[ 63.069245] audit: type=1800 audit(1539175413.121:27): pid=6244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 64.625266] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 66.174083] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 66.659043] random: sshd: uninitialized urandom read (32 bytes read) [ 69.427297] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.67' (ECDSA) to the list of known hosts. [ 75.520915] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/10 12:43:47 fuzzer started [ 80.226998] random: cc1: uninitialized urandom read (8 bytes read) [ 80.876415] as (6400) used greatest stack depth: 53184 bytes left 2018/10/10 12:43:52 dialing manager at 10.128.0.26:45337 2018/10/10 12:43:52 syscalls: 1 2018/10/10 12:43:52 code coverage: enabled 2018/10/10 12:43:52 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/10 12:43:52 setuid sandbox: enabled 2018/10/10 12:43:52 namespace sandbox: enabled 2018/10/10 12:43:52 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/10 12:43:52 fault injection: enabled 2018/10/10 12:43:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/10 12:43:52 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/10 12:43:52 net device setup: enabled [ 85.929438] random: crng init done 12:45:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x9, 0x10010, r0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/21, 0x15}], 0x1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000000)) [ 206.826219] IPVS: ftp: loaded support on port[0] = 21 [ 208.242522] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.249013] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.257790] device bridge_slave_0 entered promiscuous mode [ 208.423611] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.430098] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.439105] device bridge_slave_1 entered promiscuous mode [ 208.586247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.732587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 209.195180] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.344967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.635045] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.642226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.097743] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.106035] team0: Port device team_slave_0 added 12:46:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)="c8a8707470", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 210.327134] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.335863] team0: Port device team_slave_1 added [ 210.556559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.811387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.818645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.827807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.085942] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.093649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.103199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.194416] IPVS: ftp: loaded support on port[0] = 21 [ 211.369351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.377074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.386443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.162649] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.169179] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.177962] device bridge_slave_0 entered promiscuous mode [ 213.467165] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.473774] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.482504] device bridge_slave_1 entered promiscuous mode [ 213.743307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.971247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.013963] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.020440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.027568] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.034239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.043500] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.162525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.681294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.937949] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.256781] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.265265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.492349] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.499476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.210107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.218659] team0: Port device team_slave_0 added [ 216.433278] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.441431] team0: Port device team_slave_1 added 12:46:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) shutdown(r0, 0x1) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfdb8, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) [ 216.693722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.700780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.709910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.033781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.040979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.050446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.374383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.382361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.391744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.684871] IPVS: ftp: loaded support on port[0] = 21 [ 217.712071] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.719926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.729495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.596100] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.602706] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.611740] device bridge_slave_0 entered promiscuous mode [ 220.908300] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.914855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.921944] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.928412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.937518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.984081] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.990528] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.999497] device bridge_slave_1 entered promiscuous mode [ 221.122593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.315545] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.661666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.582302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.905844] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.207027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.214226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.553576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.560673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.410973] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.420010] team0: Port device team_slave_0 added [ 224.590456] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.598900] team0: Port device team_slave_1 added [ 224.958572] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.966634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.975750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 12:46:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00'}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast1, @multicast1}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x70, r1, 0x402, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8, 0x1, r3}, {0x4}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/240, 0xf0}], 0x1) [ 225.290182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.298298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.307598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.754784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.762555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.772029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.045426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.112749] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.120737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.129959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.642651] IPVS: