c80a8dd0c0b9ce867482104e3ea07ddf5b69ba1ce77869d08888efa0b5e1abf46297bf64127c14ebbc903adb4b6079be1edfeaf2ca633edfad6d015d5e8e7de9038f62d17c47e4e3a6a1d715d2d519217034bf3afbf688d58cc79c31a80a8c2c53ba60444", 0xc2}, {&(0x7f0000002100)="94ace7d4ee181988713e3195c6b2c1c63cacff05921137aca68e6c155792f75a6edbc41bfda1bea2e8b42a9f911d7b0d4341627160db14a12e973a90c91c4cd7536847770ae2b54c9dad52756a48b22bd1436c8ff19802d8f1", 0x59}, {&(0x7f0000002180)="b174bc7bbc93d735539b55d16792e3882b0746c89d4031ef9402c4fd31f656eb3787193e69bcbac5d2ade35edd35e2296b5105480b434cdefb0fd06aced05da16dc8fe44c1e57b0d5c5e542a10b45ccceb17e47c74f1928ce33a2a091b608a6dea05cc064ffd7d7e1b3cc75f01d0e4fdda17c58d8780c10bb6da37016eea48718b1cb351ac31277a4804", 0x8a}, {&(0x7f0000002240)="689aa7609702ba299793de5fe0b78351930afbaa0bb53fe7e938a03e76390be4f1598a221de01f701d7c1463bb2b1c92c5ff32155b0e5800351563edd724f447b4879f2c81a971cf7a23592fa3cdc7cd280444a2143f1bbc7e353a5c46a174a8c67505406000a8da659bdb17bdba5c5db5db660272bb7fb54596ab844cf05a8aca97246e126008bcd7829deae166da0c797b831149b896cac544c1c020f318e4574e1464dd18249110d55c9dd5bbdb18a037d568ddfd8bb2123031898f71ee9245bdc7a961de992dd028df62d4d70edd6b53c00c66dcf933086e17", 0xdb}, {&(0x7f0000002340)="6b44231bedab61e8a56353ea1b94ebc30405a9a0bd41c2fc60688c4c753b23365e4861066ca8fcab5f38a1a7295d5a0baac78345a6b2fc8069034b9c77c867bead3aed35d87231a8bdc776e444fe5836803560e89bb1e36c9be874ca30cb6a570d0991742cd84849082fd14aeb4cd5b5b42c3de19f64aad0e3dbedeb80868136e5ca191cb4030aa297e7354250ba040967b04ecbbaf114b99455c23a89f430462b9a8f4aa218c439f82bb44a28bcbbf996e9f6df", 0xb4}, {&(0x7f0000002400)="6ccfe380f37f3ea8844e8f36190da18c57fcd82d37a49cd4c122af1fe81731b0b56c8cd988e03f532158896a16a21e1a09cecf1ea122ca8c68626f42cf6f3b66dd9b2d05067b7bb7a53fa1c1f37ec7522f7a3964f7031a4120e6629b0e5274c4a051611d19bc", 0x66}], 0x8, &(0x7f0000002500)=[{0x18, 0x105, 0x3, "a4b46a47850b8e"}], 0x18}, 0xffffffffffff0001}, {{&(0x7f0000002540)=@ethernet={0x306, @dev={[], 0x21}}, 0x80, &(0x7f0000002640)=[{&(0x7f00000025c0)="95d880b1f270d90ec45b1fde3f38f7ba45f4ff81c6b837511a5dc3b27771f31caa7f800a026cc5f8520200488b99f53a574c93efc91c911dc6e542376764fa7b6fcb4b613e058878d514c7bfb84a898120d681c6f410ee5909d8ed", 0x5b}], 0x1}, 0x5}], 0x4, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/198) 08:31:12 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f00000002c0)={0xffffffffffffc7fa, 0x5, 0x3, 0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}]}) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000140)) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000040)) 08:31:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="c10900000000000000021fe4ac141417e0", 0x11}], 0x1}, 0x0) 08:31:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x2ba) [ 346.480159] ================================================================== [ 346.487584] BUG: KMSAN: uninit-value in nf_nat_setup_info+0x700/0x3b00 [ 346.494271] CPU: 1 PID: 12635 Comm: syz-executor.4 Not tainted 5.0.0-rc1+ #9 [ 346.501462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.510823] Call Trace: [ 346.513437] dump_stack+0x173/0x1d0 [ 346.517102] kmsan_report+0x12e/0x2a0 [ 346.520933] __msan_warning+0x82/0xf0 [ 346.524780] nf_nat_setup_info+0x700/0x3b00 08:31:12 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) 08:31:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000040)="acecbbf4a1929a6fd6fd9606019160113aa8541b18f6c3ee58acd2adaee2d2f05926a708aa2fc3a1f827f4a9e30e5a86b33b13c823eb2dec5363eba08c9c88ae8792339255922e0677b74c3718d432508993ed56ffed11e85376ae2be849778fee5e8e2ee0f41daa1d0e00d88457a746181854231ac8c6195ffc02ae8f7e28828c82639c01dd0223822f7f01bf1a21a1ee8f76be36c601da820300a074cdc6f70bd0b3f6988006f612c1ac718da23f58687a37fe814e8b2db81208d9415b66c4d3618210acf8df44de81f171739dce8925e19d", 0xfffffffffffffeee) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)={0xffffffffffffffff, 0x80, 0x4, 0x0, 0x0, [{r0, 0x0, 0x3}, {r0}, {r0, 0x0, 0x9}, {r0, 0x0, 0x1}]}) [ 346.529197] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.534423] nf_nat_inet_fn+0x106c/0x11f0 [ 346.538630] ? cpu_partial_store+0x60/0x270 [ 346.543013] nf_nat_ipv4_local_fn+0x2bf/0x870 [ 346.547545] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.552765] ? nf_nat_ipv4_out+0x790/0x790 [ 346.557030] nf_hook_slow+0x176/0x3d0 [ 346.560884] __ip_local_out+0x6dc/0x800 [ 346.564986] ? __ip_local_out+0x800/0x800 [ 346.569191] ip_local_out+0xa4/0x1d0 [ 346.572940] iptunnel_xmit+0x8a7/0xde0 [ 