[ 60.582455] audit: type=1800 audit(1546578782.610:27): pid=8910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 60.601983] audit: type=1800 audit(1546578782.640:28): pid=8910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.812233] audit: type=1800 audit(1546578783.880:29): pid=8910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 61.831692] audit: type=1800 audit(1546578783.880:30): pid=8910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts. 2019/01/04 05:13:13 fuzzer started 2019/01/04 05:13:17 dialing manager at 10.128.0.26:41807 2019/01/04 05:13:17 syscalls: 1 2019/01/04 05:13:17 code coverage: enabled 2019/01/04 05:13:17 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/01/04 05:13:17 setuid sandbox: enabled 2019/01/04 05:13:17 namespace sandbox: enabled 2019/01/04 05:13:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/04 05:13:17 fault injection: enabled 2019/01/04 05:13:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/04 05:13:17 net packet injection: enabled 2019/01/04 05:13:17 net device setup: enabled 05:15:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) syzkaller login: [ 199.868354] IPVS: ftp: loaded support on port[0] = 21 [ 199.989659] chnl_net:caif_netlink_parms(): no params data found [ 200.046858] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.053477] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.061446] device bridge_slave_0 entered promiscuous mode [ 200.070461] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.076979] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.085049] device bridge_slave_1 entered promiscuous mode [ 200.115208] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.126060] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.153831] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 200.162207] team0: Port device team_slave_0 added [ 200.168543] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 200.176974] team0: Port device team_slave_1 added [ 200.183395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 200.191576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 200.376129] device hsr_slave_0 entered promiscuous mode [ 200.542742] device hsr_slave_1 entered promiscuous mode [ 200.803225] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 200.810763] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 200.833611] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.840116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.847103] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.853619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.922498] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 200.928644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.942607] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 200.953844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.965421] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.973656] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.984391] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 200.999353] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 201.005781] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.019125] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.026967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.035575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.044611] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.051101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.064749] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.076120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.084641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.093045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.101085] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.107602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.116054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.130327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.142007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 201.153486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 201.164350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 201.172881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.181764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.190386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.198890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.207999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.216536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.224844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.235435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 201.242281] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.249931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.258588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.271965] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 201.278031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.313830] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 201.329012] 8021q: adding VLAN 0 to HW filter on device batadv0 05:15:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000004, &(0x7f0000000300)=0x200072, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e26, @local}, 0xd) setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000340)=0x4, 0xffffffffffffff2a) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000580)='./bus\x00', 0x141042, 0x0) close(r1) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x101, 0x105082) r3 = memfd_create(&(0x7f00000001c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0x526987c9) read(r4, &(0x7f0000000200)=""/250, 0x1000000d1) sendfile(r2, r3, 0x0, 0x80003) r6 = syz_open_procfs(0x0, &(0x7f0000000480)='stack\x00') ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000000)='ipddp0\x00', 0x4}) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() getresuid(&(0x7f0000000140), &(0x7f00000003c0), &(0x7f0000000400)) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000100)=0x3) ptrace(0x10, r7) [ 201.773589] ptrace attach of "/root/syz-executor0"[9089] was attempted by "/root/syz-executor0"[9090] 05:15:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab", 0x1) 05:15:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x208200) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='S'], 0x1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)={0x0, 0xc000000000000000}) 05:15:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioprio_set$pid(0x1, 0x0, 0x800004000) syncfs(r1) 05:15:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) [ 202.651469] IPVS: ftp: loaded support on port[0] = 21 05:15:24 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) [ 202.809444] chnl_net:caif_netlink_parms(): no params data found [ 202.870039] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.876669] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.884570] device bridge_slave_0 entered promiscuous mode [ 202.894625] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.901287] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.909403] device bridge_slave_1 entered promiscuous mode [ 202.938729] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 202.949651] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.976028] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.984314] team0: Port device team_slave_0 added [ 202.991181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.992162] psmouse serio2: Failed to reset mouse on : -5 [ 202.999117] team0: Port device team_slave_1 added [ 203.010854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.019144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.155609] device hsr_slave_0 entered promiscuous mode [ 203.292265] device hsr_slave_1 entered promiscuous mode [ 203.440449] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 203.448834] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 203.476373] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.547355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.559525] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 203.572020] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 203.578403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.586280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.598929] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 203.605366] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.619963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.627232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.635635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.643821] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.650262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.660148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.675177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.684567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.694135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.702201] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.708722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.722640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 203.733625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 203.744989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 203.754227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.763240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.771952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.780357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.793920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 203.804748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 203.815771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 203.823499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.831437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.840396] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.848852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.857228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.865294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.873580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.886317] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 203.892543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.917304] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 203.938209] 8021q: adding VLAN 0 to HW filter on device batadv0 05:15:26 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f00000000c0)=0xff, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x0, 0x0, {0x8, 0x4, 0x302f, 0x4, 0x9, 0xf, 0x0, 0x5}}) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000001c0)={0x4, [0x6, 0x81, 0x9, 0x450b813]}, &(0x7f0000000200)=0xc) socket$inet6(0xa, 0x8000f, 0x6) [ 204.176328] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 05:15:26 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) pipe2(&(0x7f0000000180), 0x800) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x80, 0x800) r2 = accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x80000) sendto(r2, &(0x7f0000000080)="800aa6a04e7f6c6eaca7bb89c2e51ad4dd66fe6e22deaea25a2c528f00d8a8272f028f7b435a7259d90a0cfa8252746c954cdc2f4f03f0f148e8486b9160a712cb25f486ba8a66a54f9714296f29ea4ea0e579c97c24ef1881a059c150eb16d70618dfb15bcc0cb1c9deb97428b89e8c4f0eb8ff72bf1c6fa5df74164ff62fcf732c95e5012e847829cad51008f5c81156238b72df6dfd4fefebfa64823608d0a0c3636e30f94b6445c4255d33e653fdbe0fb80ffff1bbdf642a5f41515463f1d406072ba613e072c07021e50d3fc31833e5554b87", 0xd5, 0x48000, 0x0, 0x0) fallocate(r0, 0x0, 0x1000, 0x40) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_targets\x00') 05:15:26 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80, 0x0) write$P9_RLOCK(r0, &(0x7f0000000080)={0x8, 0x35, 0x2, 0x1}, 