ftp: loaded support on port[0] = 21 [ 227.561053] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.026342] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.033008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.041269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.036922] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.043692] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.052481] device bridge_slave_0 entered promiscuous mode [ 230.423548] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.430043] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.438950] device bridge_slave_1 entered promiscuous mode [ 230.459710] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.466290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.473390] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.479888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.488852] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.604625] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.823903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.145344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.285540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.304987] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.698685] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.034414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 233.041516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.382776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 233.389892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.581098] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 234.590519] team0: Port device team_slave_0 added [ 234.962562] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 234.970823] team0: Port device team_slave_1 added [ 235.309160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 235.316640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.326003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.667370] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 235.674638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.683878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.952954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.120817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.128684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.138105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 12:46:26 executing program 4: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) poll(&(0x7f0000000000)=[{}], 0x1, 0x10001) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x14) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) tkill(r0, 0x1000000000016) [ 236.471629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.479681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.489025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.612365] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.390009] IPVS: ftp: loaded support on port[0] = 21 [ 239.275828] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.282471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.290667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.955257] 8021q: adding VLAN 0 to HW filter on device team0 12:46:31 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000d40)={0x0, 0x0}) shutdown(r1, 0x2) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r0, 0x60}, {r0}], 0x2, &(0x7f0000000140)={0x0, r2+30000000}, &(0x7f0000000180), 0x8) [ 241.513496] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.520057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.527189] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.533800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.542525] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.592041] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 12:46:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) r2 = dup2(r1, r0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000000)=0x5) [ 242.115277] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 12:46:32 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendto(r0, &(0x7f00000001c0)="ac", 0x1, 0xfffffffffffffffd, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @local, 'ip6gretap0\x00'}}, 0x80) recvmmsg(r0, &(0x7f0000000b00)=[{{0x0, 0xfffffffffffffd6b, &(0x7f0000000800), 0x0, &(0x7f0000000880)=""/209, 0xd1}}, {{&(0x7f0000000980)=@hci, 0xc, &(0x7f00000009c0), 0xa3, &(0x7f0000000a00)=""/240, 0xf0}}], 0x2d5, 0x2042, &(0x7f0000000b80)={0x77359400}) recvfrom(r0, &(0x7f0000000000)=""/100, 0x64, 0x0, &(0x7f0000000140)=@generic={0x0, "c30c31e873b2d5a225cdc68a72ae10a1c837cb5167d129f378e5b62c0ebc861711338c6598afc3af3c7d69d7ab7964a816c5f8b988419a46e657444585162384825db838c61b28852e6de0dafcf0b5798746be4bf106e2a49a709b9f68e0dca34f262006e320addea4973f236623411e819d37fa18101e733e48d6f3396d"}, 0x80) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x107c0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000340)=0x1f, 0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x3ffffd, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={'syzkaller0\x00', {0x2, 0x4e20, @local}}) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e20, @local}], 0xffffffffffffff28) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f00000003c0)=0x12028c, 0x4) [ 242.915077] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.921989] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.931013] device bridge_slave_0 entered promiscuous mode 12:46:33 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20008000, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f0000000140), 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000080)={0x0, 0x9, 0xaed, 0x4}) [ 243.367996] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.374569] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.383404] device bridge_slave_1 entered promiscuous mode [ 243.802974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 12:46:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/bnep\x00') setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x9, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)={0x8, 0x86, [0x1, 0x1]}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x4, 0x800000000000011, 0x0, 0xffffffffffffffff}) r3 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)={0x10000000003}) [ 244.290954] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 12:46:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xd7) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0x2}, &(0x7f00000001c0)=0x8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @local}}, 0x1c) socket$inet6(0xa, 0x800, 0x1) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="a7637075736574757365726b657972696e672a263a766d6e65743100", 0xfffffffffffffffb) 12:46:35 executing program 0: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xa30000}}, 0x20, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x100, 0x180) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x80200, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000100)={0x43, 0x9, 0x1, {0x3, 0x400, 0x401, 0x1000, 0x8, 0x3, 0x3, 0x100, 0x9}}, 0x43) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000001c0)) write$P9_RCREATE(r1, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x1, 0x3, 0x2}, 0x20}}, 0x18) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) [ 245.705588] bond0: Enslaving bond_slave_0 as an active interface with an up link 12:46:35 executing program 0: syslog(0xa, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x400000) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000040)=ANY=[@ANYBLOB="40000000000000000800000000000000001800000000000004000000000000000100000000000000000182180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000008000000000000009601ffff0000000000000000000000000000000000000000000000000000000000000000000000008fa68311000000000500690001e1593baacf8b2f5e0000000000000200000000000000f7000005000000000000000000000000000000000000000000000000000000bfcf00000007000000000000000000000000000000000000000000000000000000000000000000000000040000000000000001000000000000001c00000000000000ed0505090000000000000000000000000000000000000000000000000000000000000000000000000100000000000000d9ffffffffffffff00000000000000000004ff0500000000000000000000000000000000000000000000000000000000000000000000000008000000000000003300000000000000ffff00000000000004020100000000000000000000000000000000000000000000000000000000000000000000000000b20af800000000000101000000000000090000000000000001010601000000000000000000000000000000000000000000000000001f8e021a80551c81bc85b346110e8a69edd7a1a60967b25e6d4e35fb"]) [ 246.198815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.670047] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 246.677374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.096221] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.103538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.989462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.219514] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.227963] team0: Port device team_slave_0 added [ 248.613668] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.622257] team0: Port device team_slave_1 added [ 248.984440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 248.991543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.000586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.347197] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 249.354585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.363852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.536498] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 249.682627] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.691374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.700872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.099287] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.107154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.116176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.803586] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.810026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.818158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:46:41 executing program 1: sched_setaffinity(0x0, 0x11f, &(0x7f00000001c0)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) [ 251.867880] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.502125] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.508669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.515836] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.522395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.530223] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.537702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.864358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.687377] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.516746] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.523353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.531493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.267684] 8021q: adding VLAN 0 to HW filter on device team0 12:46:47 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) [ 261.257786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.639747] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 12:46:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00'}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast1, @multicast1}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x70, r1, 0x402, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8, 0x1, r3}, {0x4}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/240, 0xf0}], 0x1) [ 262.092924] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.099251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.107287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.505115] 8021q: adding VLAN 0 to HW filter on device team0 12:46:54 executing program 4: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) poll(&(0x7f0000000000)=[{}], 0x1, 0x10001) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x14) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) tkill(r0, 0x1000000000016) 12:46:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000700)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote}, 0x0, @in6}]}]}, 0x16c}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x107800, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) 12:46:54 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x206100) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x2) getsockopt$inet6_dccp_int(r0, 0x21, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000001c0)={r0, r0, 0x1000}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000500)={0x160, 0x0, 0x5, [{{0x3, 0x1, 0x0, 0x8, 0x401, 0x5, {0x4, 0x80, 0x7, 0x3ff, 0x46, 0x1900000000000, 0x4f24, 0x101, 0x3, 0x8, 0x0, r3, r6, 0x2c, 0xfffffffffffffffd}}, {0x6, 0x1000, 0x10, 0x4, 'eth1em1loem1eth0'}}, {{0x5, 0x0, 0x401, 0xfffffffffffffffb, 0x1, 0x9, {0x4, 0x2, 0x8, 0x2, 0x7, 0x3, 0x8, 0x6, 0x43, 0x8, 0x3, r7, r8, 0x3, 0x2}}, {0x4, 0x1, 0xb, 0x7f, '/dev/midi#\x00'}}]}, 0x160) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000680)={'ip_vti0\x00', 0x9400}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000006c0)=0x400001) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) write(r9, &(0x7f0000000740)="d8837f5231a43acd1688641a101293930758bbf05bf18aec9e3e0b1714221f1810a8c4ad19a1ba1412670b4c4dd7cb1e0eb730", 0x33) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000007c0)={&(0x7f0000000780)=[0x10000], 0x1, 0x6, 0x7544, 0x8, 0x0, 0x3, {0x8001, 0x80, 0x7fff, 0x5, 0x1, 0x6322, 0x6, 0x18e, 0x1, 0x3ff, 0x8, 0x7, 0x5, 0xfffffffffffffff8, "7ded259a1fe4cf144e1c0144bf4d4a91bbdb12095eae14cedaf705f70bfd8ef1"}}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0xb8, 0xfffffffffffffffe, 0x3, [{{0x3, 0x1, 0x2, 0x9, 0xfff, 0x1a1, {0x1, 0x1, 0x7, 0x10f, 0x2, 0x9, 0xa79a, 0xffffffffffffffe0, 0x80000001, 0x197, 0x7f, r5, r4, 0xfffffffffffffff9, 0x1ff}}, {0x6, 0x6, 0xb, 0x0, '/dev/midi#\x00'}}]}, 0xb8) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000980)={0x9, &(0x7f0000000900)=[{0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000ac0)={r11, 0x1, &(0x7f00000009c0)=[0x7cc3b13d], &(0x7f0000000a00)=[0x1ff, 0xa55, 0x7fffffff], 0x43, 0x7, 0x80000000, &(0x7f0000000a40)=[0x1, 0x3, 0x83, 0xffffffffffffffff, 0xda, 0x7fff, 0x6], &(0x7f0000000a80)=[0x321, 0x1, 0x9c0, 0x3]}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) socket$inet_udplite(0x2, 0x2, 0x88) r13 = syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x6, 0x0) ioctl$DRM_IOCTL_UNLOCK(r13, 0x4008642b, &(0x7f0000000b40)={r10, 0x20}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)='trusted.overlay.opaque\x00', &(0x7f0000000c00)='y\x00', 0x2, 0x2) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000c40)={r12, 0x17}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r13, 0x84, 0x6c, &(0x7f0000000c80)={0x0, 0xfd, "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"}, &(0x7f0000000dc0)=0x105) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r13, 0x84, 0x22, &(0x7f0000000e00)={0x1, 0x0, 0x9, 0x1, r14}, &(0x7f0000000e40)=0x10) r15 = shmget(0x1, 0x3000, 0x54000002, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r15, 0xd, &(0x7f0000000e80)=""/19) 12:46:54 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8001, 0x0) write$binfmt_elf32(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="7f"], 0x1) 12:46:54 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:46:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00'}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast1, @multicast1}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x70, r1, 0x402, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8, 0x1, r3}, {0x4}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/240, 0xf0}], 0x1) 12:46:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00'}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast1, @multicast1}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x70, r1, 0x402, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8, 0x1, r3}, {0x4}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/240, 0xf0}], 0x1) 12:46:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x4413fcf12466f4d}}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 12:46:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) add_key$user(&(0x7f0000000600)='user\x00', &(0x7f00000008c0)={'syz'}, &(0x7f0000000900), 0x0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f00000006c0)}}, 0x18) 12:46:55 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) [ 265.509159] ucma_write: process 245 (syz-executor4) changed security contexts after opening file descriptor, this is not allowed. 