[ 36.059569][ T26] audit: type=1800 audit(1552228849.289:27): pid=7544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 36.088928][ T26] audit: type=1800 audit(1552228849.289:28): pid=7544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.815124][ T26] audit: type=1800 audit(1552228850.109:29): pid=7544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 36.835284][ T26] audit: type=1800 audit(1552228850.109:30): pid=7544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. 2019/03/10 14:41:00 fuzzer started 2019/03/10 14:41:03 dialing manager at 10.128.0.26:38525 2019/03/10 14:41:03 syscalls: 1 2019/03/10 14:41:03 code coverage: enabled 2019/03/10 14:41:03 comparison tracing: enabled 2019/03/10 14:41:03 extra coverage: extra coverage is not supported by the kernel 2019/03/10 14:41:03 setuid sandbox: enabled 2019/03/10 14:41:03 namespace sandbox: enabled 2019/03/10 14:41:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/10 14:41:03 fault injection: enabled 2019/03/10 14:41:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/10 14:41:03 net packet injection: enabled 2019/03/10 14:41:03 net device setup: enabled 14:42:45 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x404440) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) bind$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r1, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x58}}, 0x48010) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000240)={0x4, 0x1, @raw_data=[0x3adf, 0x101, 0x2, 0x8, 0x800, 0xffff, 0x800, 0xa95c, 0xfffffffffffffffd, 0x2, 0x3f, 0xa789, 0x8, 0x9, 0x123, 0x20]}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000002c0)=""/229) sendto$isdn(r0, &(0x7f00000003c0)={0x0, 0xd75d, "256387f4afa2d105015365894317f3993c69903d8e2b22c6c62777f3fd59d5b4214e8ac4a088ec1153570156c5fb3e58c4570530c0bc0f9289f1585fd5ac57f52c0c6aaeadb8ca88817117c460bda39c2d223fe5b47f1c948a916636644ccbd13a60e6e238e8c4c3cadfba3f4fc2"}, 0x76, 0x4000084, &(0x7f0000000440)={0x22, 0x8, 0x0, 0x0, 0x7}, 0x6) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000480)=0xaa34) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000500)=""/213, &(0x7f0000000600)=0xd5) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000640)={0xf, @output={0x1000, 0x1, {0x2, 0x5}, 0x1, 0x4}}) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000740)={0x2, 0x6, 0x4b, 0x8, 0x4, 0x1fd7, 0x81, 0x9, 0x81, 0x6a3, 0x3f, 0x7}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz1\x00', 0x1ff) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000007c0)=0x4) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000800)) r2 = request_key(&(0x7f0000000900)='dns_resolver\x00', &(0x7f0000000940)={'syz', 0x2}, &(0x7f0000000980)='nbd\x00', 0x0) add_key$user(&(0x7f0000000840)='user\x00', &(0x7f0000000880)={'syz', 0x0}, &(0x7f00000008c0)="a88dbea90cfd99f256b1fed5156555fe48c35da8ab205f9dd385346810b230891420fb918f1835684f", 0x29, r2) flock(r0, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'hwsim0\x00', 0x5100}) r3 = getpid() r4 = geteuid() r5 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a00)={r3, r4, r5}, 0xc) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000a40)={0x3, "9db5e2"}, 0x4) ioctl$TUNDETACHFILTER(r0, 0x400854d6, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000a80)=r3) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b00)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000bc0)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x1c, r6, 0x20, 0x70bd26, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) syzkaller login: [ 152.242513][ T7710] IPVS: ftp: loaded support on port[0] = 21 14:42:45 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) r1 = socket$key(0xf, 0x3, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000080)={0x3000, 0x109000}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x8000) r3 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f0000000200)=0x80, 0x4) readahead(r1, 0x5, 0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() getresuid(&(0x7f0000000740)=0x0, &(0x7f0000000780), &(0x7f00000007c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f00000008c0)={0x338, 0x0, 0x6, [{{0x4, 0x2, 0x7, 0x80000000, 0x81, 0x0, {0x2, 0x1, 0xfb4b, 0x0, 0x80, 0x401, 0x1, 0x101, 0x10000, 0x8, 0x8, r4, r5, 0x2, 0xffff}}, {0x4, 0x4, 0x1, 0x81, '}'}}, {{0x3, 0x2, 0x2, 0x100, 0x100, 0xfa01, {0x1, 0xa682, 0xfc, 0xffffffffffff8001, 0x7fffffff, 0x8, 0x8, 0x1ff, 0xa8c2, 0x8000, 0x1d, r6, r7, 0x1, 0x2}}, {0x4, 0x7, 0x0, 0x46c8}}, {{0x0, 0x3, 0x0, 0x9b40, 0xe7, 0x2, {0x4, 0x3, 0x80000000, 0x101, 0x2, 0x9, 0x1, 0xd3a, 0x4, 0xfff, 0x0, r8, r9, 0x9, 0x1f}}, {0x0, 0x0, 0x10, 0x0, '/dev/input/mice\x00'}}, {{0x4, 0x3, 0xb, 0x1, 0x7, 0x4, {0x4, 0x401, 0x2e4a, 0x4, 0x1f, 0x7f, 0x10000, 0x2, 0x7, 0x7fffffff, 0xfffffffffffffffb, r10, r11, 0x5, 0x4}}, {0x5, 0x40, 0x5, 0x1, 'syz1\x00'}}, {{0x2, 0x1, 0xa162, 0xffffffffffff3c51, 0x6, 0x1, {0x3, 0x5, 0x7f, 0xffffffffffffffe0, 0x7, 0x4, 0xfff, 0xfffffffffffffffe, 0x3, 0x1, 0x10001, r12, r13, 0x6, 0x1f}}, {0x2, 0x4, 0x10, 0x7fff, '/dev/input/mice\x00'}}]}, 0x338) ioctl$KDSETLED(r0, 0x4b32, 0x9) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000c00)) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000c40)={0x1, 0x1, 0x7000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x1c, r2, 0x105, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x240088c5) setsockopt$inet_tcp_buf(r0, 0x6, 0x3d, &(0x7f0000000d80)="d138e748409bfbb1aa4b1662b6d9e5ec957e85ff7bb8ebd12e0efc7de92bd854308762f0f65ca945bf1145c20a970eb2518df584a8c92119876040d7d2f4e627e7b860acaf0fb8286e8837edea9d4e6943ab3416fa076ff37fea4412388865c0e8ad84c1d727010360cb5ecc3fa8ff22c9154ee5ec02da972bd8413d90c432ed35d49d6557cd7476d4140752e28b", 0x8e) r14 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e80)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000001040)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x40401}, 0xc, &(0x7f0000001000)={&(0x7f0000000ec0)={0x11c, r14, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd8a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffc1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1d79}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x56f}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x52e}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x25}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20040000) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x8801000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, r14, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x54, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8d5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x145d}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000001280)={&(0x7f00000011c0), 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x30, r14, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) [ 152.342370][ T7710] chnl_net:caif_netlink_parms(): no params data found [ 152.409109][ T7710] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.430167][ T7710] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.450145][ T7710] device bridge_slave_0 entered promiscuous mode [ 152.458826][ T7710] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.481330][ T7710] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.500169][ T7710] device bridge_slave_1 entered promiscuous mode [ 152.532014][ T7713] IPVS: ftp: loaded support on port[0] = 21 [ 152.567778][ T7710] bond0: Enslaving bond_slave_0 as an active interface with an up link 14:42:45 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x1915a8c79cdfe8e0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x2, @ipv4={[], [], @empty}, 0x1}}, 0xffffffff00000001, 0x100}, &(0x7f0000000100)=0x88) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0x6c79, 0x1b, 0xfffffffffffffff9}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@mcast1, @loopback, @mcast2, 0xffffffffffffffe1, 0x6, 0xff, 0x400, 0x1, 0x20, r2}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000340)={0x94, 0x30, 0x8202, 0x4, 0x7fff, 0x4, 0x8000, 0x3f, r1}, &(0x7f0000000380)=0x20) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000003c0)={0x200000000000000, {{0xa, 0x4e24, 0x80, @loopback, 0x8}}}, 0x84) recvmsg$kcm(r0, &(0x7f0000001800)={&(0x7f0000000480)=@isdn, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/213, 0xd5}, {&(0x7f00000016c0)=""/3, 0x3}, {&(0x7f0000001700)=""/170, 0xaa}], 0x5}, 0x10020) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001840)=@assoc_id=r1, &(0x7f0000001880)=0x4) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f00000018c0)="8cb0e9bba9f00909b0d544d6c363c8a3b18f7298c5f4297c651f78eecfe9775d82d60186b6033b0bd67fea15f1ebffb6eb282c096a7b9b887a515a0d8dd858f71a9211", 0x43) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000001a80)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000019c0)={0x68, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x6, @link='broadcast-link\x00'}}}, ["", ""]}, 0x68}}, 0x4) write$uinput_user_dev(r0, &(0x7f0000001ac0)={'syz0\x00', {0x800, 0x80000001, 0x5, 0x4322}, 0x1, [0xffff, 0x4, 0x0, 0x52, 0x1, 0x7f, 0x8, 0x3, 0x4, 0x6, 0x9, 0x8568, 0x0, 0x200, 0xbb, 0x6, 0x4, 0x5, 0x37, 0x9, 0xffffffff, 0x4, 0xffff, 0x0, 0x0, 0x3f, 0x3bb7, 0x0, 0x5e6, 0xffffffff00000001, 0x6bb, 0x6, 0x4, 0x7fff, 0x6, 0x4, 0x0, 0x100000001, 0x1, 0x0, 0x3ff, 0x4, 0xffffffffffff7fff, 0xfffffffffffffff8, 0xff, 0x3, 0x8, 0x3ff, 0x1, 0x1, 0x8001, 0x1f, 0x0, 0x100000001, 0x80000001, 0x80, 0x4, 0x4, 0x40, 0x7, 0x0, 0x0, 0x5, 0x1], [0x6, 0x7ff, 0x100, 0x2, 0x1, 0x6, 0x7, 0x9, 0x59, 0x4, 0x3f, 0x9, 0x7, 0x20, 0x50b, 0x0, 0x6, 0xd2, 0x1f, 0x7ff, 0x3, 0x10000, 0x6, 0x400, 0x100, 0x4, 0xa456, 0x80000000, 0x9, 0x20, 0x1f, 0x0, 0x1bed, 0x9, 0x1, 0x9, 0x72, 0x6, 0x81, 0x7e, 0x200, 0x0, 0x2, 0x6, 0x1, 0x5, 0xffffffff, 0x7ff, 0x401, 0x1, 0x9, 0x8000, 0xa18, 0x7f, 0x9, 0x7, 0xffffffffffffffab, 0x5, 0xd2, 0xa0, 0x3f, 0x1ff, 0x2, 0x1ff], [0x1, 0x2, 0x6, 0x6, 0x100000001, 0x7f, 0x6a6f74b1, 0x60d, 0x0, 0x7f, 0xde02, 0x5, 0x5d3, 0x5, 0x1, 0x8a, 0x0, 0x6, 0x5, 0xa3, 0x4, 0x5, 0x80000001, 0x1, 0x7, 0x8, 0x5, 0x8, 0xcf1, 0x8, 0x0, 0x81, 0x1, 0x1, 0xff4f, 0x7fffffff, 0x1, 0x1, 0x3, 0x5, 0x39, 0x0, 0x80, 0x1, 0x100, 0x100, 0x8, 0x4, 0x2, 0x2, 0x7, 0x6, 0x5d, 0xfff, 0xc3, 0x0, 0x100000000, 0xffff, 0x3, 0x101, 0xce7, 0x2, 0x20, 0x1b39800], [0xf3a0, 0x400, 0xf7, 0x5, 0x9, 0x4, 0x0, 0x0, 0x3, 0x4, 0x7, 0x80000000, 0x40, 0x1000, 0x0, 0x8, 0xc23d, 0xffff, 0xfffffffffffffffa, 0x0, 0xffff, 0xffffffffffffffff, 0x400, 0x8, 0x5, 0x4, 0x1, 0x8000, 0x8000, 0x101, 0x7, 0x9, 0x8, 0x1, 0x7, 0x2, 0x6, 0x0, 0x3f, 0x81, 0xf26, 0x2, 0x2, 0x100000001, 0x7f, 0x6, 0x7, 0x8, 0x7, 0x1, 0x4, 0xfffffffffffffff9, 0xfff, 0x4, 0x7fffffff, 0x3, 0x5, 0x6, 0x7, 0x3, 0x2, 0x0, 0x1, 0x9]}, 0x45c) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000001f40)={0x3, 0x0, 0xffffffffffffff80}) r5 = syz_open_dev$usb(&(0x7f0000001f80)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001fc0)=0x2, 0x4) ioctl$BLKBSZGET(r0, 0x80041270, &(0x7f0000002000)) recvmmsg(r5, &(0x7f0000003480)=[{{&(0x7f0000002040)=@isdn, 0x80, &(0x7f00000022c0)=[{&(0x7f00000020c0)=""/111, 0x6f}, {&(0x7f0000002140)=""/199, 0xc7}, {&(0x7f0000002240)=""/4, 0x4}, {&(0x7f0000002280)=""/17, 0x11}], 0x4, &(0x7f0000002300)=""/77, 0x4d}, 0x3ff}, {{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000002380)=""/148, 0x94}, {&(0x7f0000002440)=""/81, 0x51}, {&(0x7f00000024c0)=""/206, 0xce}, {&(0x7f00000025c0)=""/225, 0xe1}, {&(0x7f00000026c0)=""/134, 0x86}, {&(0x7f0000002780)=""/80, 0x50}, {&(0x7f0000002800)=""/21, 0x15}, {&(0x7f0000002840)=""/5, 0x5}], 0x8, &(0x7f00000028c0)=""/225, 0xe1}, 0x3}, {{&(0x7f00000029c0)=@nfc_llcp, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002a40)=""/193, 