0x8) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = dup2(r1, r1) ioctl$EVIOCGMASK(r2, 0x80104592, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 05:15:26 executing program 1: r0 = socket$inet6(0xa, 0x806, 0x108001) sendto$inet6(r0, 0x0, 0xffffffffffffffac, 0x7fff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @remote}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) connect$caif(r1, &(0x7f0000000300)=@dgm={0x25, 0x9, 0x4}, 0x18) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000380)=0x1, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x278) userfaultfd(0x80800) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000340)=0x1, 0x4) 05:15:27 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x100, 0x100) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f00000001c0)={0x6000, 0x5000, 0x7fffffff, 0x4, 0x4}) r2 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x2000, 0x4, 0x0, 0x0, 0x0, 0xffff, 0x2, 0x1, 0x3, 0x0, 0x9, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0xfffffffffffff807, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x68eb273c}, 0x4440}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_rfcomm(r3, &(0x7f0000000200)={0x1f, {0x9, 0x2, 0x9, 0x9, 0x100000001, 0x9}, 0x81}, 0xa) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8916, &(0x7f0000000000)={r3}) [ 204.993833] device lo entered promiscuous mode 05:15:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) close(r0) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000240)={0xfffffff, 0x8, 0x80000000, [], &(0x7f0000000200)={0x990a93, 0x3ff, [], @value64=0x6}}) ppoll(&(0x7f0000000040)=[{r2}], 0x20000000000000b4, 0x0, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x5, 0x440) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x3, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000180)={r5, 0x8001}, 0x8) 05:15:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @multicast2}, &(0x7f0000000040)=0xc) r1 = accept(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x80) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000001c0)=0xfffffffffffffffd, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) get_robust_list(r3, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000280)={&(0x7f0000000240)}, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)}}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)={0x0, 0x8}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000480)=@assoc_id=r4, &(0x7f00000004c0)=0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000500)) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x40000, 0x0) write$input_event(r6, &(0x7f0000000580)={{0x0, 0x7530}, 0x7, 0x8000, 0x1}, 0x18) socket$alg(0x26, 0x5, 0x0) bind$xdp(r6, &(0x7f00000005c0)={0x2c, 0x4, r2, 0xe, r1}, 0x10) ioctl$TIOCGWINSZ(r6, 0x5413, &(0x7f0000000600)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000640)=0x1) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000700)=[@in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0x100}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e20, @rand_addr=0x2}], 0x4c) ioctl$VT_DISALLOCATE(r6, 0x5608) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000780)={r5, 0x1, 0x10, 0x6, 0x7}, &(0x7f00000007c0)=0x18) ioctl$BLKSECTGET(r6, 0x1267, &(0x7f0000000800)) signalfd4(r6, &(0x7f0000000840)={0x7}, 0x8, 0x80000) ioctl$KDGETMODE(r6, 0x4b3b, &(0x7f0000000880)) ioctl$RTC_EPOCH_SET(r6, 0x4008700e, 0x8) ioctl$FICLONE(r6, 0x40049409, r0) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f00000008c0)=r6) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000900)=0x7) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000940)=0x3, 0x4) write$P9_RXATTRCREATE(r6, &(0x7f0000000980)={0x7, 0x21, 0x2}, 0x7) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000009c0)={0x0, 0x14, [0xfffffffffffffe01, 0x20, 0x800, 0x100000000, 0x8]}) 05:15:27 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) socket$pppoe(0x18, 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x3f, 0x0, [0xfffffffe]}) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x9b, 0x7ff, "9e6e9dc5d0d8c75e8e1c636f5c5975a63ea8a07b0f954a9b9a86d4ab356348f4d08e7045decda281336786584d1e014281179f4ccd1b9be41933755c06b1f628639858f9dd3fec5cba3dd00ff7c8b45a0735219d89a6a1781c44b718ab3a203fb5b448a11f5f5fb5eb1f5d8c9720975ff82b8d26fde77eb58b03d58ed5edf9de1d1c22048217df6667213abf23fd9b0ddcc5dc"}, &(0x7f0000000200), 0x1000) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000000)={0x1, {}, 0x100, 0x80000000}) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f00000000c0)) 05:15:27 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) pread64(r1, &(0x7f0000000280)=""/4096, 0x1000, 0x0) listen(r0, 0x4d) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xf, &(0x7f0000000240), &(0x7f0000000040)=0x4) [ 205.533616] misc userio: Buffer overflowed, userio client isn't keeping up [ 205.579598] IPVS: ftp: loaded support on port[0] = 21 [ 205.719899] chnl_net:caif_netlink_parms(): no params data found [ 205.783700] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.790345] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.798716] device bridge_slave_0 entered promiscuous mode [ 205.809252] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.815996] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.825299] device bridge_slave_1 entered promiscuous mode [ 205.858425] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.869788] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.898812] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.907313] team0: Port device team_slave_0 added [ 205.917218] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.925786] team0: Port device team_slave_1 added [ 205.934160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.943500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.017115] device hsr_slave_0 entered promiscuous mode [ 206.102400] device hsr_slave_1 entered promiscuous mode [ 206.315361] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 206.327787] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 05:15:28 executing program 1: syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x5, 0x100) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) r0 = mq_open(&(0x7f0000000340)='?-\x00', 0x842, 0x0, &(0x7f0000000380)={0x8, 0x2, 0x3ff, 0x2, 0x1, 0xfffffffffffffffa, 0x1, 0x4}) r1 = dup(r0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0xfffffffffffffffe, {0x10, 0x7, 0x4}}, 0x14) socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x4, &(0x7f0000000000)=0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000005, 0x0, r2, 0x0}]) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{0x7, 0x1ff}, {0x3, 0x8}]}) shutdown(r2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f00000000c0)={0x8, 0x3, 0x5, 0x80000000, &(0x7f00000001c0)=[{}, {}, {}]}) [ 206.370061] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.376668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.383702] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.390172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.489936] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 206.496370] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.509480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.521958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.533225] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.542906] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.563651] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 05:15:28 executing program 1: mknod(&(0x7f0000000040)='./bus\x00', 0x2000000000001000, 0x0) r0 = epoll_create(0x7ffc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000140)={@dev, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x2b}, 0x5a, r2}) r3 = open(&(0x7f0000000080)='./bus\x00', 0x10b886, 0x0) dup2(r0, r3) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000000c0)=r2) [ 206.591057] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 206.597755] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.647862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.656181] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.662718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.707182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.715903] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.722425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.731471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.751297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.763904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 206.775596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 206.786454] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 206.796375] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 206.807807] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 206.815669] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.823842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.832675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.841030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.849539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.857899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.866127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.889230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.898892] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 206.918205] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.952037] misc userio: Buffer overflowed, userio client isn't keeping up [ 212.771883] misc userio: Buffer overflowed, userio client isn't keeping up [ 216.351786] misc userio: Buffer overflowed, userio client isn't keeping up [ 220.561852] misc userio: Buffer overflowed, userio client isn't keeping up [ 222.662907] input: PS/2 Generic Mouse as /devices/serio2/input/input6 [ 222.891752] psmouse serio2: Failed to enable mouse on 05:15:45 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="290000002000190f00003fffffffda060200000000e80001040000040d000a00ea1100000005000000", 0x29}], 0x1) 05:15:45 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x202, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffe8d}, 0x7) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) 05:15:45 executing program 2: clock_adjtime(0x5, &(0x7f0000000040)={0x1, 0x4, 0x7e3, 0x0, 0x7, 0x80000001, 0x61, 0x9, 0x0, 0xfff, 0x6, 0x1, 0x3ff, 0x0, 0x4, 0x400, 0x8, 0x7, 0x401, 0x10001, 0x7e465982, 0x3ff, 0x3f, 0xbb, 0x8000, 0xb18}) rename(&(0x7f0000000000)='./file0\x00', 0x0) 05:15:45 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) write$input_event(r0, &(0x7f0000000040)={{0x77359400}, 0x17, 0x3, 0xd45}, 0x18) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f00000000c0)={0x0, 0x1, [0x6, 0x2, 0x400, 0xfffffffffffffffc, 0x8, 0x7fffffff, 0x8000, 0xfff]}) r1 = getpid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000800)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000940)=0xe8) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000b00)=[0xee01, 0xee00, 0xee01]) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000b40)=0x0) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000c40)=[0xee00]) r13 = getpgid(0x0) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d80)={0xffffffffffffffff, r0, 0x0, 0x11, &(0x7f0000000d40)='/dev/vga_arbiter\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000dc0)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f00000017c0)={0x0, 0x0}) r20 = getuid() getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)=0x0) r22 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001900)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001a00)=0xe8) r24 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a80)={0x0, r0, 