12:46:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="f9006f9fa985dd13"], 0x8) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xffffffffffffffff, 0x3}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 12:46:55 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) sched_setaffinity(0x0, 0x11f, &(0x7f00000001c0)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) 12:46:55 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:46:56 executing program 1: [ 266.610217] IPVS: ftp: loaded support on port[0] = 21 [ 267.377852] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.384395] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.392268] device bridge_slave_0 entered promiscuous mode [ 267.477998] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.484610] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.492836] device bridge_slave_1 entered promiscuous mode [ 267.573687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 267.654255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 267.903814] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 267.987664] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.078667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 268.085731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.168696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 268.176000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.423191] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 268.430987] team0: Port device team_slave_0 added [ 268.510335] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 268.518159] team0: Port device team_slave_1 added [ 268.599523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.681421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.760746] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 268.768181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.777507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.853057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 268.860394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.869631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.797092] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.803590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.810406] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.817002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.825094] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 270.032054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.068474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.365085] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.658423] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.664821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.673049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.970313] 8021q: adding VLAN 0 to HW filter on device team0 12:47:05 executing program 5: 12:47:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x4413fcf12466f4d}}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 12:47:05 executing program 3: 12:47:05 executing program 4: 12:47:05 executing program 1: 12:47:05 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) 12:47:06 executing program 4: r0 = semget(0xffffffffffffffff, 0x3, 0xc9) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000180)=""/240) 12:47:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 12:47:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100000000000000"], 0x8) 12:47:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) getdents(r1, &(0x7f0000000540)=""/185, 0xfffffd62) 12:47:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) 12:47:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') preadv(r0, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/169, 0xa9}], 0x1, 0x0) 12:47:06 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:47:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={"000f00"}, &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) 12:47:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') preadv(r0, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/169, 0xa9}], 0x1, 0x0) 12:47:07 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) 12:47:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x2003}) 12:47:07 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x177, 0x1e3) sendto$inet6(r2, &(0x7f0000e13f4e), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) dup3(r1, r2, 0x0) 12:47:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={"000f00"}, &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) 12:47:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffffffffffe45) 12:47:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x201a}) [ 277.802533] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:47:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={"000f00"}, &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) 12:47:08 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={"000f00"}, &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) 12:47:08 executing program 5: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) 12:47:08 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0x6c000000}) 12:47:08 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) 12:47:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000001c0)="cb", 0x1, 0x8040, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect(r0, &(0x7f0000000140)=@un=@file={0x0, './file0\x00'}, 0x80) close(r0) 12:47:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x2013}) 12:47:08 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004100), 0x2d2) [ 278.604297] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor1' sets config #1811939328 12:47:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x3, 0x80) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 12:47:08 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:09 executing program 3: clone(0x2000000000001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() r2 = dup(r0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) tkill(r1, 0x8001004000000016) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/63) 12:47:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0xf, 0x11, r2, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="040628bd7000fddffc"], 0x1}}, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000000)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:47:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x4, 0x4, 0x0, 0x0, 0x1}, 0xe) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 12:47:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x4, &(0x7f00000012c0)=0x0) io_getevents(r1, 0x2, 0x8f, &(0x7f0000d83f60)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) r2 = memfd_create(&(0x7f0000000000)=':+lo#\x00', 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000001c0)={0xa0}, 0xa0) io_submit(r1, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000100)}]) 12:47:09 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) [ 279.701883] hrtimer: interrupt took 217864 ns 12:47:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_hardwall\x00', 0x2, 