0xc1}, {&(0x7f0000002b40)=""/208, 0xd0}, {&(0x7f0000002c40)=""/15, 0xf}, {&(0x7f0000002c80)}, {&(0x7f0000002cc0)=""/115, 0x73}, {&(0x7f0000002d40)=""/95, 0x5f}, {&(0x7f0000002dc0)=""/20, 0x14}], 0x7, &(0x7f0000002e40)=""/188, 0xbc}, 0x9}, {{&(0x7f0000002f00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000003340)=[{&(0x7f0000002f80)}, {&(0x7f0000002fc0)=""/85, 0x55}, {&(0x7f0000003040)=""/92, 0x5c}, {&(0x7f00000030c0)=""/53, 0x35}, {&(0x7f0000003100)=""/66, 0x42}, {&(0x7f0000003180)=""/215, 0xd7}, {&(0x7f0000003280)=""/188, 0xbc}], 0x7, &(0x7f0000003380)=""/239, 0xef}, 0x8}], 0x4, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) r7 = gettid() sched_rr_get_interval(r7, &(0x7f0000003540)) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000003580), &(0x7f00000035c0)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000003600)={0x10000}, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000003640)={0x0, 0x4f, 0x3, 0x9, 0xffffffffffff00d1, 0xfffffffffffffffb, 0x20, 0x3, r3}, &(0x7f0000003680)=0x20) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000036c0)={0xa, 0x0, 0x5, 0x100, 'syz0\x00', 0x1}) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000003700)={r1, 0x2}, 0x8) pipe2(&(0x7f0000003740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000003780)='/proc/self/net/pfkey\x00', 0x10000, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r8, 0x0, 0x487, &(0x7f00000037c0), &(0x7f0000003800)=0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000003880)={r5, 0x3, 0x1, 0x5, &(0x7f0000003840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000039c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000003980)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r5, &(0x7f0000003a00)={0xb, 0x10, 0xfa00, {&(0x7f00000038c0), r9, 0x100}}, 0x18) [ 152.592885][ T7710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 152.630047][ T7710] team0: Port device team_slave_0 added [ 152.650130][ T7710] team0: Port device team_slave_1 added [ 152.735883][ T7715] IPVS: ftp: loaded support on port[0] = 21 [ 152.744650][ T7710] device hsr_slave_0 entered promiscuous mode 14:42:46 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x9, 0x1, {0x3, 0x1, 0x7, 0x1, 0x7d4d}}) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x101000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000180)={r2, 0x1}) r3 = geteuid() lsetxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x8f2a, 0x6}, {0x400}], r3}, 0x18, 0x3) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000280)) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0xfffffffffffff001}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000300)={r4, 0x80000, r1}) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000340)=0x401) socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0186405, &(0x7f00000003c0)={0x3f, 0x7ff, r7, 0x0, r3, 0x0, 0x378000000000, 0x400}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000400)={0x7f, 0x3, 0x8, 0x2, 0x100000001, 0xb3fb, 0x3ff}) r8 = signalfd(r6, &(0x7f0000000440)={0x3}, 0x8) r9 = socket(0x1, 0x1, 0xff) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @loopback}, &(0x7f00000004c0)=0xc) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000500)={r5, 0x80000, r6}) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000540)={0x7b, 0x0, [0x80000001, 0x2, 0x8001, 0x1]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x94, 0x97, &(0x7f00000005c0)="80636a796a6af6e970d95e214b3f78bd5323e707aefa0f51fed699141992ff3cd34758ad96e8a60045617ccb4e7dee5191d0ca0aaf04813aea0f66de18056221617af98eafba2755863b3665ea396d312a6b6afd096ff5f212408331c23668a0cca4fa985c0ffb98d4ca7e65064be6b5f36e4c14da5b8decba51dd0a2cec7e45501e38c1f9c40d6d55e10312561e7edf630b6f70", &(0x7f0000000680)=""/151}, 0x28) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r8, &(0x7f0000000780)={0x80000000}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000007c0)={{0x400, 0x5, 0x5, 0x1}, 'syz1\x00', 0xb}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000840)={0xd000, 0x110000}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000880)={0x80000000, 0x5, 0xc2f9, 0xa0, 0xfffffffffffffff9, 0xffffffffffffff93, 0xa}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r9, 0x84, 0x6d, &(0x7f00000008c0)={0x0, 0x1000, "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"}, &(0x7f0000001900)=0x1008) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001940)={r10, 0x1}, 0x8) getresuid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000001a40)={0x0, {0x5, 0x2}}) [ 152.801423][ T7710] device hsr_slave_1 entered promiscuous mode [ 152.898912][ T7710] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.906167][ T7710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.913861][ T7710] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.920976][ T7710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.978126][ T7718] IPVS: ftp: loaded support on port[0] = 21 [ 153.042773][ T7713] chnl_net:caif_netlink_parms(): no params data found 14:42:46 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80, 0x800) sendto$inet6(r1, &(0x7f00000000c0)="203c374d286706b997fd187c524b2a3a7c522832931e8b90463db2c1890796211517a72e36fe2fb1825d5899f4ff9146cbef6a860bf5e71122c80648f9fbbf0ba201744e84f5a1471a6039248ca524f0ba20e361bb87f09430f14d7af02a15d64d055284a96173651e1e6c670f209e9ff9d64bbb2a10d180323dbba45e570e32360eafdc0b4d8b22776e04c1bb7bb5a6598ccae64b140286d4c6f8a94b32fc0b1e1fb97c2b5a", 0xa6, 0x4010, 0x0, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x4001, 0x0) ioctl$RTC_AIE_OFF(r3, 0x7002) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@loopback, 0x1, 0x2, 0x2, 0x5, 0x2, 0xe0000}, 0x20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000200)={0x8, 0x3, 'client0\x00', 0xffffffff80000000, "42de06ca5e659a41", "1fc0ce4b9ca6c49d02f5a31c67a5db52ae3a2f195be71077964439f07e641e76", 0x8, 0x8}) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000002c0)={0x101, 0x621c, 0xff, 0x7}, 0x8) prctl$PR_GET_CHILD_SUBREAPER(0x25) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000500)={'vcan0\x00', r4}) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000540)=0x20000, 0x4) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000580)=0x7) ioctl$KDMKTONE(r3, 0x4b30, 0x8) getsockname$packet(r1, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000740)={@nfc_llcp={0x27, 0x0, 0x0, 0x1, 0xdef, 0x0, "0efdd34d783bc3d9d34e454961430bf657c4f814c1e5b9dc00700bebafed276f915d7e11f7225ad812167137f7b363c28838daa749ef004760c04e63902e18", 0x29}, {&(0x7f0000000640)=""/172, 0xac}, &(0x7f0000000700), 0x2}, 0x9c) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000980)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x88001}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x90, r5, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2000000000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffff8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x90}}, 0x50) r6 = syz_open_dev$vcsn(&(0x7f00000009c0)='/dev/vcs#\x00', 0x8, 0x101040) ioctl$CAPI_NCCI_OPENCOUNT(r6, 0x80044326, &(0x7f0000000a00)=0x2) set_thread_area(&(0x7f0000000a40)={0x5, 0x101000, 0x1000, 0x6, 0x9, 0x0, 0x0, 0x9, 0x20, 0x9}) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f0000000a80)) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000b00)={0x10000, {{0xa, 0x4e22, 0x5, @empty, 0x418100000}}, 0x1, 0x8, [{{0xa, 0x4e23, 0x3ff, @mcast1, 0x7f}}, {{0xa, 0x4e22, 0x880, @mcast2, 0xe9}}, {{0xa, 0x4e22, 0xbaf, @loopback, 0x1}}, {{0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {{0xa, 0x4e21, 0x3ff, @remote, 0x4}}, {{0xa, 0x4e21, 0x8, @ipv4={[], [], @rand_addr=0xff}, 0x88}}, {{0xa, 0x4e21, 0x6, @mcast1, 0x2644}}, {{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1000}}]}, 0x48c) write$P9_RXATTRCREATE(r3, &(0x7f0000000fc0)={0x7, 0x21, 0x1}, 0x7) r7 = request_key(&(0x7f0000001000)='keyring\x00', &(0x7f0000001040)={'syz', 0x3}, &(0x7f0000001080)='/proc/capi/capi20\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, r7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000001100)={0x9}) eventfd(0x8) [ 153.146457][ T7710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.291948][ T7713] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.299034][ T7713] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.302337][ T7723] IPVS: ftp: loaded support on port[0] = 21 [ 153.319922][ T7713] device bridge_slave_0 entered promiscuous mode [ 153.355346][ T7718] chnl_net:caif_netlink_parms(): no params data found [ 153.374396][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.382659][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.392347][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 14:42:46 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) prctl$PR_GET_FP_MODE(0x2e) acct(0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x1, 'fo\x00', 0x19, 0x556, 0xc}, {@dev={0xac, 0x14, 0x14, 0x1f}, 0x4e21, 0xa274d0c362c88a8, 0x6, 0x7fff, 0x80000001}}, 0x44) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000100)={0xaf, ""/175}) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000001c0)={0x84, ""/132}) read(r0, &(0x7f0000000280)=""/153, 0x99) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000340)=0x8) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000380)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000003c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) ptrace$cont(0x7, r2, 0x5a, 0xd6a7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000500)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000580)={0xb, 0x10, 0xfa00, {&(0x7f0000000440), r3, 0x9c7c}}, 0x18) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000005c0)={0x3, "e12b157aab2ad939c8894939b85e684cfac8ff30527b0f5d4335a5bbf8db8053", 0x3, 0x1}) utime(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x1f, 0x81}) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000680)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000a80)=@assoc_value={0x0}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000b00)={r4, @in6={{0xa, 0x4e21, 0x9, @remote, 0x7fff}}, 0xfffffffffffffffe, 0x1, 0x80, 0x8000, 0x2}, &(0x7f0000000bc0)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000c00)={r5, 0x8f4e, 0x2b2, 0x1, 0x5, 0x1, 0x1000000000, 0x7fff, {r5, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x400, 0x8, 0x5, 0x1000, 0x7}}, &(0x7f0000000cc0)=0xb0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0xcf0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000d00)={0x2, 0x0, [{0xacf, 0x0, 0x100}, {0xbff, 0x0, 0x3}]}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000d40)={0x5, 0x80000000, 0x7d0e, 0x4000, r0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x40, 0x1, 0x8, 0x9, 0x80000000}, &(0x7f0000000dc0)=0x14) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000e00)={0x72, ""/114}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0185648, &(0x7f0000000ec0)={0x980000, 0x401, 0x9, [], &(0x7f0000000e80)={0x9909d7, 0x100000001, [], @value64=0x3fe000000000}}) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x7fff) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000f00)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000f40)={0x0, 0x0, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000f80)={r6, r7}) [ 153.414482][ T7713] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.423564][ T7713] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.431776][ T7713] device bridge_slave_1 entered promiscuous mode [ 153.454187][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.463139][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.486409][ T7710] 8021q: adding VLAN 0 to HW filter on device team0 [ 153.525286][ T7715] chnl_net:caif_netlink_parms(): no params data found [ 153.526893][ T7727] IPVS: ftp: loaded support on port[0] = 21 [ 153.570134][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.579204][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.587540][ T7724] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.594618][ T7724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.605898][ T7713] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 153.633555][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.643603][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.652109][ T7724] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.659125][ T7724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.671011][ T7713] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 153.706306][ T7718] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.713917][ T7718] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.722166][ T7718] device bridge_slave_0 entered promiscuous mode [ 153.734438][ T7718] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.741597][ T7718] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.749119][ T7718] device bridge_slave_1 entered promiscuous mode [ 153.763037][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 153.771832][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 153.812761][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 153.823222][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 153.831640][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 153.839944][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 153.848943][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 153.857541][ T7713] team0: Port device team_slave_0 added [ 153.869524][ T7713] team0: Port device team_slave_1 added [ 153.893499][ T7718] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 153.903731][ T7718] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 153.962952][ T7713] device hsr_slave_0 entered promiscuous mode [ 154.000736][ T7713] device hsr_slave_1 entered promiscuous mode [ 154.040525][ T7715] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.047586][ T7715] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.055327][ T7715] device bridge_slave_0 entered promiscuous mode [ 154.063190][ T7715] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.070289][ T7715] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.078087][ T7715] device bridge_slave_1 entered promiscuous mode [ 154.099787][ T7718] team0: Port device team_slave_0 added [ 154.118316][ T7710] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 154.130589][ T7710] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 154.157559][ T7718] team0: Port device team_slave_1 added [ 154.177791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.185992][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.194767][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.203071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.219307][ T7715] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 154.231628][ T7715] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 154.260791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 154.294141][ T7715] team0: Port device team_slave_0 added [ 154.355683][ T7715] team0: Port device team_slave_1 added [ 154.368611][ T7727] chnl_net:caif_netlink_parms(): no params data found [ 154.423896][ T7718] device hsr_slave_0 entered promiscuous mode [ 154.480648][ T7718] device hsr_slave_1 entered promiscuous mode [ 154.520472][ T7723] chnl_net:caif_netlink_parms(): no params data found [ 154.553218][ T7710] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 154.631737][ T7715] device hsr_slave_0 entered promiscuous mode [ 154.690367][ T7715] device hsr_slave_1 entered promiscuous mode [ 154.827559][ T7723] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.837829][ T7723] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.847611][ T7723] device bridge_slave_0 entered promiscuous mode [ 154.863716][ T7713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.887241][ T7723] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.895109][ T7723] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.902992][ T7723] device bridge_slave_1 entered promiscuous mode [ 154.920592][ T7727] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.927947][ T7727] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.936172][ T7727] device bridge_slave_0 entered promiscuous mode [ 154.945022][ T7727] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.954360][ T7727] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.962455][ T7727] device bridge_slave_1 entered promiscuous mode 14:42:48 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f00000003c0)={0x1, {&(0x7f00000002c0)=""/207, 0xcf, 0x0, 0x0, 0x402}}, 0x68) write$vnet(r0, &(0x7f0000a8d000)={0x1, {0x0, 0x0, 0x0, 0x0, 0x400000000002}}, 0x68) write$vnet(r0, &(0x7f000046df98)={0x1, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x68) [ 154.998053][ T7715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.011674][ T7718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.041156][ T7727] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.060853][ T7723] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.071715][ T7727] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 155.082674][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.091286][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.107263][ T7715] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.116028][ T7723] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 155.132051][ T7713] 8021q: adding VLAN 0 to HW filter on device team0 14:42:48 executing program 0: [ 155.139280][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.147644][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.155484][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.163685][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:42:48 executing program 0: [ 155.191437][ T7718] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.216203][ T7727] team0: Port device team_slave_0 added 14:42:48 executing program 0: 14:42:48 executing program 0: [ 155.256652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.266614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.288076][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.295226][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 14:42:48 executing program 0: [ 155.303857][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.312775][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.322917][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.329965][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.347396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.356126][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.364477][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.371579][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.379774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.398595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:42:48 executing program 0: [ 155.407538][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.416199][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.426164][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.434405][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.442838][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.472009][ T7727] team0: Port device team_slave_1 added [ 155.478942][ T7723] team0: Port device team_slave_0 added [ 155.489315][ T7723] team0: Port device team_slave_1 added [ 155.505505][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.519309][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.528698][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.535802][ T7719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.544006][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.552814][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.561212][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.568281][ T7719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.575952][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.586186][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.618829][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.628910][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.637739][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.646719][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.655536][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.664004][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.672353][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.680775][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.689161][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.697644][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.704722][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.712559][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.721262][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.729628][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.738126][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.747099][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.754999][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.812766][ T7723] device hsr_slave_0 entered promiscuous mode [ 155.850993][ T7723] device hsr_slave_1 entered promiscuous mode [ 155.893787][ T7713] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 155.905389][ T7713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.915860][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.925761][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.934643][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.942911][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.951811][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.960260][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.034541][ T7727] device hsr_slave_0 entered promiscuous mode [ 156.080616][ T7727] device hsr_slave_1 entered promiscuous mode [ 156.132097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.141215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.149245][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.157743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.166007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.174269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.185575][ T7715] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 156.196925][ T7715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.231548][ T7715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.239286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.248771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.258689][ T7718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.308434][ T7718] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.341690][ T7713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.437379][ T7723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.476821][ T7727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.521204][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.528977][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.545078][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.555129][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.572532][ T7727] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.583570][ T7723] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.596496][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.605605][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.614094][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.621168][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.635152][ T7749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.652509][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.661068][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.669259][ T7724] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.676350][ T7724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.684026][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.693103][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.702014][ T7724] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.709052][ T7724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.717032][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.727136][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.735034][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.743816][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.752207][ T7724] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.759255][ T7724] bridge0: port 2(bridge_slave_1) entered forwarding state 14:42:50 executing program 1: 14:42:50 executing program 0: 14:42:50 executing program 2: [ 156.778889][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.788398][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.797376][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.817525][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.840760][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.850999][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.896926][ T7749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.935840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.951357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.959546][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.968501][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.977036][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.985801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.994747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.003077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.017321][ T7727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.025318][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.034201][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.042806][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.051468][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.063820][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.072285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.081951][ T7723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.102625][ T7727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.123067][ T7723] 8021q: adding VLAN 0 to HW filter on device batadv0 14:42:50 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) r1 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x1000000, 0x0}) ppoll(&(0x7f0000000240)=[{}, {r0, 0x1}], 0x2, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x9b73}, 0x8) 14:42:50 executing program 3: 14:42:50 executing program 2: 14:42:50 executing program 0: 14:42:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setresuid(r1, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 14:42:50 executing program 5: memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x901) r1 = dup(r0) ioctl$VIDIOC_G_OUTPUT(0xffffffffffffffff, 0x8004562e, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000dc0), 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 14:42:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) listen(r0, 0x11000000000b) 14:42:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @initdev, 0x1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) 14:42:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x7b) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0xfffffffd}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="455eb091e5fb02a45fcbf9c9c86a32e1286eb3c7ad5269a445341954d4895f2b465c739755737d47f3b1e0736602899f17bf3243d00069f73db261e3fe5719ee70dd17d277dd3959c3031659eab8d6efefa19fbc9994b5385cda56bfab0e6db6dfbd09b7c40133413d237b6ca811208ff55bba77fb9765cefa5fed297c1e1dc06789962cc6a83c21ac"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)={0x4, 0x5, 0x3, 0x0, 0x0, [{r0, 0x0, 0x7}, {r2, 0x0, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0xfffffffffffff800}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/67) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x6180, 0x0) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x400000000000000) lseek(r4, 0x400, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000340)) getdents(r4, &(0x7f0000000200)=""/148, 0x94) [ 157.394429][ C1] hrtimer: interrupt took 45708 ns [ 157.406815][ T7793] binder: 7792:7793 transaction failed 29189/-22, size 0-0 line 2994 [ 157.516585][ T7809] binder: 7792:7809 transaction failed 29189/-22, size 0-0 line 2994 14:42:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) syz_emit_ethernet(0x6e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000910000008100000086dd340009000030000000000000000000000000ffffe00000023e020000000000000000000000000001830090780009040060b680fa000000d8c447ad04031f0000000000000000000000ffffffffffff0000000000000000004ed0eed2b6b0be4ce590a54139e33571c2507bb521c85df16ff81b58d080372535d24b7c955497a1c9d905e0fc92845f12799f2ec8751995fefe5e9d53cc8f8631b4d598099f09054bd3502ceaeb2fbcbbc5a2f9b204fedbe4d9c6e0054affcd5fef74ab2500d0f77bd28a1b7d08"], 0x0) [ 157.603823][ T12] binder: undelivered TRANSACTION_ERROR: 29189 [ 157.615944][ T12] binder: undelivered TRANSACTION_ERROR: 29189 14:42:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bind$tipc(r2, &(0x7f00000002c0)=@id, 0xfffffffffffffc68) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0xb00, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x8000) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000940)=ANY=[], 0x0) r4 = socket(0xa, 0x3, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) lstat(&(0x7f0000000900)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f00000005c0)=[0xee01]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgid() ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) getresgid(0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x7fffffff, 0x4000) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 157.935012][ T7830] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.945722][ T7830] bridge0: port 1(bridge_slave_0) entered disabled state 14:42:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) syz_emit_ethernet(0x6e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000910000008100000086dd340009000030000000000000000000000000ffffe00000023e020000000000000000000000000001830090780009040060b680fa000000d8c447ad04031f0000000000000000000000ffffffffffff0000000000000000004ed0eed2b6b0be4ce590a54139e33571c2507bb521c85df16ff81b58d080372535d24b7c955497a1c9d905e0fc92845f12799f2ec8751995fefe5e9d53cc8f8631b4d598099f09054bd3502ceaeb2fbcbbc5a2f9b204fedbe4d9c6e0054affcd5fef74ab2500d0f77bd28a1b7d08"], 0x0) 14:42:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x7b) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0xfffffffd}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="455eb091e5fb02a45fcbf9c9c86a32e1286eb3c7ad5269a445341954d4895f2b465c739755737d47f3b1e0736602899f17bf3243d00069f73db261e3fe5719ee70dd17d277dd3959c3031659eab8d6efefa19fbc9994b5385cda56bfab0e6db6dfbd09b7c40133413d237b6ca811208ff55bba77fb9765cefa5fed297c1e1dc06789962cc6a83c21ac"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)={0x4, 0x5, 0x3, 0x0, 0x0, [{r0, 0x0, 0x7}, {r2, 0x0, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0xfffffffffffff800}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/67) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x6180, 0x0) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x400000000000000) lseek(r4, 0x400, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000340)) getdents(r4, &(0x7f0000000200)=""/148, 0x94) 14:42:51 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x2) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2000003) write$FUSE_OPEN(r0, &(0x7f0000000780)={0x20, 0x0, 0x3, {0x0, 0x4}}, 0x20) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000d00)='security.capability\x00', &(0x7f0000000c40)=@v3={0x3000000, [{}, {0x90c, 0x3f5d}], r4}, 0x18, 0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f00000002c0)=r1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000ac0)=[&(0x7f0000000b00)='z@\x00', &(0x7f0000000a80)='\x00'], &(0x7f0000000ac0)) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000580), 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000a40)={0x0, 0x9}, &(0x7f0000000b40)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000b80)={r5, @in={{0x2, 0x4e24, @local}}}, 0x84) r6 = socket(0x2000000011, 0x3, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f00000000c0)={0x5, 0x1, 0x0, 0x2, 0x1}) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000440)=[0xf9, 0x8000000000000006]) setsockopt$sock_int(r6, 0x1, 0xc, &(0x7f00000005c0)=0x7, 0xffffffffffffffe4) sendto$inet6(r6, &(0x7f0000000080)="a56a8df0ff24be188529f003e0", 0xd, 0x0, 0x0, 0x0) getgroups(0x0, &(0x7f0000000840)) setxattr$system_posix_acl(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='system.posix_acl_default\x00', &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRES64=r5, @ANYPTR, @ANYRESHEX=r1, @ANYRESDEC=r3, @ANYRESDEC=r3, @ANYRES16=r5], @ANYRES32=r4, @ANYBLOB="02000000", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000000", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r4, @ANYBLOB="0200020033d1faef838875e095fc1f2b3f527b2a2b846c1f1b46736eba87cf62c8e887fd207ca05ab0868e3b3303352faccc1a1b6e1ffaac1da96eea423ec9d7c28ee382ce58176463f2f2efcecfbc1db61e14309ae6bb", @ANYRES32=r4, @ANYBLOB="0200e04d0200", @ANYRES32=r4, @ANYBLOB="040007000000000010000200000000002000000000000000"], 0xf, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x40000) socket$inet_tcp(0x2, 0x1, 0x0) 14:42:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) syz_emit_ethernet(0x6e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000910000008100000086dd340009000030000000000000000000000000ffffe00000023e020000000000000000000000000001830090780009040060b680fa000000d8c447ad04031f0000000000000000000000ffffffffffff0000000000000000004ed0eed2b6b0be4ce590a54139e33571c2507bb521c85df16ff81b58d080372535d24b7c955497a1c9d905e0fc92845f12799f2ec8751995fefe5e9d53cc8f8631b4d598099f09054bd3502ceaeb2fbcbbc5a2f9b204fedbe4d9c6e0054affcd5fef74ab2500d0f77bd28a1b7d08"], 0x0) 14:42:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000240)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x34203, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="a16ad74405b975eba25ca74df91f3f7aa638bf07b3bccee484", 0x19) 14:42:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x1c1402) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000100)={0x0, 0x0, {0xfff, 0x7, 0x1000, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0x80, 0x0, 0xc8}) 14:42:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) pkey_alloc(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) get_mempolicy(&(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x41a, 0x64000000}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r3, 0x2, 0x3, 0x0, 0x6}) 14:42:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) write(r0, &(0x7f0000000000)="51c5711ad153d6ce0e06f46e5693e277144694e64698dc2bae7142186243a5e589b199d0302de2d3f9b48277f6758ba1320d868d0b707389c65a04f82e3eb6658ae3d865ee0ea9ec5f710eb7f768340d0a6a077cb8afac6b12e0cd807e9b268f3a67ddac9f128071c6a8e3a25fab0888cf7bb7a88d429b1e58e609ac424176004f950639e4af", 0x86) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e23, 0x4, @rand_addr="cf1c48c66d54d95248aced2334548b03", 0x7}, r2}}, 0x38) execveat(r0, &(0x7f0000000340)='\x00', &(0x7f0000000200), 0x0, 0x1000) 