0x0, 0x11, &(0x7f0000001a40)='/dev/vga_arbiter\x00'}, 0x30) r26 = geteuid() r27 = getegid() sendmmsg$unix(r0, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000180), 0x0, &(0x7f0000000340)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x38}, {&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000400)="7f6aff124eb80b165e9d73ee5c15971338a384a8f009c6bc91e225d77528e03e99afef7e80446f5d7a682efb41eca7e892c50ee1c8601de44691516190f47123f11c2318d8175fe9cb4b8a3dbd7940e4bd23a9734423aef35f25ff0182ac3aaf44bc4a75b08d634775af8e104b77b06e318f1c48aacdd446f750f57ee4eba72464c30bc52de60871fab084bd5b0f0fbb7d71d6cbf99ab4ff330b44e795cbb66a20cd459aedafc671ff4e7163a97d9b4239f5ea101311c4b30306ff2b50d637b77a3a508770a645234bc0ee55564ee6c785c5e774d51533df3e21df9a9518aaecfc750e", 0xe3}], 0x1, 0x0, 0x0, 0x20000080}, {&(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000005c0)="f0b055a38bb352ef11a2a1462e24f8ff1571865cf414dad94e591426a267b080aac285860b1820817552c39436f11f8d6f259270277da1", 0x37}, {&(0x7f0000000600)="b8225f59c2f16824974cfa98666e9f5a2ce0f598f90e74f38b1cdd9bf6a421666d724045eb2da49f1fddb649ebc11827143c0a0851736438ef7cd2951d329f12c2ee2a6378fe5eee0d498e0963f025c857b9e043a8a6cd089235195c64795778c46ad47bc46f5342b446616136a8473ba55aff650bf86bd60348b5174b05b013bc34dfeacd4ba55c0acd31183f6e2ef97158d9b467f98a6a2dd935024b906a227f027e3f3fb595be44c0c23abce2c683c148efa4bbf884eacf1d781818c13b6441d7cd21a5e501f8182e4e19fc9bff3b5b8e", 0xd2}, {&(0x7f0000000700)="0ac3f429fa6b1246185cbe146c83e2b95fb64c34495a5eaa1af3a3eb7bff846e7f7e2077ccbeb7f5b415a120f4a12c8161ac7cb62a2e11d6af0902a805ac6ef32a00b9c0742af245a64e290382bda7d9ec744eb9c21c66ce077f04e5d7725294a338bafebc50a4a501592c5fb8c1b2f95b3921cad2a2a90a4512ddab72dea8e3bd6ebc697677894b50980d5a1dc7c20b09c3b14e24867aec58ea7b69e08eec54dbce3c0d00d19e1eb0e92bf9", 0xac}], 0x3, &(0x7f0000000fc0)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x130, 0x20000000}, {&(0x7f0000001100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001180)="50b5c1d080fd4ece2cbf7c1e0dbf57eeaa25791af87bed19c349bd6037d7fd6803d154e70e6897db08bd65e9380a024f81dcf753f948bd3560c3c032897f76560a431dc82d3d60057ada332e3eaffbfa5bbfd2b3c068724d1a557b28dd0796dc00982ab2092cb0cbd3f2ad645ff633da64f8e9b3b4b1b6402980df20f173a89a4e05e0a94227fc502d324527ce3ed016b78efbc1e71ee99b5a2ff4927b7bc20318551e6cde6e837ad6b1c4198872a0d96bb8a87e24c004fbc75d88bc64d16be90429ee7a6ad70350c85f6e963e165c5bf31461155e3a9245050c801133c04c0f2a0cada3515fdd8affc0ca253cbd", 0xee}, {&(0x7f0000001280)="c32b42ebe536f6c00326f3eb39c0d0ac79becb9b05a27a335654844713ae47abf88fad45ceb710ea928e849e11a42f61fcba1d52b379aa6a68eebeba6337b529b6cbb0202f32697db1c7aafc16b5742d2abfb4c2b5b134adea0e10cb97da941ecd", 0x61}], 0x2, 0x0, 0x0, 0x20000000}, {&(0x7f0000001340)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001740)=[{&(0x7f00000013c0)="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", 0xfc}, {&(0x7f00000014c0)="daacb7450813d44b70a8c30202610d296f1639bcdc1aab030e700532345b51c2f1456a", 0x23}, {&(0x7f0000001500)="c4afa60ecf88500d8c8c20d5e4345d9e6e15b6e4a8ec2c399352d71803545310572b5b5721d4f7afbc89f23cf1335b02a2c71bd97c8e4c85fda1c92d5f50899abe9ec4085ca7df867bafe1d8e2ed799911759c4095c2425e24d44632fc65908791cab869073a13c04ee0a3d42db571493cf4d5f3", 0x74}, {&(0x7f0000001580)="0a459fd9299427fa71964b2518c8c3bc790cb333b426d90b9ecb8e6f30a26e00978979a9412a4e114776c2299277f45077feb89e867f7168f3066b314266381c272058619cf4434901ccc787e886918b4de11967e28128e0b480388397c339fe9a60123944f26c97102a0c69d63123d98de39edaeb974ad38db1e6f0a009bfbc1fb4c0a31a80a1ab9ad40f3ac49abbfde4", 0x91}, {&(0x7f0000001640)="5bc31c5e2471da651a3cfa4804d0423e5483cf426e6906ef4b02753c52c471dd5da4f81be029124437e068e8a531b9ff655baba78713abc97bb9f1d0a6df6704a241eadc2e3f7eec7161163b23e91c3352754ed20fd99f13454f062857d6385dc052df7e0ce6ef90cc8e0336343f3db781b4087b31cd3971cb15d3480623a72b3806ca87a202c543d40e9b8bb9a4a36c9f4fa0fa0e9272d52c925750ace16a49dc8c8a129c2fc911d5aa775a1231388b25033532e106f5542fb4049f4d7ecf16d7d24c5222860b2392fd81787e7b9a78e26563909db8c7d6c8a9e059a03f517428e6a3a443dd619049c693c4579924173fd2791c7f", 0xf5}], 0x5, &(0x7f0000001ac0)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0xd8, 0x4}], 0x5, 0x10) 05:15:45 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0, 0x80}, {r0, 0x4000}, {r0}], 0x4, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x5}, 0x8) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000100)=0x7ff) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x1000, 0x0, 0x100, 0x10001}, &(0x7f00000001c0)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e21, 0x54b, @dev={0xfe, 0x80, [], 0x19}, 0x8001}}, 0xf3c5, 0x6}, 0x90) readlinkat(r0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/24, 0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000340)={0x3f, 0x0, 0x204, 0xfffffffffffffffe, 0x0, 0x0, 0x1000, 0x0, r1}, 0x20) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000380)={0x5, 0x5, 0xcd9, 0x7, 0xffffffffffff6e6e}) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r1, 0x1000, 0x9}, 0xc) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) write$P9_RGETATTR(r0, &(0x7f0000000500)={0xa0, 0x19, 0x1, {0x402, {0x17, 0x4, 0x4}, 0x102, r2, r3, 0x6, 0x10001, 0x1ff, 0x7, 0x4, 0x7, 0x6, 0x100000000, 0x4, 0x0, 0x2, 0x32, 0x401, 0xffff}}, 0xa0) clock_adjtime(0x5, &(0x7f00000005c0)={0x80000000, 0x8, 0x10001, 0x4, 0x800, 0x7fff, 0x1, 0x7, 0x25ff, 0x401, 0x7, 0x0, 0x19, 0x2, 0x2, 0x1ff, 0x4000000000, 0x8000, 0x3, 0x718, 0x1ff, 0x7, 0x3, 0x8, 0xfffffffffffffff7, 0x45}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000006c0)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000700)=0x10) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/net/pfkey\x00', 0x20000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000800)={0x2, &(0x7f00000007c0)=[{0x7f, 0x8, 0x40, 0x9}, {0x7fff, 0x0, 0x7, 0x80000001}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000840)={0x10004, 0x2, 0x2, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000880)=0x2) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000900)={0x0, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, {0x2, 0x4e24, @local}, 0x200, 0x0, 0x0, 0x0, 0xffff, &(0x7f00000008c0)='irlan0\x00', 0x5, 0xfffffffffffffffa, 0x7961}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000980)='/dev/autofs\x00', 0x10101, 0x0) ioctl$VIDIOC_G_STD(r4, 0x80085617, &(0x7f00000009c0)=0x0) ioctl$VIDIOC_S_STD(r5, 0x40085618, &(0x7f0000000a00)=r6) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000a80)=0x7a57) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x74, r7, 0x602, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10200}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5b5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x81}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x4008000}, 0x14) 05:15:45 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x701001) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x802a) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x7a, 0x1, 0x100000001, "ba28bf6519d52572ba55bcdab2eb2557", "a20040c8a5dd4a930c6f4c45d88f7b920dfa9f6008053f1e8f3d8fb26dbde74fcf733825c88b14d93b7198f877870279acd484d800f656c07c4e9ee32823ed65758a71c3f49504b37a9caa9e0c3adca83fa0c8b016fc6a7aefbd2e7d61700455d926000d7c"}, 0x7a, 0x0) getpeername$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000240)="4b8d031d201a83fb14be8eb7fa9d0fe71826bb900345937c710b28129f25717b7bb3d5abedd864b4b600a9ca15a75e27b84db4210fa0360bf32c92a1a0b892b2e5de9687c6c00400a7cf8f59de71b956303cbc43bfad78220a8d780b04440cfe15016e707d57960fa43db2919415d26d491e0395add0ea4931686c5871320e1c9336fd373ba4b68cd7f5c8224452c59249e217ca060aaa88c6deb7f34342c4834b888c5f569831eba7d31376d64d3df4f8bb96456eaf2fd1c6153e52db4781bb79e9edc055fad651d2", 0xc9}, {&(0x7f0000000340)="47b40501662c11f35d84a24d32acb8c78fb9fc18f72733ff856e1cc8842993978d86d0c8519821de20a1a615a7328840e42ca5942bc8f187ac64352962b12d309ece75906a701548c4a693ab73a44b2d500a98a638662217e69ffbacb0c44666a3065b9051741dc123ac59db809873a4bea2419efc5cfffccbb887bc26619cff9a6fec353fbc28fcb43a95ca236a0c3fe97892e739ba2a5c884f55ad553b46229f064d12299b1d2db8a3dee49c52673b7b0fa0d217782eb972424ac01588dc03eec70c224fe06b09", 0xc8}, {&(0x7f0000000440)="200f93d9f58fc57f53ec48d4ae3302486b57e99dcb6523a0533722a9b3511c3d15a451006a0acc0b04cb9883c168a0b0f155b72a8eb1af2756a5b39e19fd1023", 0x40}, {&(0x7f0000000480)="3a543b010ac2db1818374b37e9454d73745da5da4c0887436d0b8f00002ac224899b9ccda55f06e04b8e9c08f17588df5851cbf805e005c4c0690faedde1fee7892e26f48ff1de09543e6cb20c0935e56740c255be1343e3052f51c2483a4c78745c630d814a4e7ff27e312802320281a5f01f3c731b355d01111e413470d21f60ce736d3938c242da49173736aa89b12207ddf960aa0df54a2ea11bccc6b87d4de6471082c8c5ff460b061d5894e5451d7de2da365920cc993e59a84e3eeda82a7cbb8179f100e66831cad586e7ef9fecb767481baf8fa98b935cab2553f9d0f4a20f7122b655a693270b", 0xeb}, {&(0x7f0000000580)="5257e3957fdc395422cf2d309253eae259c1109bc1bfccbb8ca3ebd9bdb39dfa8b7f0d7fa6009353a5f3e31f41f5c0b0240567b8a0695e989014a3c4a4c0eca7fdd59b60e9dac19e1b9c26ba3ecbdab78bc73133994db37ecaf3851663e500af472cafd0e22cf5f51ef0fdb1c20fff3eb5eeacf7f9be6db53b76e38a9e6e8bcc63df0f02e333d6d2e3705d1220d73da9648ac18a1cc5d09fe327e5ad75536a9722004fff9ce8fda4a8d88b9ef0abe3a94ed4de721176a09811300d31ce9cc87c8bffe4f0eca2a1d33de3c06ab75ff9d82d59e9db20247933b51fc865f6e16574a0", 0xe1}, {&(0x7f0000000680)="eca8b6b9ae28e31c6c60a0aa52fcdfd630f92f5569ba0614e3b1587a8e3ff293a85d844c5172d34ccbeaccc834ba925ea520af51cc51889f73dd14006a36c4fe63cde11b9bf8acbd60fed4ad8e65759d442654809b79a116218a611799c2d1ccdb41bd96bb3ac7f4e0e2d690f9fe40a52df4de8d369e5e8f5aefbc2f6fb556e2e3c0a45932680c8226867bb79b8181ead2eceed10e362748e8ac544db2294b51d246c7f4f9a882728b9e984ef1ec7baccf8893dcb32ffef91b114dc689bddb8c8322a5d663", 0xc5}], 0x6) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000800), &(0x7f0000000840)=0xc) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000880)=0x8, 0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000008c0)={0xf6, 0xffffffffffffffff, 0xcc, 0x0, 0x0, [], [], [], 0xbf, 0x873}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/rfkill\x00', 0x40000, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x15, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000c80)={&(0x7f0000000ac0), 0xc, &(0x7f0000000c40)={&(0x7f0000000b40)={0xcc, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2b}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7ff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000d00)={0x34, 0x0, &(0x7f0000000cc0)}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000d80)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x24, r3, 0x322, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4008080) fstat(r0, &(0x7f0000000e80)) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000f00)={0x4, 0x5, 0x7fff}) tee(r0, r1, 0x4, 0x4) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000f40)=""/248, &(0x7f0000001040)=0xf8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000001080)='veth0_to_bridge\x00', 0x10) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/rtc0\x00', 0x40, 0x0) ioctl$SG_GET_REQUEST_TABLE(r4, 0x2286, &(0x7f0000001100)) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000001280)=""/151) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000001340)={0x80000000, 0x0, {0x3, 0x3, 0xfffffffffffffc01, 0x3, 0x7}}) ioctl$KDGETLED(r1, 0x4b31, &(0x7f00000013c0)) renameat2(r0, &(0x7f0000001400)='./file0\x00', r0, &(0x7f0000001440)='./file0\x00', 0x4) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000001480)=""/45, &(0x7f00000014c0)=0x2d) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001500), &(0x7f0000001580)=0x60) openat$vcs(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vcs\x00', 0x1c1000, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) 05:15:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 05:15:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) [ 223.720804] netlink: 'syz-executor0': attribute type 10 has an invalid length. [ 223.792118] netlink: 'syz-executor0': attribute type 10 has an invalid length. 