0x0) preadv(r1, &(0x7f0000002540)=[{&(0x7f00000012c0)=""/210, 0xd2}], 0x1, 0x0) 12:47:10 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:10 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) read$FUSE(0xffffffffffffffff, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1100000000000000"], 0x8) 12:47:11 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) [ 282.601464] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large: [ 282.612895] clocksource: 'acpi_pm' wd_now: b2a2e0 wd_last: ee93b0 mask: ffffff [ 282.622376] clocksource: 'tsc' cs_now: 9cb303bb52 cs_last: 9ac6eb9164 mask: ffffffffffffffff [ 282.633062] tsc: Marking TSC unstable due to clocksource watchdog 12:47:12 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) read$FUSE(0xffffffffffffffff, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r1, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00007a8fff), 0x550, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 282.653051] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 282.661954] sched_clock: Marking unstable (282731301957, -78270898)<-(282771233277, -118201344) [ 282.679841] clocksource: Switched to clocksource acpi_pm [ 282.809495] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:47:13 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4b, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)=')bdev%+\x00', 0x0) 12:47:13 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') exit(0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/239, 0xef}], 0x1, 0x0) 12:47:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x3, 0x80) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 12:47:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x4, &(0x7f00000012c0)=0x0) io_getevents(r1, 0x2, 0x8f, &(0x7f0000d83f60)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) r2 = memfd_create(&(0x7f0000000000)=':+lo#\x00', 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000001c0)={0xa0}, 0xa0) io_submit(r1, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000100)}]) 12:47:13 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) read$FUSE(0xffffffffffffffff, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x800) 12:47:13 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x3, 0x80) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000001640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 12:47:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 12:47:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="f9006f9fa985dd13"], 0x8) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 12:47:13 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:14 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000001e001102"], 0x1}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:47:14 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)={0x0, 0x0}) sched_setaffinity(r0, 0x11f, &(0x7f00000001c0)=0x40000000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000180)=0xc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r3, &(0x7f0000000080), 0x197) 12:47:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x338f, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) 12:47:14 executing program 1: r0 = socket$inet6(0xa, 0x100000000001, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x6, &(0x7f0000000000)={@empty={[0x0, 0x2]}}, 0xfffffffffffffe75) 12:47:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x7]}, 0x2c) 12:47:14 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x7f}) 12:47:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000700)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]], 0xfffffc1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f00000004c0)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000180)=[{&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/156, 0x9c}], 0x2, &(0x7f00000002c0)=""/128, 0x80}}], 0x1, 0x0, &(0x7f0000000540)={0x77359400}) 12:47:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x9}, 0x14) 12:47:15 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000001e001102"], 0x1}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:47:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4bff) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000200), 0xfffffd07}]) mlockall(0x6) 12:47:15 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) 12:47:15 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 12:47:15 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0xc0045103, &(0x7f0000000380)={0x5}) 12:47:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fgetxattr(r0, &(0x7f0000000100)=@random={'user.', "2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00"}, &(0x7f0000000180)=""/134, 0x86) 12:47:16 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:16 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0xc0045103, &(0x7f0000000380)={0x5}) 12:47:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x10000030}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) 12:47:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x0, &(0x7f00000000c0)) 12:47:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000000, 0x2c, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e40f00800d5dc57ee41dea43e63a377fb8a977c3f1d1756be5143d84648a27f11c72b", &(0x7f0000000040)=""/41, 0x0, 0x3b8a}, 0x28) 12:47:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x201c}) 12:47:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = open(&(0x7f0000000140)='./bus\x00', 0x40, 0x0) close(r1) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x200000000005, 0x0) readahead(r1, 0x0, 0x0) 12:47:16 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 12:47:16 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="fe8000000000000000000000000000aa0000000032000000fe8000000000000000000000000000bb0000000000000000000000000000000000000000000000000000000000000000326800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000034b5d7db7bb9488359129c6a35ad01e07782a759ffcb6ea31f549fbd3e04d1390a0a07750266e7b90f6b4490fc1ff602003edf1063575a1ab5267581b983fd5f538ec9713aafc0cbf7"], 0x1}}, 0x0) 12:47:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl(r1, 0x800000000000937e, &(0x7f0000000040)="25000000000000007f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in6=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) 12:47:17 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) 12:47:17 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:17 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) [ 287.578072] autofs4:pid:8319:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(37.0), cmd(0x0000937e) [ 287.590847] autofs4:pid:8319:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 12:47:18 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[]}}, 0x0) 12:47:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={"000f00"}, &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) 12:47:18 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0xc0046d00, &(0x7f0000000380)={0x5}) 12:47:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000000, 0xe, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e40f00800", &(0x7f0000000040)=""/41, 0x0, 0x3b8a}, 0x28) 12:47:18 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 12:47:18 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x200a}) 12:47:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={"000f00"}, &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) 12:47:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="fe8000000000000000000000000000aa0000000032000000fe8000000000000000000000000000bb0000000000000000000000000000000000000000000000000000000000000000326800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000034b5d7db7bb9488359129c6a35ad01e07782a759ffcb6ea31f549fbd3e04d1390a0a07750266e7b90f6b4490fc1ff602003edf1063575a1ab5267581b983fd5f538ec9713aafc0cbf7"], 0x1}}, 0x0) 12:47:18 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 12:47:18 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x666, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4181, 0x0) 