14:42:52 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) keyctl$session_to_parent(0x12) getsockopt(r0, 0x114, 0x2710, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x7ffff000) 14:42:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) syz_emit_ethernet(0x6e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000910000008100000086dd340009000030000000000000000000000000ffffe00000023e020000000000000000000000000001830090780009040060b680fa000000d8c447ad04031f0000000000000000000000ffffffffffff0000000000000000004ed0eed2b6b0be4ce590a54139e33571c2507bb521c85df16ff81b58d080372535d24b7c955497a1c9d905e0fc92845f12799f2ec8751995fefe5e9d53cc8f8631b4d598099f09054bd3502ceaeb2fbcbbc5a2f9b204fedbe4d9c6e0054affcd5fef74ab2500d0f77bd28a1b7d08"], 0x0) 14:42:52 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)=0x0) write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0x0, 0x1, {{0xfffffffffffffffb, 0x9, 0x1, r1}}}, 0x28) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465d5a877b40e482a42a0c76176762f6c6f6f703000"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='ofs0\x00', 0x2, &(0x7f0000dedf2f)='v4') setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e20, 0x78, @remote, 0x400}, {0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffff00000001}, 0x4, [0x8, 0x2, 0xff, 0x7, 0xa18, 0x100000001, 0x9, 0x8]}, 0x5c) [ 158.885905][ T7833] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.893068][ T7833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.900486][ T7833] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.907555][ T7833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.978293][ T7833] device bridge0 entered promiscuous mode [ 159.215967][ T7871] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.223175][ T7871] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.231257][ T7871] device bridge0 left promiscuous mode 14:42:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bind$tipc(r2, &(0x7f00000002c0)=@id, 0xfffffffffffffc68) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0xb00, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x8000) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000940)=ANY=[], 0x0) r4 = socket(0xa, 0x3, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) lstat(&(0x7f0000000900)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f00000005c0)=[0xee01]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgid() ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) getresgid(0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x7fffffff, 0x4000) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 14:42:52 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'exec ', '\x00'}, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x1) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xf) flock(r2, 0x8) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000280)=0x20) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000240)) 14:42:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) 14:42:52 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x40, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe49}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r2 = inotify_init1(0x800) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) gettid() setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) process_vm_readv(r3, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000240)={0x9, {0x8, 0x1}}) ioctl$UI_SET_PHYS(r0, 0x4008556c, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, 0xffffffffffffffff, 0x0, 0xfffffea0, &(0x7f0000000300)='memory.swap.current\x00', 0xffffffffffffffff}, 0x30) pipe2(&(0x7f00000002c0), 0x40000000084000) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000100)={0x11, 0x0, 0x2}) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) pipe(&(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x8, 0x4, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) recvfrom$unix(r4, &(0x7f00000003c0)=""/136, 0x88, 0x100, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 14:42:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a0188ad5755a8647f000000000600fe04000000cf9a558bb0058f8c043c8058133534281b6bb494e6fcbfa2f5a15e0d736b6aeeb2a74621e0b78f6e667605e38f9e93e96c3f9aa61f8aede17d39b39156e80dfb5fed2dc2563f3d09909cdc688f2aa068e31e149ab9ebc15776824d76d399d1129b01b43b00de63065ac72e94c64b257439b746a85db37aea022aec195f1f639733440fa2bab1e31c0eb19fbde375f9bc9a01"], 0x49) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000001c0), 0x4) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f00000002c0)={0xb0, 0xffffffffffffffda, 0x7, [{{0x4, 0x0, 0x7cc31e80, 0x8, 0x5, 0xfffffffffffffffc, {0x6, 0x3ff}}, {0x0, 0x0, 0x8, 0x0, 'Vnodev-$'}}]}, 0xb0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000000)={0x4, 0x0, [{}, {}, {}, {}]}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 159.380992][ T7907] ptrace attach of "/root/syz-executor.5"[7727] was attempted by "/root/syz-executor.5"[7907] 14:42:52 executing program 5: socket(0x10, 0x2, 0xc) write(0xffffffffffffffff, &(0x7f00000000c0)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/200, 0xc8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) r0 = getpid() r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='net\x00') fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r3, &(0x7f0000000200)=@random={'trusted.', 'user.syz\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}}}, &(0x7f0000000400)=0xe8) socket$l2tp(0x18, 0x1, 0x1) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) geteuid() sched_setscheduler(r0, 0x0, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0xc0f85403) close(0xffffffffffffffff) [ 159.474385][ T7903] ptrace attach of "/root/syz-executor.5"[7727] was attempted by "/root/syz-executor.5"[7903] 14:42:52 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x800000000, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f00000003c0)="cd28e0eeb79762b913024f9693d6f91d49b06e544f4c858f7ba1d108712e8bb59160208548fe4ef55c344409f88375fcd3e7484bde3f0165fe91afdf60d37bcdc643590cfab887369a8b3c4fce4795a21d095762aa84c66a0e46ed0c34f0f6ff8bee67a95be0e6cc68028084180a1987a66e8930f02d23301f82596afef22d1938baa8736ba61d35ddf994af17baad60c4555e90920eefcb61e819f17bd9b16778988a6c6b213b8856ad2c8d69d170f4b428220aea686db70b7cbe0925fc5cb292771aa5230dcfe5", 0xc8, 0x4, 0x0) getgroups(0x3, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0]) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="29b91733d0fdc77ddefe4923413d4604705eae952a8f7b5bca6f33d36e4c63e4bf3744f35dbc6107127c2ccbd3a4e06b614f5141e5f44bca25125031f6e8b155b00e14b6248d7e8280bc0d53e34d8f5b73df65536941f5c3e661c4f882486b11429fb23f2aa2faa5b03eb75247571b5d1ab4939b1a292d10dfa54623d6d47744770ce6f37b79daf5051694d80c99ee3d", 0x90, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) getegid() syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x800000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bcsh0\x00', @ifru_names='veth1_to_bridge\x00'}) socket$inet(0xa, 0x801, 0x84) listen(0xffffffffffffffff, 0x8) geteuid() setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c7565720000000000000000000000000000000000000000000000000000eaffffffffffffff000000fcdc3a1600000000000000000000000000000000000000000000000000000000000000000047db484fe8e564be0cf4f6128562bb6303837daa20e63a4e5930c797e5603f68a3928100efd584f1072b1791b63424e3a9da56efa8d38218fbcdf5afa1d080d33fe4035f0128f2341c020aa1520000000000b040bb6309f910e700000000000000000000002068859f2e99e72bf68dc95850f73e3aacf86f6ad23b922dab53723504209185dab0f4156839ef3429959687bd4b28c0f281a0138e170f943366d0be00000000"], 0x1) 14:42:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) [ 159.574441][ T7909] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.582041][ T7909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.591432][ T7909] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.598971][ T7909] bridge0: port 1(bridge_slave_0) entered forwarding state 14:42:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) write(r0, &(0x7f0000000000)="51c5711ad153d6ce0e06f46e5693e277144694e64698dc2bae7142186243a5e589b199d0302de2d3f9b48277f6758ba1320d868d0b707389c65a04f82e3eb6658ae3d865ee0ea9ec5f710eb7f768340d0a6a077cb8afac6b12e0cd807e9b268f3a67ddac9f128071c6a8e3a25fab0888cf7bb7a88d429b1e58e609ac424176004f950639e4af", 0x86) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e23, 0x4, @rand_addr="cf1c48c66d54d95248aced2334548b03", 0x7}, r2}}, 0x38) execveat(r0, &(0x7f0000000340)='\x00', &(0x7f0000000200), 0x0, 0x1000) 14:42:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) write(r0, &(0x7f0000000000)="51c5711ad153d6ce0e06f46e5693e277144694e64698dc2bae7142186243a5e589b199d0302de2d3f9b48277f6758ba1320d868d0b707389c65a04f82e3eb6658ae3d865ee0ea9ec5f710eb7f768340d0a6a077cb8afac6b12e0cd807e9b268f3a67ddac9f128071c6a8e3a25fab0888cf7bb7a88d429b1e58e609ac424176004f950639e4af", 0x86) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e23, 0x4, @rand_addr="cf1c48c66d54d95248aced2334548b03", 0x7}, r2}}, 0x38) execveat(r0, &(0x7f0000000340)='\x00', &(0x7f0000000200), 0x0, 0x1000) [ 159.697010][ T7909] device bridge0 entered promiscuous mode 14:42:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x202000, 0x0) r4 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x5, 0x401) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4700) r5 = dup3(r1, r0, 0x80000) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/150, 0x96, 0x2, &(0x7f00000001c0)={0xa, 0x4e21, 0xb, @loopback, 0x8}, 0x1c) r6 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r7 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getpeername$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) getsockname$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0}, &(0x7f0000000a00)=0x14) getsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000000a40)={@remote, @multicast2, 0x0}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(r6, 0x29, 0x1f, &(0x7f0000002580)={@rand_addr, 0x0}, &(0x7f00000025c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000002900)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000048}, 0xc, &(0x7f00000028c0)={&(0x7f0000002600)={0x284, r8, 0x404, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x1a0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20000}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x1c, 0x7, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r13}, {0xc0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff01}}, {0x8}}}]}}]}, 0x284}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e24, 0xff, @loopback, 0x100000000}}}, 0x38) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf10001, 0xeffffdef) openat$userio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/userio\x00', 0x200, 0x0) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000580)={[{0x800, 0x9, 0x2, 0x7f, 0xffffffff, 0xfff, 0x2, 0x57, 0x3, 0x3, 0x21045b65, 0xffff, 0x9}, {0x100000001, 0x1, 0x74a, 0x1, 0x7fff, 0x6, 0x2, 0x5, 0x2, 0x9, 0x1000, 0x100, 0x2}, {0x20, 0x80000001, 0x2, 0x8, 0x7, 0x3, 0x9, 0x0, 0x400, 0x9, 0x8, 0x99b, 0x15c}], 0x1f}) close(r6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000700)={r15, 0x1, 0x6, @remote}, 0x10) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000380)={0x6, 0x3}) epoll_wait(r6, &(0x7f0000000080)=[{}, {}], 0x2, 0xfff) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x2) [ 159.796982][ T7934] IPVS: ftp: loaded support on port[0] = 21 14:42:53 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xe) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1000, 0x101200) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x14f) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000000c0)) 14:42:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) 