05:15:45 executing program 0: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$RTC_UIE_ON(r1, 0x7003) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r3 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000000), 0x4) write$binfmt_misc(r4, &(0x7f00000000c0)=ANY=[], 0x7fffffff) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000300)={0x6, 0xffffffff}) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r8 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000310000/0x4000)=nil, 0x4000, 0x1000001, r8) pivot_root(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000280)={@remote, @dev={0xac, 0x14, 0x14, 0x1c}, r7}, 0xc) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000680)={@in={{0x2, 0x4e21}}, 0x0, 0x6, 0x0, "277b8532a6872d98f5f6641fe6ab0c2e89d68b2fcd9996704b72910000f6b392bd96acc6c1667694da48ab0c500d3b32eafd8b4c7b91efb74b59bf043fce0000000000000000000000000000eb0f00"}, 0xfffffffffffffe85) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) 05:15:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 05:15:46 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = dup(r0) write$P9_RREAD(r1, 0x0, 0x0) 05:15:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x18200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r1, 0x3, 0x8, 0x800000cd55) 05:15:46 executing program 2: clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x5) [ 224.380924] IPVS: ftp: loaded support on port[0] = 21 [ 224.431845] IPVS: ftp: loaded support on port[0] = 21 05:15:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x151) dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = dup2(r1, r1) ioctl$TIOCSTI(r2, 0x5412, 0x6) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 05:15:46 executing program 2: mkdir(&(0x7f0000001340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f0000000280)=""/4096, 0x82f) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000012c0)='./file0\x00', 0x80000009) getdents(r0, &(0x7f0000000040)=""/124, 0x7c) [ 224.591393] IPVS: ftp: loaded support on port[0] = 21 [ 224.718504] chnl_net:caif_netlink_parms(): no params data found [ 224.742969] chnl_net:caif_netlink_parms(): no params data found [ 224.816804] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.823513] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.831131] device bridge_slave_0 entered promiscuous mode [ 224.844323] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.850709] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.858029] device bridge_slave_1 entered promiscuous mode [ 224.886144] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.902213] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.917438] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.923971] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.931122] device bridge_slave_0 entered promiscuous mode [ 224.938954] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.945630] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.953612] device bridge_slave_1 entered promiscuous mode [ 224.997373] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.005190] team0: Port device team_slave_0 added [ 225.012722] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.020264] team0: Port device team_slave_1 added [ 225.027570] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.055575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.064739] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.082316] chnl_net:caif_netlink_parms(): no params data found [ 225.090870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.117200] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.124800] team0: Port device team_slave_0 added [ 225.134369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.142112] team0: Port device team_slave_1 added [ 225.184645] device hsr_slave_0 entered promiscuous mode [ 225.222374] device hsr_slave_1 entered promiscuous mode [ 225.266993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.275393] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 225.287696] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 225.294809] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.327543] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.334055] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.341321] device bridge_slave_0 entered promiscuous mode [ 225.384880] device hsr_slave_0 entered promiscuous mode [ 225.422253] device hsr_slave_1 entered promiscuous mode [ 225.462727] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 225.470216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 225.477632] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.484588] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.492026] device bridge_slave_1 entered promiscuous mode [ 225.508690] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.515721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.522567] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.529285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.548468] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.558304] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.564757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.571497] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.577979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.588073] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.630413] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.638360] team0: Port device team_slave_0 added [ 225.654831] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.662731] team0: Port device team_slave_1 added [ 225.672838] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.680160] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.690498] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.697762] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.718619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.732968] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.740259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.748818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.814366] device hsr_slave_0 entered promiscuous mode [ 225.892225] device hsr_slave_1 entered promiscuous mode [ 225.934979] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.942286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.949781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.958842] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 225.966757] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 225.978610] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 225.984817] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.012737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.020745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.029890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.038440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.046376] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.052870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.067020] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.078406] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.090130] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.097119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.104945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.116961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.125031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.133460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.141425] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.147892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.166943] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 226.173167] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.183648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.191292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.206062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.214285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.225831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.236355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.245040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.253206] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.259678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.271153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.278377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.287120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.303624] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.315953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.326299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.334321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.342804] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.351288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.360339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.368521] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.374976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.386482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 226.394038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.402734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.414427] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.428350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.437787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 226.445431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.454568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.463348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.471736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.495004] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 226.501203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.516705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.536414] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.544507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.552420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.560850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.573319] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.583732] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 226.590859] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.598428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.606043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.623027] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 226.629183] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.638068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.648561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.657342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.669521] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.679212] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 226.691867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.706836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.715570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.723956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.732377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.740461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.748488] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.754906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.762371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.770551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.778643] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.785192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.799007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 