346.576890] ip_tunnel_xmit+0x35b9/0x3980 [ 346.581142] ipgre_xmit+0x1098/0x11c0 [ 346.584999] ? ipgre_close+0x230/0x230 [ 346.588910] dev_hard_start_xmit+0x604/0xc40 [ 346.593386] __dev_queue_xmit+0x2e48/0x3b80 [ 346.597787] dev_queue_xmit+0x4b/0x60 [ 346.601609] ? __netdev_pick_tx+0x1260/0x1260 [ 346.606122] packet_sendmsg+0x79bb/0x9760 [ 346.610312] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 346.615823] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.621043] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 346.626551] ___sys_sendmsg+0xdb9/0x11b0 [ 346.630669] ? compat_packet_setsockopt+0x360/0x360 [ 346.635772] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.641002] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 346.646416] ? __fget_light+0x6e1/0x750 [ 346.650446] __se_sys_sendmsg+0x305/0x460 [ 346.654654] __x64_sys_sendmsg+0x4a/0x70 [ 346.658779] do_syscall_64+0xbc/0xf0 [ 346.662544] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 346.667747] RIP: 0033:0x457e29 [ 346.670948] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.689867] RSP: 002b:00007f0068604c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.697590] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 346.704869] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 346.712162] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 346.719458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00686056d4 08:31:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 08:31:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$rds(0x15, 0x5, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) [ 346.726754] R13: 00000000004c5461 R14: 00000000004d9308 R15: 00000000ffffffff [ 346.734055] [ 346.735680] Uninit was created at: [ 346.739246] No stack [ 346.741564] ================================================================== [ 346.748924] Disabling lock debugging due to kernel taint [ 346.754390] Kernel panic - not syncing: panic_on_warn set ... [ 346.760290] CPU: 1 PID: 12635 Comm: syz-executor.4 Tainted: G B 5.0.0-rc1+ #9 [ 346.768877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.778236] Call Trace: [ 346.780855] dump_stack+0x173/0x1d0 [ 346.784520] panic+0x3d1/0xb01 [ 346.787786] kmsan_report+0x293/0x2a0 [ 346.791627] __msan_warning+0x82/0xf0 [ 346.795486] nf_nat_setup_info+0x700/0x3b00 [ 346.799885] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.805106] nf_nat_inet_fn+0x106c/0x11f0 [ 346.809307] ? cpu_partial_store+0x60/0x270 [ 346.813678] nf_nat_ipv4_local_fn+0x2bf/0x870 [ 346.818210] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.823436] ? nf_nat_ipv4_out+0x790/0x790 [ 346.827691] nf_hook_slow+0x176/0x3d0 [ 346.831533] __ip_local_out+0x6dc/0x800 [ 346.835575] ? __ip_local_out+0x800/0x800 [ 346.839752] ip_local_out+0xa4/0x1d0 [ 346.843521] iptunnel_xmit+0x8a7/0xde0 [ 346.847481] ip_tunnel_xmit+0x35b9/0x3980 [ 346.851724] ipgre_xmit+0x1098/0x11c0 [ 346.855583] ? ipgre_close+0x230/0x230 [ 346.859497] dev_hard_start_xmit+0x604/0xc40 [ 346.863966] __dev_queue_xmit+0x2e48/0x3b80 [ 346.868389] dev_queue_xmit+0x4b/0x60 [ 346.872239] ? __netdev_pick_tx+0x1260/0x1260 [ 346.876767] packet_sendmsg+0x79bb/0x9760 [ 346.880951] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 346.886457] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.891677] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 346.897123] ___sys_sendmsg+0xdb9/0x11b0 [ 346.901236] ? compat_packet_setsockopt+0x360/0x360 [ 346.906290] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.911525] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 346.916903] ? __fget_light+0x6e1/0x750 [ 346.920984] __se_sys_sendmsg+0x305/0x460 [ 346.925174] __x64_sys_sendmsg+0x4a/0x70 08:31:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x7c) [ 346.929252] do_syscall_64+0xbc/0xf0 [ 346.932992] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 346.938190] RIP: 0033:0x457e29 [ 346.941398] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.960305] RSP: 002b:00007f0068604c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.968023] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 346.975299] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 346.982577] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 346.989865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00686056d4 [ 346.997139] R13: 00000000004c5461 R14: 00000000004d9308 R15: 00000000ffffffff [ 347.005142] Kernel Offset: disabled [ 347.008766] Rebooting in 86400 seconds..