14:42:53 executing program 4: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) timer_create(0x3, &(0x7f00000001c0)={0x0, 0x35, 0x1, @thr={&(0x7f0000000300)="55bcefd724aee229ff7e75b751e8c16b570ab29aaaec11580f13fda12b87ba1cc39f6b56294c677b4ba85bcadcf73fe6113b4051c22a8f6ca27f78b524cda66b079e52d6bbddbedbe91d669a7160191c6bd54faa91e4ee75820c9207dad9038e80f018c5dde94089349129bf79a09a9504128547", 0x0}}, &(0x7f0000001380)=0x0) clock_gettime(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0}) timer_settime(r0, 0x80000000001, &(0x7f00000013c0)={{r1, r2+30000000}}, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x8000fd, 0x1fe) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x200408d4, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000a02102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000380)={0x5, {{0x2, 0x4e20, @empty}}}, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r4, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) epoll_create1(0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) 14:42:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r2, 0x40044591) 14:42:53 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045510, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x4000000, 0x4}) 14:42:53 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x100000000, 0x100) write$nbd(r0, &(0x7f0000000180)={0x67446698, 0x1, 0x1, 0x4, 0x1, "4cfa34b36d99865db523aca42dbf37a52ca52f9d835b738c8717223c54ea1bba3809ba014c09116414258d97ec397146db6507699d6f74d67e4515cde7c46faa310c43f87c1dccd8bab33fda068d0ab97e14610c3f7f3fbdcdf2b12e641cb37ef52560d03797702b5b7470657faa78be2dee5116f2fa9ec081186562ad64968233561130d0a2658cb0fd5dbf319779d4f84b57d402aa32dd4d3425f56708d98e25d15fba65729a0d5a7d054a70d546170ca1c82d375920f3fd54b432a2b661382a376a321a2a79d58bb449de91607a3328a450f093"}, 0xe5) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7}, 0x1f40) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000100)={0x3, 0x5c, &(0x7f0000000080)="248f2977ba1e1837e303752c93b62b0705310e53286d543beed6b02a3c895c5456e42c3627bbee18e044a54de1b4cb1aaae77127fa50faf85820088178eefce44ae0ddd89e73125b931dc235b5b74299501ba792fad1997a4f273ffb"}) 14:42:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) [ 160.497447][ T7970] IPVS: ftp: loaded support on port[0] = 21 14:42:54 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x800000000, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f00000003c0)="cd28e0eeb79762b913024f9693d6f91d49b06e544f4c858f7ba1d108712e8bb59160208548fe4ef55c344409f88375fcd3e7484bde3f0165fe91afdf60d37bcdc643590cfab887369a8b3c4fce4795a21d095762aa84c66a0e46ed0c34f0f6ff8bee67a95be0e6cc68028084180a1987a66e8930f02d23301f82596afef22d1938baa8736ba61d35ddf994af17baad60c4555e90920eefcb61e819f17bd9b16778988a6c6b213b8856ad2c8d69d170f4b428220aea686db70b7cbe0925fc5cb292771aa5230dcfe5", 0xc8, 0x4, 0x0) getgroups(0x3, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0]) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="29b91733d0fdc77ddefe4923413d4604705eae952a8f7b5bca6f33d36e4c63e4bf3744f35dbc6107127c2ccbd3a4e06b614f5141e5f44bca25125031f6e8b155b00e14b6248d7e8280bc0d53e34d8f5b73df65536941f5c3e661c4f882486b11429fb23f2aa2faa5b03eb75247571b5d1ab4939b1a292d10dfa54623d6d47744770ce6f37b79daf5051694d80c99ee3d", 0x90, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) getegid() syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x800000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bcsh0\x00', @ifru_names='veth1_to_bridge\x00'}) socket$inet(0xa, 0x801, 0x84) listen(0xffffffffffffffff, 0x8) geteuid() setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c7565720000000000000000000000000000000000000000000000000000eaffffffffffffff000000fcdc3a1600000000000000000000000000000000000000000000000000000000000000000047db484fe8e564be0cf4f6128562bb6303837daa20e63a4e5930c797e5603f68a3928100efd584f1072b1791b63424e3a9da56efa8d38218fbcdf5afa1d080d33fe4035f0128f2341c020aa1520000000000b040bb6309f910e700000000000000000000002068859f2e99e72bf68dc95850f73e3aacf86f6ad23b922dab53723504209185dab0f4156839ef3429959687bd4b28c0f281a0138e170f943366d0be00000000"], 0x1) 14:42:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x20000008001, 0x0, 0x200000, 0x1f7}) 14:42:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) 14:42:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x20000, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x2) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 160.812168][ T7986] IPVS: ftp: loaded support on port[0] = 21 14:42:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x202000, 0x0) r4 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x5, 0x401) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4700) r5 = dup3(r1, r0, 0x80000) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/150, 0x96, 0x2, &(0x7f00000001c0)={0xa, 0x4e21, 0xb, @loopback, 0x8}, 0x1c) r6 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r7 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getpeername$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) getsockname$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0}, &(0x7f0000000a00)=0x14) getsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000000a40)={@remote, @multicast2, 0x0}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(r6, 0x29, 0x1f, &(0x7f0000002580)={@rand_addr, 0x0}, &(0x7f00000025c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000002900)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000048}, 0xc, &(0x7f00000028c0)={&(0x7f0000002600)={0x284, r8, 0x404, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x1a0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20000}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x1c, 0x7, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r13}, {0xc0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff01}}, {0x8}}}]}}]}, 0x284}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e24, 0xff, @loopback, 0x100000000}}}, 0x38) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf10001, 0xeffffdef) openat$userio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/userio\x00', 0x200, 0x0) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000580)={[{0x800, 0x9, 0x2, 0x7f, 0xffffffff, 0xfff, 0x2, 0x57, 0x3, 0x3, 0x21045b65, 0xffff, 0x9}, {0x100000001, 0x1, 0x74a, 0x1, 0x7fff, 0x6, 0x2, 0x5, 0x2, 0x9, 0x1000, 0x100, 0x2}, {0x20, 0x80000001, 0x2, 0x8, 0x7, 0x3, 0x9, 0x0, 0x400, 0x9, 0x8, 0x99b, 0x15c}], 0x1f}) close(r6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000700)={r15, 0x1, 0x6, @remote}, 0x10) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000380)={0x6, 0x3}) epoll_wait(r6, &(0x7f0000000080)=[{}, {}], 0x2, 0xfff) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x2) 14:42:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x21, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r1, &(0x7f00000002c0), 0x0}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) 14:42:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TIOCSBRK(r2, 0x40044591) close(r1) 14:42:54 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$unix(0x1, 0x5, 0x0) getpeername$unix(r1, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) 14:42:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) close(r1) 14:42:54 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x4, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000440)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000004c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r1}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x140fff, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000400)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x24880, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0), 0x36c) r2 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000000000000800000000000000001600000000000092000000000016000000000000000000324c7e2e2d4fe9c231920f19835955a56753447c75faf5534df71612de229d07432929b43069318aa009721495775a7863454faa77635ac4004ffdddf1f14ae9fe6d0cd58c63337482beadb51fa2cb8d0febb12caf5fa4d59cc7126f533648c2921c9ff21c2349caf5c474fc59f74f79fb930c92888c8d090954efae239b23393a869b9f12f1758a2b2f62ac"]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @loopback}, 0xc) timerfd_create(0x7, 0x80080000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x10000, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)={0x3, 0x0, 0x1ff}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x4, @loopback, 0x2}, 0x1c) connect$l2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) 14:42:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/236, &(0x7f0000000000)=0xec) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000004c40)=[{&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@init={0x18, 0x84, 0x5}], 0x18}], 0x1, 0x0) 14:42:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000400)={0x0, 0x0, [], @bt={0x1, 0x7, 0x4, 0x2, 0x100, 0x4, 0x2, 0x3812b63cfa24b857}}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21000400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x312, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004045}, 0x48800) r3 = memfd_create(&(0x7f0000000000)='#em1#+\x00\x85\xd8\xb1\x02\x00\x00\x00\x00\x00\x00\x00jCt2\xa2\xaa\x18\xbe\x88{\xe9\x8a\x8f%\x9e-\x99\xc9x\\>U3\xf6\xb6\x8b\xba\x84?\xc4', 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8801, 0x0, 0x0, [0x0, 0x3f00000000000000]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x80}, &(0x7f0000000180)=0x8) getsockname$inet(r0, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r4, 0x7fff, 0x9, 0x5f, 0x7, 0x81}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYBLOB="3f00ef03"], 0xfffffdd1) [ 161.291777][ T8014] Dead loop on virtual device ip6_vti0, fix it urgently! [ 161.363047][ T8014] Dead loop on virtual device ip6_vti0, fix it urgently! [ 161.400228][ T8014] Dead loop on virtual device ip6_vti0, fix it urgently! [ 161.414780][ T8014] Dead loop on virtual device ip6_vti0, fix it urgently! [ 161.438321][ T8022] Unknown ioctl -1064282524 [ 161.462235][ T8014] Dead loop on virtual device ip6_vti0, fix it urgently! [ 161.473890][ T8014] Dead loop on virtual device ip6_vti0, fix it urgently! [ 161.518835][ T8023] Unknown ioctl -1064282524 14:42:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@newtfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x400) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x6) 14:42:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) close(r1) 14:42:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000400)={0x0, 0x0, [], @bt={0x1, 0x7, 0x4, 0x2, 0x100, 0x4, 0x2, 0x3812b63cfa24b857}}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21000400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x312, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004045}, 0x48800) r3 = memfd_create(&(0x7f0000000000)='#em1#+\x00\x85\xd8\xb1\x02\x00\x00\x00\x00\x00\x00\x00jCt2\xa2\xaa\x18\xbe\x88{\xe9\x8a\x8f%\x9e-\x99\xc9x\\>U3\xf6\xb6\x8b\xba\x84?