226.805988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.813875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.822247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.838929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.847173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.860302] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 226.867332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.879836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.889158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.915897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.926571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.935633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.954418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.968167] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 226.974999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.983308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.991518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.014389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 227.025972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.036604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.048721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 227.058599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 227.066336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.074388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.091484] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 227.097987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 227.120239] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 227.135551] 8021q: adding VLAN 0 to HW filter on device batadv0 05:15:49 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000440)='+', 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) pipe2(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='#'], 0x1) recvfrom$inet(r0, &(0x7f00000002c0)=""/98, 0x62, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0x101}) read(r0, &(0x7f00000001c0)=""/244, 0xf4) [ 227.378804] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 227.614090] device lo entered promiscuous mode 05:15:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000013c0)=""/4096, 0x8}], 0x1}, 0x0) 05:15:49 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x400002) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1e000000000100400000006801c81272a3f52cf1bab5ceb310abf6e114d12721219e5a0dd9193c5f6ddf399f9e131ebcb09e1107cd007a1f9552b75c004b391123a00347a6a185fb59bc97ee0b4ea55a6c55ce5872a096284ffc"], 0x1, 0x0, 0x0) 05:15:49 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5528aec0}], 0x1, 0x0) 05:15:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") ioprio_get$pid(0x2, 0x0) 05:15:49 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r0, 0x200002) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) msgrcv(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000540eb09900000000cb8e5ff2a8f8b3509b099e71141ce679f69f8d566b53308f4ffcd9b7673f6f"], 0x1, 0x0, 0x0) 05:15:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 05:15:50 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r0, 0x200002) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) msgrcv(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000540eb09900000000cb8e5ff2a8f8b3509b099e71141ce679f69f8d566b53308f4ffcd9b7673f6f0100b44a62a8b964dc6c1b09d6"], 0x1, 0x0, 0x0) 05:15:50 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e0000000000000000000000000000197f24acc233eeae0750e03690e37cc418e50fc4909198cc53e0ab49282d3443f4194180b8e22c4d0d167917bd7a810ecc22ddfc023ca3c7f0cf68535adb15c1bc39c7fd3c740258571d6be15f83c3f6608b0e17447f9f5c56e8b297e01593ddb2364f78db6c589e49e2e4985673ad47ed207a0f061ac98f7b7f34d356a8cc72e8cb17204ff4fedcf8501d01308addad69807335bfe1572915329b104c582bcb028e70e5c5ea076559d3120000"], 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0xffffffffffffffff}, 0xc) 05:15:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000000c0)) 05:15:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001640)=ANY=[@ANYRES64=0x0], 0xffffffe1) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:50 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) setxattr$security_smack_entry(0x0, &(0x7f00000002c0)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x204002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) chown(0x0, 0x0, 0x0) 05:15:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x20141042, 0x0) r2 = inotify_init1(0x80800) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x20000, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffffffffffeb0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="04062dbd7000fcdbdf250a00000008000500ff00000008000500000000"], 0x1}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x8002) sendfile(r4, r3, 0x0, 0x10000) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x0) fcntl$setlease(r5, 0x400, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) fstat(r2, &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz1\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000900)) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x100) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x190) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendfile(r6, r7, 0x0, 0x5a92) sendfile(r7, r7, &(0x7f00000000c0), 0xbf99) 05:15:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001100)=[{0x18, 0x117, 0x3, "c7"}], 0x18}}], 0x1, 0x20008000) 05:15:50 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000180)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f9d1749e72050523b6fe360a9e9471e004052c09c0050e036000000000000000000ac30326e83b7d475946a2c6147189da93829720467d4cf66"], 0x1, 0x0, 0x0) 05:15:50 executing program 1: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5528aec0}], 0x1, 0x0) 05:15:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x2, 0x0, 0x0, '\x00\x00\x00\x00\x00?\x14\xc0\t\x00\x00\x10\x00'}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") 05:15:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x480, &(0x7f00000000c0)=""/224, &(0x7f0000000000)=0xe0) 05:15:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001100)=[{0x18, 0x117, 0x3, "c7"}], 0x18}}], 0x1, 0x20008000) [ 228.774695] IPVS: Scheduler module ip_vs_ not found [ 228.807493] IPVS: Scheduler module ip_vs_ not found 05:15:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x480, &(0x7f00000000c0)=""/224, &(0x7f0000000000)=0xe0) 05:15:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 05:15:51 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000001a05ae91bf0d5c3564f245199edbe080000000000000000000000197f24b7f1d28d2923e07cca96230000000000000091b2419565942edd3c26e7d8201c2c607935204ec6d8cfa0e8ba6d945f8e6f53f5aa9193404d5f7776ae6954349b294de94a2fa49bba8f69c9dc681fd39f4085f024e71b25226b7cfe3e76c86800a55d2f6980ca02c0909bf27d1a0e81f9ec15903cb28d"], 0x1, 0x0, 0x0) 05:15:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x20141042, 0x0) r2 = inotify_init1(0x80800) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x20000, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffffffffffeb0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000b00)=ANY=[], 0x0) vmsplice(r4, 0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x8002) sendfile(r4, r3, 0x0, 0x10000) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getresuid(0x0, 0x0, 0x0) fstat(r2, &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz1\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000900)) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x177) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendfile(r6, r7, 0x0, 0x5a92) sendfile(r7, r7, &(0x7f00000000c0), 0xbf99) 05:15:51 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000001a05ae91bf0d5c3564f245199edbe080000000000000000000000197f24b7f1d28d2923e07cca96230000000000000091b2419565942edd3c26e7d8201c2c607935204ec6d8cfa0e8ba6d945f"], 0x1, 0x0, 0x0) 05:15:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, 0x0, 0x548) 05:15:51 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001ac0)={&(0x7f00000019c0), 0xc, &(0x7f0000001a80)={0x0}}, 0x0) 05:15:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x140002000000105, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) fcntl$getown(0xffffffffffffffff, 0x9) fsetxattr$security_ima(r1, 0x0, 0x0, 0x0, 0x1) getgroups(0x0, 0x0) setgroups(0x0, 0x0) mmap(&(0x7f000038a000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) rmdir(0x0) 05:15:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x20141042, 0x0) r2 = inotify_init1(0x80800) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x20000, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffffffffffeb0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="04062dbd7000fcdbdf250a00000008000500ff00000008000500000000000c00030008000300000000001800010014000300e0000001000000000000000000000080"], 0x1}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000b00)=ANY=[@ANYBLOB="6d616e676c65002fc5b100000000000000000000000000000000000000000000000000cf0000001904e847221a30bb61c213017185f96b7896bc1d36f3e030fd2fe4cf65dd2ba7bcfc4f47ce1f570ff01a032020aaf3faa4a73f59020aeedc7b5b525576043d5c3d19ec31c8e457dcc74d80453557b71163f967a90f0d4bce8aeb1e2e4b6cbaa2767be01c275ac565a25ee36b279248810f75db78a848c2da2bc830ccc09690bf0a38653adb928023ee080dea3cad2660ad71fa1d24a4223261aaba717bb2258a777f1b2fd4146a8ce2c97cd23474b9840317f450d3f4425d9e2fe68c12be1de2aed082235b9115263bdef2ce2b8391335bd875af7a0e7cbb802841d440b556805b189c5b7a92"], 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x8002) sendfile(r4, r3, 0x0, 0x10000) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) fstat(r2, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz1\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x184) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendfile(r6, r7, 0x0, 0x5a92) sendfile(r7, r7, &(0x7f00000000c0), 0xbf99) 05:15:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/224, &(0x7f0000000000)=0x18) 05:15:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendmmsg(r0, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002880)=[{0x10, 0x1, 0x10000}], 0x10}}], 0x1, 0x24008010) 05:15:51 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 05:15:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x30000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000001c0)) r1 = dup(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, r1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000000c0)=0x3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@can, &(0x7f0000000280)=0x80) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) clock_adjtime(0x1, &(0x7f00000002c0)={0x5, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x4, 0x14, 0x0, 0x2000000000000000, 0x20, 0x6, 0x0, 0x5d, 0x0, 0x7e82, 0x0, 0x1ff, 0x0, 0x6, 0x9, 0x3, 0x9, 0x5, 0x3, 0x81}) r5 = socket$inet(0x2, 0x6, 0x2) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000200)='vxcan1\x00') perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x9, 0x20, 0x2, 0x7f, 0x7, 0x7fffffff, 0x0, 0x200, 0x9, 0xffff, 0x2, 0x5, 0x0, 0x7fff, 0x0, 0xfffffffffffffff9, 0x4, 0x0, 0x9, 0x5, 0x6, 0x0, 0x0, 0x0, 0x5, 0x89, 0x3, 0x7, 0x9, 0x5, 0x400, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x3}, 0x10004, 0xfffffffffffffff7, 0x12, 0x9, 0x80, 0x3, 0x3a83}, 0x0, 0xd, r2, 0x1) timerfd_gettime(r3, &(0x7f0000000480)) 05:15:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x4, 0xdd) [ 229.565355] input: syz1 as /devices/virtual/input/input13 05:15:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5457, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200000000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getrandom(&(0x7f0000000100)=""/82, 0x2a5, 0x2) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)) 05:15:51 executing program 3: r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x24, &(0x7f0000000180), 0x4) [ 229.666978] input: syz1 as /devices/virtual/input/input14 05:15:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000340)="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", 0x3ff, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x261, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4}, [{0x6474e557, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xff}]}, 0x58) 05:15:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) 05:15:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000340)="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", 0x432, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffff, 0xff}], "da200879926b02e1ba9c83f4258bdd6485ea974a9374910a24f21c20f187e62a97eb4e0c372e67e0e3bd85a26868b7df15"}, 0x89) [ 229.967129] hrtimer: interrupt took 85330 ns 05:15:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 05:15:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = socket$inet(0x2, 0x6, 0x7fffffff) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f00000004c0)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer2\x00', 0x14003d, 0x0) sendto$inet(r2, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r6, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r7, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x24}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000800)=ANY=[@ANYBLOB="817abcb82c076b0000000000000000f0d1802d2d094bd06315d0e7855bb65587033e35e494d8362bc9d0fb44b760ad4ebcf1c0e1b6b6018e460032446705d88e"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r8, r1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x100000c81, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r9 = syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000840)=0x294) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="080001000000e82f10a796b2ece739faadc130c9d46600ac8e9647a509b1c415e19161a906c2a586138f902a4d08f3af2cb3fdec661f38c9c5fc5ae3319862"], 0x1}}, 0x4008000) r10 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r10, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="010100000000000000000300000014000100080080000000000000003cd5f4a747f67eb8307f796579040000000000"], 0x1}}, 0x0) 05:15:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000780)=""/180, 0xb4}], 0x1) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) dup3(r0, r1, 0x0) 05:15:52 executing program 2: 05:15:52 executing program 0: 05:15:52 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000001a05ae91bf0d5c3564f245199edbe080000000000000000000000197f24b7f1d28d2923e07cca96230000000000000091b2419565942edd3c26e7d8201c2c607935204ec6d8cfa0e8ba6d945f8e"], 0x1, 0x0, 0x0) 05:15:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000340)="206305edd00e5af621f142dbd62e7f2ea21e48c0be80fedb5a38eb8019e294a82910f72aba408eae12780f7da3a210c7d63a5f57c8c68d963f33b214cf9b9ee7afe2e54c2f761bd096ccdca5b1576f58261991c86acb7037bc30f28bc70aa6e9b012a2340ecd63da8fbe9564b37355d54cc6819be9262afbf1dd2b61dd2f4ebcb750137f5b3eb5ab72393af8d0908867874049b896f3fd352af32f004846342c47a0a5228faf0f8bd16d85654995a6ce054063f2ab82e6e9c140cf24fa18e5d08a67f2fd4fcccfe298cbfd1530070000000fede44324f739202c2454ca2d8521be4cbe2daa2f7d13b3da3e235ce13a204d3a7e108e7aef1a937bbd2f15c347da13a5229327bdce3a7da375bd5341495768ba4dc3c160d1158d456a890bbf044a054ebae3ca4759fd2112a6b059c5a01c8aee3464306280ad6e375ea62a1cdf1bb672f96b280ff579f7d0acf072d613f13066b9c7d5f0b54dc983e180d5d08b2030160d6b50934bf47ff2be67b2a5530d0a6cccb280afae865867b7e6f4422466ff9fc051a07eff8a3880e432d3a643689f3de4bc7f6fc64941bda01609b58f6e694d37af7fd69662ae36923bd482de6693c97e23a319ed201b9697a67487dbbbdf83ba72b439eae7efc34c1a3d9a56d64b1584f0f7ff57167c0f86d87901ed9a431a938b1592064cb3054ad4b298d88953388fbfdb4c0abde466659bda384e17dbabffc2aa7be2ed64b901be8f8ee5fb5ec323fe3b5085ac21a33f6213d62ff1ad2bd0b3e3f1a16a8d64bb800b02301d6d414cd25b4d6ea8cbf7ea65e3a854bafe4189bba3321834180f0194eb1c81b17014f35e056200cf7d26678739b1623454365389d52fe7d63e0b5fb8af55ff2d3f78d6cbec4e6ea62c6a73d749474d7d1e029686f20f5dc1ff67e55a890409fba15ff689172d153ebeeb94b4ce728df34a858914339b3f5c161e63526e790eb588fb15a17af00e5293a1c15a457b6b8e7935fd8df006f37cdfb0fb4b19c95d2782611ea398de34dbc51b25294a8b570e275e94df2eadabca4fb608576850f2965e8dd22a7e12c83140e305931ae6c41f2af95a1f6febd8dc2b6accaf30800653573f9eab449065a32d34defcd6755f706351c172cb0b321e771eb96f67e17932009a0f13d8da2ac197b1b886ad9023ee6a2b6ff601d96021820a1a47471ec9a2f57d511735924dacafd63f175833f7955692a81a1cd39d7e73f2e3bac98308caeea2f915e9a745741ca8956b78b4a0047bf95ca113454c8fb8d21acc9cea63d76b5367c7e873bdccf85d0e0f776820bf6e9bca1e980da60c0f6adc078ae163bd59044c5f04e8e809e0f79f3922f9993ecc95666634c6e48d45520974ff998976fb45e87e3d9f8d4ce49797ef8d3e2f5dc742b2be2298696d5ca94df9cf8ef4f74c0b1b144ef4f7ec88f0cd120cf7be5ce3963c520014757767d31fda15f94d58e8a91cfe395c0bf372c21140360b3ce6d611b152e42e7854677a4f1b962d4caa85e7", 0x432, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffff, 0xff}], "da200879926b02e1ba9c83f4258bdd6485ea974a9374910a24f21c20f187e62a97eb4e0c372e67e0e3bd85a26868b7df15"}, 0x89) 05:15:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5413, &(0x7f00000003c0)) 05:15:52 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5528aec0}], 0x1, 0x0) getpgrp(0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) 05:15:52 executing program 1: [ 230.530578] bond0: Releasing backup interface bond_slave_1 05:15:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000340)="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", 0x432, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffff, 0xff}], "da200879926b02e1ba9c83f4258bdd6485ea974a9374910a24f21c20f187e62a97eb4e0c372e67e0e3bd85a26868b7df15"}, 0x89) 05:15:52 executing program 4: 05:15:52 executing program 2: 05:15:53 executing program 5: 05:15:53 executing program 1: 05:15:53 executing program 4: 05:15:53 executing program 3: 05:15:53 executing program 2: 05:15:53 executing program 4: 05:15:53 executing program 1: 05:15:53 executing program 0: 05:15:53 executing program 3: 05:15:53 executing program 5: 05:15:53 executing program 2: 05:15:53 executing program 1: 05:15:53 executing program 4: 05:15:53 executing program 5: 05:15:53 executing program 1: 05:15:53 executing program 4: 05:15:53 executing program 3: 05:15:53 executing program 2: 05:15:53 executing program 0: 05:15:53 executing program 4: 05:15:53 executing program 3: 05:15:53 executing program 1: 05:15:53 executing program 5: 05:15:53 executing program 2: 05:15:54 executing program 0: 05:15:54 executing program 3: 05:15:54 executing program 4: 05:15:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x10b}, 0x1c) 05:15:54 executing program 2: unshare(0x4000400) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 05:15:54 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000040)) 05:15:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x9, 0x0, 0x1, 0xe0a}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5528aec0}], 0x1, 0x0) getpgrp(0xffffffffffffffff) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='io\x00\x11\xf9|\xa4\x8b|C\xdb\x06=Y%\x9d\xa9L\xd2<\xf4\xeb\x93Jou\xdd\x15\x8e\x1c\"\xe3\xbc\xff\x7f\tH\x00\x00\x14\"2\xe3\xfb\xcc.\x1ba\xfbR+\x00\xd7\x9a\xd7|0\x1c&\xac\t\xab%gG\xc3\xf8\x05\x00\x00\x00b\xf6\xb4:\xff\xef\x06\xdd\xf3\x87q\xd0\r\x99%j\xdau\x9bj\arX\xcb\"O\xe0\x1eP7z6\xbftHB\x8eY3\xd0\xd7') 05:15:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x34d) 05:15:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 05:15:54 executing program 1: umount2(&(0x7f0000000280)='./file0\x00', 0x6) r0 = socket(0x10, 0x803, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$GIO_FONTX(r1, 0x4b6b, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0x5) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000200)='lapb0\x00') getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x200400, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x116) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7361c86d2000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x20, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xc4}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) 05:15:54 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000cab5b3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000d6af50)={{0x80}, 'port0\x00', 0xc3, 0x80003}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000c03000)={{0x20000000000080}, '\nL\xea\xa0]\xad\x12n\x00\x00\x00\x02\xa1V\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xd5vX\x97\x01\xa4', 0x77, 0x10000a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x80000000000001, 0x0) 05:15:54 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000040)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000f60f000000000000000000002bb4b0905c4534000004000000000000e9ffffffffca8e5ff2a8f8b3fa63321db36fec21a6b93fb7b34014c2518c2db5025bde9fe45a76c569e4759bab12cb2c46c7e18f0edd2c70b3877dd11f626d5561164f5b03ee9571071fb5d1083875c9ef748009b8cf820040d864f68e6b96d53cafdf62f10575075b7687d0dc3feacfb1bf2c082361c515bdcdf30a18"], 0x1, 0x0, 0x0) 05:15:54 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000180)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f9d1749e72050523b6fe360a9e9471e004052c09c0050e036000000000000000000ac30326e83b7d475946a2c6147189da93829720467d4cf"], 0x1, 0x0, 0x0) 05:15:54 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000200)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00ffffff000010000000ed0000f2ff020000000b0c36fc85b56ac13ae7d7913cf2a35045b6fe94178e375f6b25b66f938f388b19a4b00c92ae10e9d3"], 0x1, 0x0, 0x0) 05:15:54 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4={[0x2]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) 05:15:54 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x3, 0x0) sched_setattr(0x0, 0x0, 0x0) 05:15:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) 05:15:55 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r0 = getpid() clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 05:15:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5441, 0x0) 05:15:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) set_mempolicy(0x4002, &(0x7f0000000140)=0x6, 0x9) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x442f, 0x2000) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x0) fallocate(r1, 0x0, 0x0, 0xa6ba0) bind$rds(r1, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000e4ffffff, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x4, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x20) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000840)={0x0, @broadcast, @remote}, &(0x7f0000000880)=0xc) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000240)=0x7, 0x2) pselect6(0x40, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f00000004c0), &(0x7f0000000500)={0x0, 0x5, 0x400, 0x0, 0x0, 0x0, 0x1, 0x1}, &(0x7f0000000740), &(0x7f00000007c0)={&(0x7f0000000780), 0x8}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000a00)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000011c0)={@loopback}, &(0x7f0000001200)=0x14) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001280)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@ipv4}, &(0x7f0000001300)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x4, 0x800000000105082) openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) 