12:47:19 executing program 5: ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) 12:47:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x200a}) 12:47:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000700)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]], 0xfffffc1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f00000004c0)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000180)=[{&(0x7f0000001ac0)=""/4096, 0x20001000}, {&(0x7f0000000100)=""/58, 0x3a}, {&(0x7f0000000200)=""/156, 0x9c}], 0x3, &(0x7f00000002c0)=""/128, 0xfffffffffffffd86}}], 0x1, 0x0, &(0x7f0000000540)={0x77359400}) 12:47:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x200d}) 12:47:19 executing program 4: capset(&(0x7f00000002c0)={0x20071026}, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffe, 0x8031, 0xffffffffffffffff, 0x0) 12:47:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$packet(0x11, 0x0, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000000, 0x13, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e40f00800d5dc57ee41", &(0x7f0000000040)=""/41, 0x100, 0x3b8a}, 0x28) 12:47:19 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(0xffffffffffffffff, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:19 executing program 5: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x20000000) [ 289.704452] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure 12:47:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xa}) 12:47:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 12:47:20 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:20 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(0xffffffffffffffff, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:20 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) 12:47:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0x0) 12:47:20 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="f9"], 0x1) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 12:47:20 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r2, &(0x7f0000000080), 0x1a6) 12:47:20 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(0xffffffffffffffff, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 12:47:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 12:47:21 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x802, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$P9_RLINK(r1, &(0x7f0000000040)={0x7}, 0x7) sendfile(r0, r1, 0x0, 0x400008bca) 12:47:21 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 12:47:21 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) [ 291.500718] Dead loop on virtual device ip6_vti0, fix it urgently! 12:47:21 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000240)='\t', 0x1}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r2, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) 12:47:21 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x14) socket$inet(0x2, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) [ 291.835908] ptrace attach of "/root/syz-executor0"[8486] was attempted by "/root/syz-executor0"[8487] 12:47:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x802, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$P9_RLINK(r1, &(0x7f0000000040)={0x7}, 0x7) sendfile(r0, r1, 0x0, 0x400008bca) 12:47:22 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:22 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) [ 292.152038] Dead loop on virtual device ip6_vti0, fix it urgently! 12:47:22 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 12:47:22 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) read$FUSE(r0, &(0x7f0000000180), 0x1000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 12:47:22 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:22 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000014c0)='/dev/input/event#\x00', 0x7ff, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001780)) [ 292.684201] Dead loop on virtual device ip6_vti0, fix it urgently! 12:47:22 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:22 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:23 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v2, 0x14, 0x3) [ 293.079660] Dead loop on virtual device ip6_vti0, fix it urgently! 12:47:24 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400000002, 0x0) ioctl$int_in(r0, 0xc0000880045017, &(0x7f0000000000)) 12:47:24 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000540)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800), 0x0) ioctl$VT_RELDISP(r0, 0x5605) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:47:24 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:24 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x40000000000010) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000004000)="240000001d0003ffff3cc0023da2830101faffffff86c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) recvmmsg(r1, &(0x7f000000cc40)=[{{&(0x7f00000021c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002740)=[{&(0x7f0000002240)=""/145, 0x91}, {&(0x7f0000002300)=""/135, 0x87}, {&(0x7f00000023c0)=""/102, 0x66}, {&(0x7f0000002440)=""/75, 0x4b}, {&(0x7f00000025c0)=""/39, 0x27}, {&(0x7f0000002600)=""/129, 0x81}, {&(0x7f0000002980)=""/4096, 0x1000}], 0x7, &(0x7f0000002800)=""/142, 0x8e, 0x3}, 0x4}, {{&(0x7f00000028c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003980)=""/237, 0xed}, {&(0x7f0000003a80)=""/98, 0x62}, {&(0x7f0000003b00)=""/254, 0xfe}], 0x3, &(0x7f0000003c40)=""/200, 0xc8, 0xa6b4}}, {{&(0x7f0000003d40)=@can, 0x80, &(0x7f00000041c0)=[{&(0x7f0000003dc0)=""/16, 0x10}, {&(0x7f0000003e00)=""/116, 0x74}, {&(0x7f0000003e80)=""/2, 0x2}, {&(0x7f0000003ec0)=""/66, 0x42}, {&(0x7f0000003f40)=""/131, 0x83}, {&(0x7f0000004040)}, {&(0x7f0000004080)=""/80, 0x50}, {&(0x7f0000004100)=""/130, 0x82}], 0x8, 0x0, 0x0, 0xbc08}, 0x98}, {{&(0x7f0000004240)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000007800)=[{&(0x7f00000042c0)=""/4096, 0x1000}, {&(0x7f00000052c0)=""/224, 0xe0}, {&(0x7f00000053c0)=""/4096, 0x1000}, {&(0x7f00000063c0)=""/130, 0x82}, {&(0x7f0000006480)=""/187, 0xbb}, {&(0x7f0000006540)=""/226, 0xe2}, {&(0x7f0000006640)=""/127, 0x7f}, {&(0x7f00000066c0)=""/210, 0xd2}, {&(0x7f00000067c0)=""/4096, 0x1000}, {&(0x7f00000077c0)}], 0xa, &(0x7f00000078c0)=""/251, 0xfb, 0x80000000}, 0xa0}, {{&(0x7f0000008d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000008ec0), 0x0, &(0x7f0000008f00)=""/106, 0x6a}}], 0x5, 0x102, &(0x7f000000cec0)={0x0, 0x989680}) 12:47:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) lseek(r1, 0x8, 0x1) [ 294.973800] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. [ 295.045013] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. 12:47:25 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:25 executing program 3: 12:47:25 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:25 executing program 2: 12:47:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000900)='/dev/dsp#\x00', 0x3f, 0x0) write$P9_RCREATE(r2, &(0x7f0000000940)={0x18, 0x73, 0x1, {{0x92}}}, 0x18) pipe2$9p(0xfffffffffffffffe, 0x0) umount2(&(0x7f00000007c0)='./control\x00', 0x0) rt_sigaction(0x0, &(0x7f00000002c0)={0x0, {}, 0x0, 0x0}, &(0x7f0000000300), 0x8, &(0x7f0000000340)) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000600), &(0x7f0000000640)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000800)={0x0, @in={{0x2, 0x0, @loopback}}, 0x0, 0xfffffffffffffffe}, 0x90) rt_sigaction(0x0, &(0x7f0000000500)={0x0, {0xa11}, 0xc8000006, 0x0}, &(0x7f0000000540), 0x8, &(0x7f0000000580)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) 12:47:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280), 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) memfd_create(&(0x7f0000000200)="907070703076626f786e6574305d47504c6e6f6465762a707070317d70726f63656d30656d3000", 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x4) 12:47:25 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400000002, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$int_in(r0, 