\xc4', 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8801, 0x0, 0x0, [0x0, 0x3f00000000000000]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x80}, &(0x7f0000000180)=0x8) getsockname$inet(r0, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r4, 0x7fff, 0x9, 0x5f, 0x7, 0x81}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYBLOB="3f00ef03"], 0xfffffdd1) 14:42:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000bba000)={0x0, 0x0, 0x0, 0x0, &(0x7f00009dffb8)=ANY=[@ANYBLOB="10e3ffff0000000001000000", @ANYRES32=r1], 0x10}, 0x0) sendmsg$unix(r2, &(0x7f0000e4ffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f000053c000)=[@rights={0x10, 0x1, 0x1, [r2]}], 0x10}, 0x0) close(r2) close(r0) io_setup(0xffffffffffffffe1, &(0x7f0000000040)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nullb0\x00', 0x2000, 0x0) r5 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x89e0000000, 0x100) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000080)="c154000537e5c2f4b5dff721c5c1ee3a8131d878b05f902713e03f15ae1e7ddeb53d78e0c6ac7536bba64324f59cdf236ba5f7f1a516c99b873a695f16d1ef55dc4f6f20a0256376dee7f2ec5f56076aaabf951bb732a54a880057153dbd49147e8f1c78fd0a2e950d99caa458a8814b92b0db1f28eb256a28dc3a7b3504bdff18fd7534e0a2bec9084d023952dd141fe72876fa79a14677a5d73c8fa543a0c1b035d83739e1367586b95ea4c1d46475c092a7", 0xb3, 0x80000000, 0x0, 0x3, r5}, &(0x7f00000001c0)) 14:42:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x202000, 0x0) r4 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x5, 0x401) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4700) r5 = dup3(r1, r0, 0x80000) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/150, 0x96, 0x2, &(0x7f00000001c0)={0xa, 0x4e21, 0xb, @loopback, 0x8}, 0x1c) r6 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r7 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getpeername$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) getsockname$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0}, &(0x7f0000000a00)=0x14) getsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000000a40)={@remote, @multicast2, 0x0}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(r6, 0x29, 0x1f, &(0x7f0000002580)={@rand_addr, 0x0}, &(0x7f00000025c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000002900)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000048}, 0xc, &(0x7f00000028c0)={&(0x7f0000002600)={0x284, r8, 0x404, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x1a0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20000}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x1c, 0x7, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r13}, {0xc0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff01}}, {0x8}}}]}}]}, 0x284}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e24, 0xff, @loopback, 0x100000000}}}, 0x38) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf10001, 0xeffffdef) openat$userio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/userio\x00', 0x200, 0x0) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000580)={[{0x800, 0x9, 0x2, 0x7f, 0xffffffff, 0xfff, 0x2, 0x57, 0x3, 0x3, 0x21045b65, 0xffff, 0x9}, {0x100000001, 0x1, 0x74a, 0x1, 0x7fff, 0x6, 0x2, 0x5, 0x2, 0x9, 0x1000, 0x100, 0x2}, {0x20, 0x80000001, 0x2, 0x8, 0x7, 0x3, 0x9, 0x0, 0x400, 0x9, 0x8, 0x99b, 0x15c}], 0x1f}) close(r6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000700)={r15, 0x1, 0x6, @remote}, 0x10) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000380)={0x6, 0x3}) epoll_wait(r6, &(0x7f0000000080)=[{}, {}], 0x2, 0xfff) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x2) 14:42:55 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x101, 0x84000) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x4b60, 0x101, 0x7, 0x9}, 0xffffffffffffffe2) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r3 = dup2(r2, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'caif0\x00', 0x0}) getpeername$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000500)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0xe8) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000680)=0x20000000000003) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000740)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000c80)=0xe8) recvmmsg(r3, &(0x7f000000a200)=[{{&(0x7f0000000cc0)=@generic, 0x80, &(0x7f0000001300)=[{&(0x7f0000000d40)=""/214, 0xd6}, {&(0x7f0000000e40)=""/53, 0x35}, {&(0x7f0000000e80)=""/6, 0x6}, {&(0x7f0000000ec0)=""/131, 0x83}, {&(0x7f0000000f80)=""/248, 0xf8}, {&(0x7f0000001080)=""/224, 0xe0}, {&(0x7f0000001180)=""/182, 0xb6}, {&(0x7f0000001240)=""/138, 0x8a}], 0x8, &(0x7f0000001340)=""/46, 0x2e}, 0x3}, {{&(0x7f0000001380)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000002500)=[{&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/14, 0xe}], 0x3, &(0x7f0000002540)=""/176, 0xb0}, 0x6}, {{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000002600)=""/188, 0xbc}, {&(0x7f00000026c0)=""/207, 0xcf}, {&(0x7f00000027c0)=""/75, 0x4b}, {&(0x7f0000002840)=""/18, 0x12}], 0x4, &(0x7f00000028c0)=""/173, 0xad}}, {{&(0x7f0000002980)=@caif=@dbg, 0x80, &(0x7f0000003a80)=[{&(0x7f0000002a00)=""/58, 0x3a}, {&(0x7f0000002a40)=""/34, 0x22}, {&(0x7f0000002a80)=""/4096, 0x1000}], 0x3, &(0x7f0000003ac0)=""/222, 0xde}, 0x7}, {{&(0x7f0000003bc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006100)=[{&(0x7f0000003c40)=""/32, 0x20}, {&(0x7f0000003c80)=""/244, 0xf4}, {&(0x7f0000003d80)=""/141, 0x8d}, {&(0x7f0000003e40)=""/22, 0x16}, {&(0x7f0000003e80)=""/35, 0x23}, {&(0x7f0000003ec0)=""/4096, 0x1000}, {&(0x7f0000004ec0)=""/4096, 0x1000}, {&(0x7f0000005ec0)=""/193, 0xc1}, {&(0x7f0000005fc0)=""/132, 0x84}, {&(0x7f0000006080)=""/89, 0x59}], 0xa, &(0x7f0000006180)=""/84, 0x54}}, {{0x0, 0x0, &(0x7f0000008900)=[{&(0x7f0000006200)=""/248, 0xf8}, {&(0x7f0000006300)=""/4096, 0x1000}, {&(0x7f0000007300)=""/77, 0x4d}, {&(0x7f0000007380)=""/247, 0xf7}, {&(0x7f0000007480)=""/198, 0xc6}, {&(0x7f0000007580)=""/116, 0x74}, {&(0x7f0000007600)=""/234, 0xea}, {&(0x7f0000007700)=""/253, 0xfd}, {&(0x7f0000007800)=""/237, 0xed}, {&(0x7f0000007900)=""/4096, 0x1000}], 0xa, &(0x7f0000008980)=""/71, 0x47}, 0x8}, {{&(0x7f0000008a00)=@ipx, 0x80, &(0x7f000000a080)=[{&(0x7f0000008a80)=""/68, 0x44}, {&(0x7f0000008b00)=""/255, 0xff}, {&(0x7f0000008c00)=""/4096, 0x1000}, {&(0x7f0000009c00)=""/90, 0x5a}, {&(0x7f0000009c80)=""/68, 0x44}, {&(0x7f0000009d00)=""/184, 0xb8}, {&(0x7f0000009dc0)=""/221, 0xdd}, {&(0x7f0000009ec0)=""/188, 0xbc}, {&(0x7f0000009f80)=""/246, 0xf6}], 0x9, &(0x7f000000a100)=""/240, 0xf0}, 0xc0}], 0x7, 0x20, &(0x7f000000a300)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f000000a900)={'ip6tnl0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f000000a940)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f000000aa40)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000aa80)={0x0, @rand_addr, @broadcast}, &(0x7f000000aac0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f000000ab80)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f000000c140)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f000000c240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f000000c280)={'vcan0\x00', 0x0}) getsockname$packet(r1, &(0x7f000000c2c0)={0x11, 0x0, 0x0}, &(0x7f000000c300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f000000c440)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f000000c540)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f000000c580)={'vxcan1\x00', 0x0}) getsockname$packet(r3, &(0x7f000000c5c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000c600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000c640)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f000000c680)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f000000c780)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000cfc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f000000cf80)={&(0x7f000000c7c0)={0x7b0, r4, 0x2, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x21c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3b2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7d09}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x90, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r10}, {0x128, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x1a0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}]}}, {{0x8, 0x1, r20}, {0xf4, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x4}}, {{0x8, 0x1, r23}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r24}, {0x7c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}]}}]}, 0x7b0}, 0x1, 0x0, 0x0, 0x1}, 0x8040) [ 162.101660][ T8039] Unknown ioctl -1064282524 14:42:55 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240281, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3, 0x2, r0}, 0xfffffc88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000080), 0x0, 0x1}, 0x20) 14:42:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$netlink(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)={0x18, 0x2a, 0x404, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x67, @u32=0x200}]}, 0x18}], 0x1, 0x0, 0x0, 0x14}, 0x24000800) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000080)=0x6, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x15, 0x0, &(0x7f00000000c0)) 14:42:55 executing program 3: r0 = socket$kcm(0xa, 0x805, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000001580)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)="d84714fc2dd36c7d8a0ed1eb59456fff5032fe43596f87b5f83047faf186ff4703b02e669090843b5f4a25f93baebb93c76edd4a40007da864892c0e4f99c77c135db40cc5f9c73d8ddcfc9dfa82a9ef835fef6aabcda6a6918c208c870f1f2bbd72d8ea3e36b5aa4127abe6be8dc907c6028441075fe2a82e", 0x79}], 0x1, &(0x7f0000000280)=[{0x100c, 0x1ff, 0x3, "412aac618871662645fa24a59f4cf1ebdb815580b25aaec22b41a2e1f2bcefb1978e2b8a066d533066ea3dee6978ee4d94b0e574add746c13fa632c3bdeac94e203ed3ef600db11ac5808ff6dfb30f5e9a8fa4d62020189f65a2c7ca1f041f60fcc510d4d285007c54a5d2901ec25dccb468fd18b4860cd953ce99919d314b3a6886d7782194f1739ae1ab2d359eb6127d338e49ee4e7b7536ab2eba50e3c506511b693f78163656869644219ebb0f924a34127be515f7513677d2306471fa4d18bd52ea88b81d15bbe2a5234b840842f795585f57568bc540da9fabb36d57c5326597665192eac5f8d5f44f5d3935ef4d3617222f593affbad314b7c6045623c384671df23db869a9194bee4c597b7c78b20b38341fa8d8868a012fd1d2863e505c6c7aad7abdb62216b7d2c17b85069445a1a0aa7f43e08f77c3353191d90b1a196775e7311c72fd0d827c56f1f6055c0bb75a79525cbf7fd599ee81d10cbd1c5b95346a0eb60e4df9b276513a67859484256b4e5c2a913b8b74ee78bfe13c8c3ac6b1c4f30c89646d4451aa155893eab6f741d28cab52c667b103137cad0aee4792fcf0a4180e976c1ab6252cc8f2cd92e84346dc737d1dbcec57cd9af66df9c57c4ab1370189a3801bfc750203742560d24f175b259b9fc9b4917d91f3089329949bb8c6de40bd7122999d396d9fc9e393fef6e117262442fbed8a0bf5c9b6bc13626230d6e364430023065fccd236213974e3ec05f5f78515e9e8ce026affd7a176e302c64f6912aa8db7e1f2b1fcc23456b8e43068f74ac19d914e448ccd97c9e3a80a62ec0f5341b02f8899955f63c583cf3a4c94573922493bfa4c3730096c3fcbdf78a2baa47a393a72bce73f72db488f18d1e150f0dba43240ecfe14bf0e2cd8a28c917c7979dd67660c75ec71ae73890ab54c309631013b736479d2bea6574f84a670d2565e91b723db489a931eb31c09447eb15f363abb458cc4b7de67bbc84759c822ef4d0b1a2b67aad5f7de30d1bd1154573c12b92ec03d6bfafcd9f3e308cfbf7c4bf7e92f33a3703b217383ea333c15eceb2b727c623fbeba32220c142c379dbd696499a99a9d3ffdc937f9775a820d5a3774659501ade590890bc12c0001c0d89ca9616df011f9005737f9cd6fc7072a08be5efb0ea62517932986e8a3a9283deb991ed6c73e92c3e5b9f93ce30a1cbf240a08b485ac5c1ac681b7c187a3f5ada3276ea2b776c5e93c41a15f74b8ff2cbbd44c0cc0b10d44abec89c24ccef3f807c39c20b8478144b560b9ac1c831c093faeab6f4072268e53e795a4a57db359b31387f33179c084891820aaab4426456c44df62c3e0f8a330c788c2d317927864d6887423ca2148dd49b517f3d9945397dec5cafb68f3e49ca9a224dd4775c29c8ebcce86532822f23eac7f8e5b96272e4f0a66dd3e92b7ce1e63280342d38107a2519f44540d51a37568e988aa555aa9c13134a00797057914e93078e3258d7534e9679875d24562d8221c529ca08a8c2d27f260f9a42395f3f0c0acb085784ca15b9869ae6f08ab921f6700c9ce6a39d9232acb90f54ed6471b2913c66e60c04811688158e37d533a64a4c77d9b7bc38d103da521769d8bb325a325c42211d6498b2dfe72adcf7901a46df2b4c53db9a454ea654514180d9808c30f0893704af0dd3408d6d18a53d7b6d0f03ad5ec7cfc4f824068aac9f1c9e400234dfecac0a57f511fab1f6a7f7856a093b46882530909c86122dee0560a2258a484550dcd74452cd6715465930f33acd929770bf39ec93033ff25e6c8498d3025ff2eec86c0062d4226d825d6813a6d6c82f433b8415e962c090cebb85f3eb04250cc44a8b4db5d9c4bdd8fe3a9e5a641cd3b62a02e62aaa50370cf1e55bb2beb