05:15:55 executing program 0: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5528aec0}], 0x1, 0x0) 05:15:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@timestamp], 0x20000726) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r1) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000003740)) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 05:15:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x30000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000001c0)) r1 = dup(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, r1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000000c0)=0x3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@can, &(0x7f0000000280)=0x80) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) clock_adjtime(0x1, &(0x7f00000002c0)={0x5, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x4, 0x14, 0x0, 0x2000000000000000, 0x20, 0x6, 0x0, 0x5d, 0x0, 0x7e82, 0x0, 0x1ff, 0x0, 0x6, 0x9, 0x3, 0x9, 0x5, 0x3, 0x81}) r5 = socket$inet(0x2, 0x0, 0x2) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000200)='vxcan1\x00') perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x8, 0x0, 0x0, 0xfff, 0x0, 0x9, 0x20, 0x2, 0x7f, 0x7, 0x7fffffff, 0x931, 0x200, 0x9, 0xffff, 0x2, 0x5, 0x7, 0x7fff, 0x0, 0xfffffffffffffff9, 0x4, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x89, 0x3, 0x7, 0x9, 0x5, 0x400, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x3}, 0x10004, 0xfffffffffffffff7, 0x12, 0x9, 0x80, 0x3, 0x3a83}, 0x0, 0xd, r2, 0x1) timerfd_gettime(r3, &(0x7f0000000480)) 05:15:55 executing program 3: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 05:15:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/46, 0x2e) 05:15:55 executing program 3: clone(0x84006bf3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, 0x0) ptrace(0x11, r0) 05:15:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x30000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000001c0)) r1 = dup(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, r1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000000c0)=0x3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@can, &(0x7f0000000280)=0x80) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) clock_adjtime(0x1, &(0x7f00000002c0)={0x5, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x4, 0x14, 0x0, 0x2000000000000000, 0x20, 0x6, 0x0, 0x5d, 0x0, 0x7e82, 0x0, 0x1ff, 0x0, 0x6, 0x9, 0x3, 0x9, 0x5, 0x3, 0x81}) r5 = socket$inet(0x2, 0x0, 0x2) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000200)='vxcan1\x00') perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x8, 0x0, 0x0, 0xfff, 0x0, 0x9, 0x20, 0x2, 0x7f, 0x7, 0x7fffffff, 0x931, 0x200, 0x9, 0xffff, 0x2, 0x5, 0x7, 0x7fff, 0x0, 0xfffffffffffffff9, 0x4, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x89, 0x3, 0x7, 0x9, 0x5, 0x400, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x3}, 0x10004, 0xfffffffffffffff7, 0x12, 0x9, 0x80, 0x3, 0x3a83}, 0x0, 0xd, r2, 0x1) timerfd_gettime(r3, &(0x7f0000000480)) [ 233.820952] ptrace attach of "/root/syz-executor2"[9623] was attempted by "/root/syz-executor2"[9677] 05:15:55 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) msgrcv(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000800000000000e2ff002bb4b0905c453400000000000000000000cb8e5ff2a8f8b3509b099e71b7673f6f0100b44a62a8b964dc6c628c1b66d6552fa67c1d8505c654415e9943f0f998184f3ec287ba291b6a90c85e281079c4c64da65a1359e5cf0fc78f7e79f98aa10457f27e5c6bfa9f7ade8c6c5f6dc5134c58e5b608d5e4987b68279ee823cea22e001687e01c0f3689f715f5f5161ea03bad392d5ad56a33aa8bd17b3455fa519aab90cf5ce6e39eed63d09f19a4c13a8f710c3879d9705ba5ef75e1d1c8f6218236e703780308e01d1bb4ec57e0c5a0c0ae020bfd"], 0x1, 0x0, 0x0) 05:15:56 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 05:15:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x4e20, 0x0, @empty, 0x1}}}, 0x48) 05:15:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc02064c9, &(0x7f0000000280)) 05:15:56 executing program 4: syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x30000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000001c0)) r1 = dup(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r5 = socket$inet(0x2, 0x6, 0x2) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x8, 0x0, 0x0, 0xfff, 0x0, 0x9, 0x20, 0x2, 0x7f, 0x7, 0x0, 0x931, 0x0, 0x9, 0xffff, 0x2, 0x5, 0x7, 0x7fff, 0x0, 0xfffffffffffffff9, 0x0, 0xd6f, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x5, 0x89, 0x3, 0x0, 0x9, 0x5, 0x400, 0x0, 0x4, 0x4, @perf_bp={0x0}, 0x10004, 0xfffffffffffffff7, 0x12, 0x9, 0x80, 0x3, 0x3a83}, 0x0, 0xd, r2, 0x1) timerfd_gettime(r3, &(0x7f0000000480)) 05:15:56 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000180)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f9d1749e72050523b6fe360a9e9471e004052c09c0050e036000000000000000000ac30326e83b7d475946a2c6147189da93829720467d4cf6604120d011aeaba1e802d93ab966c1dc3fb36d85d3aaeae9a2a"], 0x1, 0x0, 0x0) 05:15:56 executing program 1: syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d0000d3196f") socket$inet_udp(0x2, 0x3, 0x0) 05:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.cpus\x00', 0x2, 0x0) r3 = dup3(r2, r0, 0x0) write$uinput_user_dev(r3, &(0x7f0000000180)={'syz1\x00'}, 0x45c) 05:15:56 executing program 0: syz_open_dev$usbmon(&(0x7f00000013c0)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0xfffffe26, [], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) 05:15:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001240)="2e0000002a00815fe45ac187185095cf0400b0eba0b4d65cdbaa98cbb30007fff00000000000600051894d5d1dac", 0x2e}], 0x1}, 0x0) 05:15:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:15:56 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file2/file0\x00', 0x0, 0x0, 0x0, 0x0) [ 234.494246] kernel msg: ebtables bug: please report to author: Wrong size 05:15:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0x1) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff46c) prctl$PR_GET_TIMERSLACK(0x1e) syz_execute_func(&(0x7f0000000080)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c3654c69000b3e0f1158108fa848cef707c5e17d708f87760000e404cd04cd0f2902") 05:15:56 executing program 2: timer_create(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 05:15:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) 05:15:56 executing program 4: syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x30000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000001c0)) r1 = dup(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r5 = socket$inet(0x2, 0x6, 0x2) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x8, 0x0, 0x0, 0xfff, 0x0, 0x9, 0x20, 0x2, 0x7f, 0x7, 0x0, 0x931, 0x0, 0x9, 0xffff, 0x2, 0x5, 0x7, 0x7fff, 0x0, 0xfffffffffffffff9, 0x0, 0xd6f, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x5, 0x89, 0x3, 0x0, 0x9, 0x5, 0x400, 0x0, 0x4, 0x4, @perf_bp={0x0}, 0x10004, 0xfffffffffffffff7, 0x12, 0x9, 0x80, 0x3, 0x3a83}, 0x0, 0xd, r2, 0x1) timerfd_gettime(r3, &(0x7f0000000480)) 05:15:57 executing program 5: fchmodat(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1f) gettid() open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:15:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) wait4(0x0, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) 05:15:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:57 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r0, 0x200002) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) msgrcv(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000540eb09900000000cb8e5ff2a8f8b3509b099e71141ce679f69f8d566b53308f4ffcd9b7673f6f0100b44a62a8"], 0x1, 0x0, 0x0) 05:15:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:57 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000180)=""/67, 0x10310) flock(r0, 0x2) mknod(&(0x7f0000000040)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x400002) flock(r0, 0x2) msgrcv(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="087361cc36c894f500008ab26f2b264cdf64d569dd430f1af534da6be964a90f11dc5752d9f05b27ac4af3018379a4d6052a0d9be01a1bab7f64443f004afc20b886793a4ba02f4bef4f0c4379f6ddcb9acb04f891593320e94718"], 0x1, 0x0, 0x0) 05:15:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x580, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000180)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2002) 05:15:57 executing program 4: shmctl$IPC_INFO(0xffffffffffffffff, 0x3, 0x0) 05:15:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0x1b50a87f) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffafc) prctl$PR_GET_TIMERSLACK(0x1e) syz_execute_func(&(0x7f0000000080)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c3654c69000b3e0f11581010196f04cd04cd0f2902") 05:15:57 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) 05:15:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="71f6", 0x2, 0x200000000000, 0x0, 0x0) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x98) [ 235.738928] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:15:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40800, 0x0) ftruncate(r1, 0x7) r3 = dup3(r1, r1, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@local, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000540)) readv(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x599, 0x30, 0x6, 0x401}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYBLOB="00580019ad23c18955549f18b7aa8c2f76fe4817f74b3a1ef4457619e789cafe9197053e556480f963fd7b1b805cf23bc6da9771546d0341bb994b50c13f191bc16b"], 0x0) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000000040)={0x1, 0xb, 0x4, 0x42000020, {0x0, 0x2710}, {0x4, 0xd, 0x0, 0x7, 0xa55, 0x5, "d92c2ed7"}, 0x5, 0x0, @offset=0x9, 0x4}) 05:15:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:58 executing program 1: syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x30000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000001c0)) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000000c0)=0x3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@can, &(0x7f0000000280)=0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) clock_adjtime(0x1, &(0x7f00000002c0)={0x5, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x4, 0x14, 0x0, 0x2000000000000000, 0x20, 0x6, 0x0, 0x5d, 0x0, 0x7e82, 0x0, 0x1ff, 0x0, 0x6, 0x9, 0x3, 0x9, 0x5, 0x3, 0x81}) r3 = socket$inet(0x2, 0x6, 0x2) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000200)='vxcan1\x00') perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x8, 0x0, 0x0, 0xfff, 0x0, 0x9, 0x20, 0x2, 0x7f, 0x7, 0x7fffffff, 0x931, 0x200, 0x9, 0xffff, 0x2, 0x5, 0x7, 0x7fff, 0x0, 0xfffffffffffffff9, 0x4, 0xd6f, 0x9, 0x5, 0x6, 0x0, 0x0, 0x0, 0x5, 0x89, 0x3, 0x7, 0x9, 0x5, 0x400, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x3}, 0x10004, 0xfffffffffffffff7, 0x12, 0x9, 0x80, 0x3, 0x3a83}, 0x0, 0xd, 0xffffffffffffffff, 0x1) timerfd_gettime(r1, &(0x7f0000000480)) 05:15:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='cmdline\x00') read$FUSE(r0, 0x0, 0x223) 05:15:58 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000180)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f9d1749e72050523b6fe360a9e9471e004052c09c0050e036000000000000000000ac30326e83b7d475946a2c6147189da938"], 0x1, 0x0, 0x0) 05:15:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:58 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x400002) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1e000000000100400000006801c81272a3f52cf1bab5ceb310abf6e114d12721219e5a0dd9193c5f6ddf399f9e131ebcb09e1107cd007a1f9552b75c004b391123a00347a6a185fb59bc97ee0b4ea55a6c55ce5872a096284f"], 0x1, 0x0, 0x0) 05:15:58 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r0, 