0xc0000840045010, &(0x7f0000000000)) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) 12:47:26 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000540)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800), 0x0) ioctl$VT_RELDISP(r0, 0x5605) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:47:26 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:26 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x300}}) 12:47:26 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000540)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800), 0x0) ioctl$VT_RELDISP(r0, 0x5605) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:47:26 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)) 12:47:26 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:26 executing program 2: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000540)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800), 0x0) ioctl$VT_RELDISP(r0, 0x5605) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:47:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000900)='/dev/dsp#\x00', 0x3f, 0x0) write$P9_RCREATE(r2, &(0x7f0000000940)={0x18, 0x73, 0x1, {{0x92}}}, 0x18) pipe2$9p(0xfffffffffffffffe, 0x0) umount2(&(0x7f00000007c0)='./control\x00', 0x0) rt_sigaction(0x0, &(0x7f00000002c0)={0x0, {}, 0x0, 0x0}, &(0x7f0000000300), 0x8, &(0x7f0000000340)) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000600), &(0x7f0000000640)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000800)={0x0, @in={{0x2, 0x0, @loopback}}, 0x0, 0xfffffffffffffffe}, 0x90) rt_sigaction(0x0, &(0x7f0000000500)={0x0, {0xa11}, 0xc8000006, 0x0}, &(0x7f0000000540), 0x8, &(0x7f0000000580)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) [ 296.758251] ALSA: seq fatal error: cannot create timer (-22) 12:47:26 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000540)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800), 0x0) ioctl$VT_RELDISP(r0, 0x5605) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:47:27 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:27 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)) [ 297.320349] ALSA: seq fatal error: cannot create timer (-22) 12:47:27 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000540)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800), 0x0) ioctl$VT_RELDISP(r0, 0x5605) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:47:27 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000540)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800), 0x0) ioctl$VT_RELDISP(r0, 0x5605) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:47:27 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)) 12:47:27 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, "7175657565300000dfff00"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)) 12:47:28 executing program 0: [ 298.016522] ALSA: seq fatal error: cannot create timer (-22) 12:47:28 executing program 4: 12:47:28 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:28 executing program 3: 12:47:28 executing program 1: 12:47:28 executing program 0: 12:47:28 executing program 1: 12:47:28 executing program 2: 12:47:28 executing program 3: 12:47:29 executing program 4: 12:47:29 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:29 executing program 0: 12:47:29 executing program 2: 12:47:29 executing program 1: 12:47:29 executing program 0: 12:47:29 executing program 4: 12:47:29 executing program 3: 12:47:29 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:29 executing program 0: 12:47:29 executing program 2: 12:47:30 executing program 1: 12:47:30 executing program 3: 12:47:30 executing program 4: 12:47:30 executing program 0: 12:47:30 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:30 executing program 2: 12:47:30 executing program 4: 12:47:30 executing program 3: 12:47:30 executing program 1: 12:47:30 executing program 0: 12:47:30 executing program 2: 12:47:30 executing program 4: 12:47:30 executing program 1: 12:47:31 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:31 executing program 3: 12:47:31 executing program 0: 12:47:31 executing program 4: 12:47:31 executing program 2: 12:47:31 executing program 1: 12:47:31 executing program 3: 12:47:31 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:31 executing program 4: 12:47:31 executing program 0: 12:47:32 executing program 1: 12:47:32 executing program 2: 12:47:32 executing program 0: 12:47:32 executing program 3: 12:47:32 executing program 4: 12:47:32 executing program 1: 12:47:32 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:32 executing program 2: 12:47:32 executing program 0: 12:47:32 executing program 4: 12:47:32 executing program 1: 12:47:33 executing program 3: 12:47:33 executing program 2: 12:47:33 executing program 4: 12:47:33 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:33 executing program 1: 12:47:33 executing program 0: 12:47:33 executing program 3: 12:47:33 executing program 2: 12:47:33 executing program 1: 12:47:33 executing program 4: 12:47:33 executing program 0: 12:47:33 executing program 3: 12:47:33 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) 12:47:34 executing program 2: 12:47:34 executing program 1: 12:47:34 executing program 0: 12:47:34 executing program 4: 12:47:34 executing program 3: 12:47:34 executing program 2: 12:47:34 executing program 1: 12:47:34 executing program 5: 12:47:34 executing program 0: 12:47:34 executing program 4: 12:47:35 executing program 2: 12:47:35 executing program 3: 12:47:35 executing program 1: 12:47:35 executing program 5: 12:47:35 executing program 0: 12:47:35 executing program 4: 12:47:35 executing program 2: 12:47:35 executing program 3: 12:47:35 executing program 5: 12:47:35 executing program 4: 12:47:35 executing program 1: 12:47:35 executing program 3: 12:47:36 executing program 0: 12:47:36 executing program 2: 12:47:36 executing program 4: 12:47:36 executing program 5: 12:47:36 executing program 0: 12:47:36 executing program 1: 12:47:36 executing program 2: 12:47:36 executing program 3: 12:47:36 executing program 4: 12:47:36 executing program 1: 12:47:36 executing program 5: 12:47:36 executing program 2: 12:47:36 executing program 0: 12:47:37 executing program 4: 12:47:37 executing program 2: 12:47:37 executing program 3: 12:47:37 executing program 1: 12:47:37 executing program 5: 12:47:37 executing program 4: 12:47:37 executing program 0: 12:47:37 executing program 3: 12:47:37 executing program 5: 12:47:37 executing program 2: 12:47:37 executing program 1: 12:47:38 executing program 3: 12:47:38 executing program 4: 12:47:38 executing program 0: 12:47:38 executing program 5: 12:47:38 executing program 1: 12:47:38 executing program 2: 12:47:38 executing program 4: 12:47:38 executing program 0: 12:47:38 executing program 3: 12:47:38 executing program 1: 12:47:38 executing program 5: 12:47:39 executing program 4: 12:47:39 executing program 2: 12:47:39 executing program 0: 12:47:39 executing program 3: 12:47:39 executing program 1: 12:47:39 executing program 4: 12:47:39 executing program 2: 12:47:39 executing program 5: 12:47:39 executing program 4: 12:47:39 executing program 0: 12:47:39 executing program 1: 12:47:40 executing program 3: 12:47:40 executing program 2: 12:47:40 executing program 5: 12:47:40 executing program 0: 12:47:40 executing program 4: 12:47:40 executing program 1: 12:47:40 executing program 3: 12:47:40 executing program 5: 12:47:40 executing program 2: 12:47:40 executing program 4: 12:47:40 executing program 0: 12:47:40 executing program 1: 12:47:41 executing program 3: 12:47:41 executing program 5: 12:47:41 executing program 4: 12:47:41 executing program 2: 12:47:41 executing program 1: 12:47:41 executing program 0: 12:47:41 executing program 3: 12:47:41 executing program 1: 12:47:41 executing program 2: 12:47:41 executing program 5: 12:47:41 executing program 4: 12:47:41 executing program 0: 12:47:42 executing program 3: 12:47:42 executing program 1: 12:47:42 executing program 2: 12:47:42 executing program 5: 12:47:42 executing program 0: 12:47:42 executing program 1: 12:47:42 executing program 4: 12:47:42 executing program 3: 12:47:42 executing program 2: 12:47:42 executing program 5: 12:47:43 executing program 3: 12:47:43 executing program 1: 12:47:43 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r2, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000140)) 12:47:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/21, 0x15}], 0x1) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000000)) tkill(r3, 0x1000000000016) 12:47:43 executing program 2: 12:47:43 executing program 5: 12:47:43 executing program 2: 12:47:43 executing program 1: 12:47:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x80082) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000001c0)="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") ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r3 = dup(r2) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000001300)=""/237, &(0x7f0000000040)=0xed) getpriority(0x2, r1) read(r2, &(0x7f0000000300)=""/4096, 0x1000) ioctl$KDSKBLED(r3, 0x4b65, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000000)) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x440000, 0x1) ftruncate(r3, 0x20) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) ioctl$TIOCNOTTY(r2, 0x5422) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001400)=r4, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 12:47:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='vmnet0loem1system)\x00', 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x103, 0x0, 0x24b, "21f81d9cd1899dd690924dcce4e3d266", "e9e813e1b7c8fcd05d3233214c12bc69737121e5e40e8ffdefa471a3c0e93380ea238bcc598ce3c156531d206b007db7a9c6a4c318daaaa8b7f597e57070c7439ba0c33e754e18ae190fecc24c30c87c3b40fdfb30c4136225f567ba04649b1bb49a0fdc78af6dd19bf701dd15a2d5db1ca11f0e7bd71ef93e769fb3ed2e80437e20f2b361f7efa133d91108273c66c61ba734b82772089df3037c2198b0d08bfe5fe27951c629dab9dc6e2128c9106c4f8691e0720e7be2109b3248358ee4a5febecc0b30f146e5aecb20455d7b0887fdc289656d2eea2684102772501ab844f0488ed1d218e2a5efe78d370e87"}, 0x103, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x4, 0x20) r3 = fcntl$getown(r2, 0x9) memfd_create(&(0x7f0000000540)='wlan1!\x00', 0x2) perf_event_open(&(0x7f00000006c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x18, 0x200, 0x2, 0x7, 0x1, 0x0, 0x8, 0x0, 0x3f, 0x0, 0x0, 0x6, 0x101, 0x0, 0x0, 0x7fff, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x800, 0x3, 0x100000000, 0x57, 0x0, 0x7, 0x1, 0x9, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x1d}, 0x4000, 0x8, 0x1, 0x0, 0x5, 0x0, 0x7f}, r3, 0xd, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x8, 0x8f71, 0x0, 0x0, 0x0, 0x800, 0x0, 0xc281, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x80000000000, 0x0, 0x5, 0x3, 0x0, 0x4, 0x0, 0x2, 0x0, 0x91, 0x7fff, 0xffffffffffffffc0, 0x0, 0x0, 0x0, 0xf8b0, 0x0, 0x0, 0x3, @perf_config_ext={0xfffffffffffffffe, 0x1000}, 0x0, 0x0, 0xb3, 0x6, 0x2, 0x0, 0x2}, 0x0, 0x8, r2, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={0x0, {}, 0x88000000}, 0x0, 0x8, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) sendfile(r4, r5, &(0x7f0000000240)=0x4800, 0x20000102000007) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, &(0x7f00000005c0)) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) socket$inet(0x2, 0x4000000000000001, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x15) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000580)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) write(0xffffffffffffffff, &(0x7f0000000380), 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 12:47:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xffbb) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020660b, 0x400020) 12:47:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f00000001c0)='./file0\x00', 0x1) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) 12:47:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) 12:47:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x7000, 0x2000, &(0x7f0000001000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 315.649486] ================================================================== [ 315.651846] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 315.651846] CPU: 1 PID: 9063 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #66 [ 315.651846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.651846] Call Trace: [ 315.651846] dump_stack+0x306/0x460 [ 315.651846] ? vmx_set_constant_host_state+0x1778/0x1830 [ 315.651846] kmsan_report+0x1a2/0x2e0 [ 315.651846] __msan_warning+0x7c/0xe0 [ 315.651846] vmx_set_constant_host_state+0x1778/0x1830 [ 315.651846] vmx_create_vcpu+0x3e6f/0x7870 [ 315.651846] ? vmx_vm_init+0x340/0x340 [ 315.651846] kvm_arch_vcpu_create+0x25d/0x2f0 [ 315.651846] kvm_vm_ioctl+0x13fd/0x33d0 [ 315.651846] ? __msan_poison_alloca+0x17a/0x210 [ 315.651846] ? do_vfs_ioctl+0x18a/0x2810 [ 315.651846] ? __se_sys_ioctl+0x1da/0x270 [ 315.651846] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 315.651846] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 315.651846] do_vfs_ioctl+0xcf3/0x2810 [ 315.651846] ? security_file_ioctl+0x92/0x200 [ 315.651846] __se_sys_ioctl+0x1da/0x270 [ 315.651846] __x64_sys_ioctl+0x4a/0x70 [ 315.651846] do_syscall_64+0xbe/0x100 [ 315.651846] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.651846] RIP: 0033:0x457579 [ 315.651846] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.651846] RSP: 002b:00007ff1f7b93c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.651846] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 315.651846] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 315.651846] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 315.651846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1f7b946d4 [ 315.651846] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 315.651846] [ 315.651846] Local variable description: ----dt@vmx_set_constant_host_state [ 315.651846] Variable was created at: [ 315.651846] vmx_set_constant_host_state+0x2b0/0x1830 [ 315.651846] vmx_create_vcpu+0x3e6f/0x7870 [ 315.651846] ================================================================== [ 315.651846] Disabling lock debugging due to kernel taint [ 315.651846] Kernel panic - not syncing: panic_on_warn set ... [ 315.651846] [ 315.651846] CPU: 1 PID: 9063 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #66 [ 315.651846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.651846] Call Trace: [ 315.651846] dump_stack+0x306/0x460 [ 315.651846] panic+0x54c/0xafa [ 315.651846] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 315.651846] kmsan_report+0x2d3/0x2e0 [ 315.651846] __msan_warning+0x7c/0xe0 [ 315.651846] vmx_set_constant_host_state+0x1778/0x1830 [ 315.651846] vmx_create_vcpu+0x3e6f/0x7870 [ 315.651846] ? vmx_vm_init+0x340/0x340 [ 315.651846] kvm_arch_vcpu_create+0x25d/0x2f0 [ 315.651846] kvm_vm_ioctl+0x13fd/0x33d0 [ 315.651846] ? __msan_poison_alloca+0x17a/0x210 [ 315.651846] ? do_vfs_ioctl+0x18a/0x2810 [ 315.651846] ? __se_sys_ioctl+0x1da/0x270 [ 315.651846] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 315.651846] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 315.651846] do_vfs_ioctl+0xcf3/0x2810 [ 315.651846] ? security_file_ioctl+0x92/0x200 [ 315.651846] __se_sys_ioctl+0x1da/0x270 [ 315.651846] __x64_sys_ioctl+0x4a/0x70 [ 315.651846] do_syscall_64+0xbe/0x100 [ 315.651846] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.651846] RIP: 0033:0x457579 [ 315.651846] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.651846] RSP: 002b:00007ff1f7b93c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.651846] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 315.651846] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 315.651846] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 315.651846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1f7b946d4 [ 315.651846] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 315.651846] Kernel Offset: disabled [ 315.651846] Rebooting in 86400 seconds..