0x200002) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) msgrcv(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000540eb09900000000cb8e5ff2a8f8b3509b099e71141ce679f69f8d56"], 0x1, 0x0, 0x0) 05:15:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102801ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0xc0386106, &(0x7f0000000180)) 05:15:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x18, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000003000000000000000000000095000000000000005eb0bb1586a3313779d904e1295c7b62e920eea0450f8bfae89098fa193451c3538595e369b085af1f278215735d84518aa8ac0ff0996f34cb0f00eca5c9fa990ab8f130feca62e88cf15852140bb002d1fdf02f34aa4e0473af5e249d2d91683066f9f27e27ccf701812598b32f55c3fb35a121a52d4696a6fc4dd97aeddbb373dd7d183d8dbab770a3d226676e50877c53949d5e02251675017321fbab5a6517a75989b24ebe26a33865f0a4"], 0x0, 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x4, 0x4, 0x9, 0x7, 0x3, 0x3e, 0x5, 0x1dd, 0x38, 0x257, 0x645, 0x4, 0x20, 0x1, 0x1, 0x9, 0x1f}, [{0x2, 0xfff, 0x2, 0x3, 0x60000000000000, 0x0, 0xfffffffffffffff8, 0x200}], "38699e89bdbf44667a49749478834d889118daf85c2904a947d9fb523d2f0f", [[]]}, 0x177) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000500)="4be52c", 0x3}], 0x1}, 0x0) 05:15:58 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2000000000000003) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) flock(r0, 0x2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2000047aa51de3953db0b29a453b524a288788994dbf37679d1cba"], 0x1b}, 0x0) 05:15:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40800, 0x0) ftruncate(r1, 0x7) r3 = dup3(r1, r1, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@local, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000540)) readv(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x599, 0x30, 0x6, 0x401}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYBLOB="00580019ad23c18955549f18b7aa8c2f76fe4817f74b3a1ef4457619e789cafe9197053e556480f963fd7b1b805cf23bc6da9771546d0341bb994b50c13f191bc16b"], 0x0) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000000040)={0x1, 0xb, 0x4, 0x42000020, {0x0, 0x2710}, {0x4, 0xd, 0x0, 0x7, 0xa55, 0x5, "d92c2ed7"}, 0x5, 0x0, @offset=0x9, 0x4}) 05:15:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) syz_execute_func(&(0x7f0000000340)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110d319bd0cbd0c") write$P9_RCLUNK(r1, 0x0, 0x0) [ 236.627395] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:15:58 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000001a05ae91bf0d5c3564f245199edbe080000000000000000000000197f24b7f1d28d2923e07cca96230000000000000091b2419565942edd3c26e7d8201c2c607935204ec6d8cfa0e8ba6d945f8e6f53f5aa9193404d5f7776ae6954349b294de94a2fa49bba8f69c9dc681fd39f4085f024e71b2522"], 0x1, 0x0, 0x0) 05:15:58 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000003000812de45ae087185082cf0300b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 05:15:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresgid(0x0, 0x0, &(0x7f0000001f40)) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x13e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) [ 236.837560] netlink: 22 bytes leftover after parsing attributes in process `syz-executor2'. [ 236.887998] netlink: 22 bytes leftover after parsing attributes in process `syz-executor2'. 05:15:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 05:15:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x9, 0x0, 0x1, 0xe0a}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x5528aec0}], 0x1, 0x0) getpgrp(0xffffffffffffffff) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='io\x00\x11\xf9|\xa4\x8b|C\xdb\x06=Y%\x9d\xa9L\xd2<\xf4\xeb\x93Jou\xdd\x15\x8e\x1c\"\xe3\xbc\xff\x7f\tH\x00\x00\x14\"2\xe3\xfb\xcc.\x1ba\xfbR+\x00\xd7\x9a\xd7|0\x1c&\xac\t\xab%gG\xc3\xf8\x05\x00\x00\x00b\xf6\xb4:\xff\xef\x06\xdd\xf3\x87q\xd0\r\x99%j\xdau\x9bj\arX\xcb\"O\xe0\x1eP7z6\xbftHB\x8eY3\xd0\xd7') pread64(r4, 0x0, 0x0, 0x0) 05:15:59 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, 0x0, 0x0) 05:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast1, @local}, 0x10) 05:15:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40800, 0x0) ftruncate(r1, 0x7) r3 = dup3(r1, r1, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@local, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000540)) readv(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x599, 0x30, 0x6, 0x401}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYBLOB="00580019ad23c18955549f18b7aa8c2f76fe4817f74b3a1ef4457619e789cafe9197053e556480f963fd7b1b805cf23bc6da9771546d0341bb994b50c13f191bc16b"], 0x0) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000000040)={0x1, 0xb, 0x4, 0x42000020, {0x0, 0x2710}, {0x4, 0xd, 0x0, 0x7, 0xa55, 0x5, "d92c2ed7"}, 0x5, 0x0, @offset=0x9, 0x4}) 05:15:59 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, 0x0, 0x0, 0x0) r4 = creat(0x0, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) linkat(r3, 0x0, r2, &(0x7f0000000240)='./file0\x00', 0x400) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc), 0x4) r6 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) getgroups(0x0, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x7f, @loopback}, 0x1c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) geteuid() request_key(&(0x7f0000000080)='id_legacy\x00', 0x0, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) dup(r5) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000480)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x6) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000280)=0x800, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:15:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) 05:15:59 executing program 5: 05:15:59 executing program 1: 05:15:59 executing program 1: 05:15:59 executing program 5: 05:15:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) [ 237.835262] ================================================================== [ 237.842725] BUG: KMSAN: uninit-value in _decode_session4+0x3d0/0x1c90 [ 237.849333] CPU: 0 PID: 9962 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #1 [ 237.856446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.865820] Call Trace: [ 237.868441] dump_stack+0x173/0x1d0 [ 237.872126] kmsan_report+0x12e/0x2a0 [ 237.875956] __msan_warning+0x82/0xf0 [ 237.879786] _decode_session4+0x3d0/0x1c90 05:15:59 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x796}], 0x1}}], 0x3ffffffffffffc9, 0x0, 0x0) [ 237.884061] __xfrm_decode_session+0x152/0x210 [ 237.888679] ? xfrm4_get_saddr+0x3e0/0x3e0 [ 237.892934] vti6_tnl_xmit+0x182/0x2360 [ 237.896935] ? packet_direct_xmit+0x3e0/0x3e0 [ 237.902411] ? dev_queue_xmit_nit+0x1185/0x1260 [ 237.907140] ? vti6_dev_uninit+0x660/0x660 [ 237.911624] dev_hard_start_xmit+0x607/0xc40 [ 237.916080] __dev_queue_xmit+0x2e42/0x3bc0 [ 237.920472] dev_queue_xmit+0x4b/0x60 [ 237.924294] ? __netdev_pick_tx+0x1270/0x1270 [ 237.928814] packet_sendmsg+0x8306/0x8f30 [ 237.932989] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 237.938386] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 237.943863] ? rw_copy_check_uvector+0x149/0x650 [ 237.948662] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 237.954113] ___sys_sendmsg+0xdb9/0x11b0 [ 237.958198] ? do_futex+0x350/0x68a0 [ 237.961942] ? compat_packet_setsockopt+0x360/0x360 [ 237.966992] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 237.972392] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 237.977777] ? __fget_light+0x6e1/0x750 [ 237.981798] __sys_sendmmsg+0x570/0xa60 [ 237.985831] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 237.991303] ? prepare_exit_to_usermode+0x114/0x420 [ 237.996346] ? syscall_return_slowpath+0x50/0x650 [ 238.001225] __se_sys_sendmmsg+0xbd/0xe0 [ 238.005329] __x64_sys_sendmmsg+0x56/0x70 [ 238.009507] do_syscall_64+0xbc/0xf0 [ 238.013256] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.018463] RIP: 0033:0x457ec9 [ 238.021680] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.040607] RSP: 002b:00007fd2c2495c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 238.048349] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 238.055652] RDX: 000000000400004e RSI: 0000000020000d00 RDI: 0000000000000003 [ 238.062943] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 238.070233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd2c24966d4 [ 238.077520] R13: 00000000004c4b74 R14: 00000000004d8290 R15: 00000000ffffffff [ 238.084817] [ 238.086455] Uninit was created at: [ 238.090022] kmsan_internal_poison_shadow+0x92/0x150 [ 238.095145] kmsan_kmalloc+0xa6/0x130 [ 238.098964] kmsan_slab_alloc+0xe/0x10 [ 238.102870] __kmalloc_node_track_caller+0xe18/0x1030 [ 238.108104] __alloc_skb+0x309/0xa20 [ 238.111841] alloc_skb_with_frags+0x1c7/0xac0 [ 238.116357] sock_alloc_send_pskb+0xafd/0x10e0 [ 238.120953] packet_sendmsg+0x661a/0x8f30 [ 238.125147] ___sys_sendmsg+0xdb9/0x11b0 [ 238.129222] __sys_sendmmsg+0x570/0xa60 [ 238.133216] __se_sys_sendmmsg+0xbd/0xe0 [ 238.137298] __x64_sys_sendmmsg+0x56/0x70 [ 238.141465] do_syscall_64+0xbc/0xf0 [ 238.145199] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.150395] ================================================================== [ 238.158057] Disabling lock debugging due to kernel taint [ 238.163599] Kernel panic - not syncing: panic_on_warn set ... [ 238.169505] CPU: 0 PID: 9962 Comm: syz-executor4 Tainted: G B 4.20.0-rc7+ #1 [ 238.178003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.187372] Call Trace: [ 238.189995] dump_stack+0x173/0x1d0 [ 238.193660] panic+0x3ce/0x961 [ 238.196906] kmsan_report+0x293/0x2a0 [ 238.200737] __msan_warning+0x82/0xf0 [ 238.204567] _decode_session4+0x3d0/0x1c90 [ 238.208844] __xfrm_decode_session+0x152/0x210 [ 238.213455] ? xfrm4_get_saddr+0x3e0/0x3e0 [ 238.217722] vti6_tnl_xmit+0x182/0x2360 [ 238.221896] ? packet_direct_xmit+0x3e0/0x3e0 [ 238.226406] ? dev_queue_xmit_nit+0x1185/0x1260 [ 238.231785] ? vti6_dev_uninit+0x660/0x660 [ 238.236045] dev_hard_start_xmit+0x607/0xc40 [ 238.240501] __dev_queue_xmit+0x2e42/0x3bc0 [ 238.244968] dev_queue_xmit+0x4b/0x60 [ 238.248792] ? __netdev_pick_tx+0x1270/0x1270 [ 238.253310] packet_sendmsg+0x8306/0x8f30 [ 238.257489] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.262887] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 238.269382] ? rw_copy_check_uvector+0x149/0x650 [ 238.274229] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.279699] ___sys_sendmsg+0xdb9/0x11b0 [ 238.283817] ? do_futex+0x350/0x68a0 [ 238.287533] ? compat_packet_setsockopt+0x360/0x360 [ 238.292572] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 238.297960] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 238.303359] ? __fget_light+0x6e1/0x750 [ 238.307373] __sys_sendmmsg+0x570/0xa60 [ 238.311397] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 238.316902] ? prepare_exit_to_usermode+0x114/0x420 [ 238.321944] ? syscall_return_slowpath+0x50/0x650 [ 238.326818] __se_sys_sendmmsg+0xbd/0xe0 [ 238.331032] __x64_sys_sendmmsg+0x56/0x70 [ 238.335179] do_syscall_64+0xbc/0xf0 [ 238.338890] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.344102] RIP: 0033:0x457ec9 [ 238.347300] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.366345] RSP: 002b:00007fd2c2495c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 238.374053] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 238.381318] RDX: 000000000400004e RSI: 0000000020000d00 RDI: 0000000000000003 [ 238.388764] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 238.396038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd2c24966d4 [ 238.403531] R13: 00000000004c4b74 R14: 00000000004d8290 R15: 00000000ffffffff [ 238.412289] Kernel Offset: disabled [ 238.415925] Rebooting in 86400 seconds..