1118ec81765d5a96d134c59618dd24fcc19d71a4bf1ebdd82769a22bb7a64c9f9e8738ced383bdc70b8dbe86cfbe76ab2021a5d525dd131566e86d89146765a58755372525fa004e9f22cdd58480946b2cef2acf35449ad4238a41f8ffea48171af2b1d7d87a1c29f808f9d206d5ecce2cc8b87b53a462e065f0970b0b983e73e6e77814eb9f06f90652e60a932859b82279b99e0cb240032cefca56083ba36f86ac6f45ef2ac110e266944010b73fdcc18d95bc78e4859efc00a84c29b3d92a8d832b1e7b92fba9f384aeffe8f439744b449a306522c90e3ac909ed5e430e85fefa580940b682614d52e9356e773289d7a363236d7ed7c58f30793885cdc2eeb68fd7f05dfde8fdcd25620dcad44a878139473b8cdd3b98298902e3fa40e067cf43a413f55f6212e5790d1793a12ef6f5f831f9000824c55e1006d36f003759d1ae97d9be8d7689e7ac4a45ac31b9014612e2654c185bf9f2c3b7c0c5442c44f0a53ccc2bcdae48432c35d31867ea12e6852c8bfb0346ac1e47df40ee30e8b23c8c88008dbb26bac3e243d270af5fbc0e62aa05242844286fa3de992f364e1eda3350022a39b0b2b1fc69cbfb762e5735c466149ada8f0724fa742d49d3c6486f31d88599acec5c7087547f03f9a413ff79ff286dfdd26454bd7677e3e9178672160440afb742752da4488243ffd7c2ed814e61120918a43f2da8f457c71bb6dee570d8689a55481af4c3896c32a7ec66c28376ba8d30e823b4eeac9bfbfa49b56ec00741ba1f61714f5f841e68ac635b03fce6728c8c6c1ed1316c5644e37fc339a0e5d45ea46fa3edf4b0b816410594334ec53c683279f9b7caa001d71dcb1a329459c3a7ae2d2eb859cf9dea41eee26149fbebe9a5d5b2e557ed7a650688991e54ff0fb9ca513addceafff64dc08d4e262aedea0d08da3306b583ad655e7124688d0002577e44a3c78631ac4a17a0d05038547c40dd43df3f468b6438e494ae79c3f8fb60488101ecd7b0235a2f21028ac2c2afc8d514c08926018426c8bfa788eebc774f7d9b73ac809a03ca139002cb511f2efba6e65f8fa51bde66f5d6f5dc63d8cd419fa0bd46eb8ab97a3dd4473a1e9bdee395249c241ec3c455d346f91e1fe08b537246dd1b3d7a0d46f468e4f9e252a0bc8592a7b3cbec82cedab5db40c3c9df4edd9be0806a0e388cdba23275d0e64ab24339f1d26797e7b04f8956c23abc32566009f5cc595754c5e9f05626d2037fe40d8b6319c54107e51113286753f5b4dfb8a4fbffdeb8ea85cfb81ca185507337f296240b03daf37bdadb76bbb203b542ab839ed761789f3d89bf9f4abd4e85c1f69a702fd3ea84709922049d22f52f50d510172c70dcfa05575cf76729742d56322cfef5fbbabebe8de7f992839e750b7513490da031077fe7beda57db2140c9c667c95d4f840ee5a7b6d512edf4aa3a26c6acec4f5c8ec3ea422d57161181bdc3ef57f02b78c72df130e1df83b96a94aa9d99d4245e5e0585cae6fb94efcdb198be1e34996c0b85ae25c928f4ddc6c81f6fe73fd80bd9fefdb2cab161f46b5992d0767fd5e67ff3eaba094ffc5a9baf43e2862a692ac26676aba19e2dd39f40d89b48d0960907095140dc569afdb575fb12816b5bbbdbde1ac142e6de7cce7ba1a5c812c532f7228203522b0ecb4aba2231656f16954f13d52e10531f7896dce2470048e78efa6bff3ce8e4e6e7c97894d2201d29b28e935ebf36945bd18f8cbbf3658604173d629ef93237581500c269d009d9f5e1f88f4bcc0e14707dab8dd5a82a0e815d9655e10c275757ed78bf0e7a3f5f8eebce269688171d776a35878df5f5f377a385635898bbe1500171ca3ec5dc2fb04ec2f64f03bba49223823fb97b16cfe5a87526b53d43c5a81c3f3b4d0c6a9edead361f25b0e12a3823d97dae7eff8c5ba672dfd5e38f3e9a2f460afa4027620a8f60bdc831f417dbcb4e20c3d006a4fe3d8095bd7fc9b17eb9371187a5b6764a93400b62363abeb93bba4b18a2d65d47de8aa683f60216b0bdcbac17823622110dbfc2d4b4793301598d8df41403dd070e459e9d2be05b1f41cef6e6d80359903c44e45c5553cae856dbc6f407ebe56e21a79fa677269a9a00b13831a7f3443efead0d2aabaac797db4d03688deb1db4f96dc35ab277c02835c04711648f9b87208b10158056e4a5edaf6f597e9a134a035c57489b153a02a6cb0a97952266d061b8ecb04fffe5657d67b3f73dcbc7da7f0d40de48a64f43073ef7430278b6f0ed185ce59f952ef6f8d5f5a31669aa12dd82edd5fad3df1ee25df0445b5b3ee8da6a6d11f34a95401bdd09ea524042dad1ad51eeba0187d1366fe8be5db43af35c430660947b5ea13c6adfdfa5da5fe24628fe213b6f3f9c7ff3c9aaffe2ae5921dd78594eb7741b1c076e8c9df20c189101aa8cddf4759d9cf8d1607a4e7d07c964cc3a4eca1e2ebe92a7922fa89952a735a62538abeeb8addcc6d9756347a139ffc260e96df517588c52ddf9cab87736112f008cc6a992d2856f34ddfcf1a2f41d32f16b158748cf02a28e11bd671a819c8a4cfe653ddc6f564441799bb3c5c896bb068f3f611b8223770e0d1b367e0dd447d5f28757fa764fc183f107c1a9c2fe491cec6d16bcfe9504af7d110a04974309691cf6fd0c6fa7e46fe275e885e1042965ed184b495479ebf63a4ed2d27e4dc2f5dde49aa6c1e61bdfc671f0919dc7fc559a6ea3ab53762963c52da9d36882f843a46a236ad077b7dc3a44b8fd28654ebf1255a75365fda2389a8c3e54dbf1a36be87d5193511701bea3fffc8b794ed9ec70f5c040dbcdccb1771f4caa886f224bf40038c765d02a5d48a5f33c92a2a7ec6fe7551a62e8e579bfc2ab262bd083b872f01eb2e30493d5042bebb636f8e5d389bfd8031050898338aaf3fff882aa6ee1b634d917c5e97a916b4da36f75f8df90b95d94a8264a4c3d6ef9e56d684d322d29c971ccca652ef1415a251b0afee370ba1f234779a85f6f0ebcbb179648fb84ac854c7d35a6792f08983a9fa75899bff19cdabbdef15309f5bffbe2385cb48b272ae2046f117128911f448b5b0e02f5b34a180e75dd49ab8e5c7f9eee9644fbe9a1aada5ac93bdc8c1e96fbc57897d8d3511c40d62ace45e4578680063b4982e17499b16631fd93d96518cf491396a67dcd6d706b0163fee6cace38db2d83edf8d706b0c47c1a75a20298ed9ecfb6b752a1753235afd0379888395580c3d35baf83d51e3c83d55c5e2bdcf39439d26fe70b2aca418131d710447cc7e185c3c7ff4d74fbf1b0f3d1b5a2cd64c4ccf928ffe4e36bbf5819232abde4e915ab218b8f61fb717f0fcfbf850023e52fd92690223121fe1fa85ef9b9c880464a1b7baa2a5ce1b8a6ae764c60b1b0c85a87b4011be5545f1fc3b826961329c729f4570efdce0c20f0206aeecdbb88929d4eebf3fc32ad157b6d1e9c5f1f2d18d331009a4dbdb067dff9ce516d381f6de7fb82a21296a03feefa364ce690a5da052e858ed5dfc0b425460d442e6a389aa97c2861ce2ac9039d6c7c4c66bbd366823ee17b41248f538c4ac7d5ff8868863530c7e281a42a7cea2841481f857b2be5d27420dacd81fcfa11ea14e095a0aea43fe638f302f9d2c0652e519aa307cea6f0125fb17a6c41dbf02521c3abcdbb91ce06b998401932b8a338131e503b2c8700c0f961c75ac3960ca0bf1667509780f20b18d0a9d4d456e8bf925aab2bf478e84c26aee5142691f4bc8ad5700f892c1d953b723d6d423239e7213060aa4372b9697a45e4fd1a489a65137439829fcff995006c8276227b4c5dd9e8a328f0dfcf7c05bd7dff777aaa6e6fe6743a3817b6b1caa970f52a002f68dd1e1"}, {0x100, 0x100, 0x4, "3e5e668293ee511305d32aeee772bb08bafa5884ff2f42a4c70e75e074f8cb02f28151e850d5bab473e649524a4c55932f520d5e646226f17572c7a2cb1943c8e85461604dd56a67140948dbb4781e70e5817c857ce6c7715b6d9fdc2c7ad9cc45014be0907c6b36240d23da6901d2efad7533fff1bfc91e498e915bbff809ef0edbed318da25b74dc9fc4db813aad7098063663449475fcce16b644dba9cb5c801683c450dce27aec03e4b583331d9af65a7d3cbcccf4237e10effd59478e7296f03360b9cd40dc57f106be2696f2950bc6261cd8fd16912983ae17514726803f5324afbd2da0c9848c9f65fae46ef7c1"}, {0x74, 0x119, 0x294285a0, "bc98ecee09a3d7ae49c148bce33a99e9ebf521ee85a4199bddc4527d18bc010770dbe7cbce9cfc352037229c5aa9533aad42c88c41a6f752f725275b102feff27438e41dcff52af2c4f48347c7d8f7c62eb6e0c80866f2a0c8127429b33ae150c7638a501bf3"}, {0xfffffe5e, 0x11d, 0xcf, "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"}, {0x64, 0x12b, 0x6, "0418e561afac88e89a4688e40f791a35d0871486dbbbc4493f662ac7a324052010acd71eee0d177b157c7f079ef84ebbbea1be78bf4bed85ee4194add71e69d368f9e54931316d88366d0b838a8757eab54f8f2214d1"}], 0x12ec}, 0x4048081) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:42:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) close(r1) 14:42:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000400)={0x0, 0x0, [], @bt={0x1, 0x7, 0x4, 0x2, 0x100, 0x4, 0x2, 0x3812b63cfa24b857}}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21000400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x312, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004045}, 0x48800) r3 = memfd_create(&(0x7f0000000000)='#em1#+\x00\x85\xd8\xb1\x02\x00\x00\x00\x00\x00\x00\x00jCt2\xa2\xaa\x18\xbe\x88{\xe9\x8a\x8f%\x9e-\x99\xc9x\\>U3\xf6\xb6\x8b\xba\x84?\xc4', 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8801, 0x0, 0x0, [0x0, 0x3f00000000000000]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x80}, &(0x7f0000000180)=0x8) getsockname$inet(r0, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r4, 0x7fff, 0x9, 0x5f, 0x7, 0x81}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYBLOB="3f00ef03"], 0xfffffdd1) 14:42:55 executing program 0: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x240400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000002c0)={@loopback, r1}, 0x14) mbind(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2, &(0x7f0000000000)=0x3, 0x3f, 0x0) 14:42:55 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0xa, @raw_data="0fc6e174cbfcb363da994ba245f405edea572e2fc4fdf1dd65b01bef9e17dc500e949634cebbf8c656e5127cb86f4459f385c39b4a3a0c5a15f64799bea334bd1aec52b477d3c3a6327fb48e5dd5b9ab0dbdaf50fdf4fc77336a9b231358174fb2ed1179be90c0f307c77520bf5345af9b8e7d35f0b0066d2d5014ca3a5d53b48383cabdf5b004b08573222aa61452d7d6c47eaba02268619299eef256bb66a28dd40c2778b81edb87612655829e53b390f4b9d1da1643ec7546955c843a471faa8cc8633c311d5e"}) [ 162.378043][ T8068] Unknown ioctl -1064282524 14:42:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(0xffffffffffffffff) 14:42:55 executing program 3: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x9, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x80, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0xea, 0x0, 0x7, 0x7, 0xfffffffffffffeff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x3, 0x0, 0x101, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1e}}}}, 0xfff1) ioctl$VIDIOC_S_FBUF(r1, 0x402c560b, &(0x7f0000000000)={0x4, 0x53, &(0x7f0000000440)="1df9923bbc0190ed6777d47ca42e3d091e15c8ba9ffa822cf46005453e1ce18788b9e937c0b8ce999d8fb0c7262b07ca7c400b45c49103782f8da1ffeed80b119e91bdc0812db046f220d57541ce37857ae215b044c6834fec77ee2ff7c9fd3f174581d66e508ab5ce329e640133eb25132fbb67d5d6ee5bc6f4db40616dc33e91b25baeeef1537f3a926caf4020a9092844bff8a3abb1ee3c045bad0f6afcfde63e63b8e6f674091cde8ef33151322f0b860449c9db3f1daae850bb17dd3a31e30ff51fead07969c3c4e9554bb2f8799c1439d574966efb7e798b8e528b085c8e053750fc47e759718cac63cff2ddcadd8122b503215449da518be1d940edf4b2502a0717462867fe79306fce3ae16aad76f01a0b989c8048fe541d9e434f60beb1b598ad45c27f4348a310e40d8872b996f85c57cbf172f943eb953becd9e6e852a8eba5d4a414dbff76d7b04fb948d7e52a41408096ced3e0516dc3188c9380f4a5b9426afbbebe3f20ff495935de2a3974102159d6c91f6fd98b19a7006d04b92ac9deaea0811957ebf25a76721378cac7e11afbae65933721a02a3d33cf85ec9b7bd81be9de1b223f4170b59857899cbe2e9e8329cae32f62a922555df1108b900c9b286c13c1c8ac63d602343e4ac870a5cb73b814b04ba9f9cf65e7c800b09a149138e0ad62a8412eb358ab18096624255e13c3fcd5f0934a5c1dae9c6c9bfae200f1a7438b6efe63ff431355ee989a5c3985ce5ed509fdbbf6252596b93c9905ec6b0692319b9e21759bcfa111159fc94640af65fe934b56b48a1358477f19349e8c8b6ef202b4a3fbc6354c16e30a8ab709c96ca970ecf902bd2dd6426920e743d06dfd45a75df59b0022aaa949af45b4c496ef1fc3845e1c2ae0be97137035c8eff37359d03600b621717dad10feef5ae227d00fba57daca668711a5368b480eca42a18568ad636f62c2adb19b9de0415c6bd5560a51370a6df4b09d0b722d7e2938f7fc829364dd0e7b7121ccf366e2898333089d080ed09a41c5f0a5765e961ff3f3a61cfbe919786f100dbfa83ec042271cb1bd565199af5592576d1e0a1cd31ddfdb64e4c49c8f4dba2370e5c3bd3f0e522bdc2a16403974f664e3b7852cb2ee9223bf5f486def9fc1abf2120d9b5b66850bbc2af1ac7df85ea749669b112d9920f1aaf71b499155f0da6a351d55f3d665c07de48de3e9bbe89d41ea22d1df70c7e5dae0bb33e427db4c32842c7fdf51b6fc99c5fc38eb60e05b5ee15c8a7644da38c2d3696ca59c9a559070c700b961ecb6456672ec900859cf56fba4c4fff702d08691082983af5ef6d077cbc9a4991581d7d6707bfbf643a25754df4a3d1a2914760a9a90404b1fea111b938654f25867d60dad0bdd7c7f2a4c95d215820b9c8bf490628443adba90b786915a4484862bc8bd26264d47f4fca93b815aa921433ef0ffc6063206df2e169bbd8e469d010e3d0d0719fa805d46b47d80eb2a53d01ad83f00187577bfbfd58983f8e5c79fdeccb82eae55b89f714507a3467b08c82d4deadd49589601c5cb6fc5afd5296f1084f55339f72ec18cd54c360efd3661d4bfe0e3d1f73fa980379d24a7a03e46d1e295d6e1597ae018e6377197867182529bbb3b97088c72f6fa28279c39db426e841987f37ffee41a6ec40e548c2753ef6be8623921dc1e3cd9e0b3ad8d6ca073bd7f94c5575af1c817b7ba9c36a2dfbddfcd72709da69f8c519c08a4e12d39ec99d526c470ffe3335a47e3837ac84b289ed6c4ce7c5a2a8f293bf0b43c531a57e3ce5bc90c5453f01b00955b9ce50aefd82b2c88e9fbf9909a897dddc57e774d90280933fbe2a4eaa14319e6c73e9a83a2a1ea15956ba12a391a5f096f5e5b6e22e6109a593a686536341fa2ebd96ebcdab5d2a61e65c65f1a84c7e66d97ba86849e848d9feaed6ee4d68c99cdb504d4f54992e286b15132719809761d4f623efed5211d46eea48d38bccad696336105312b03c5801b25d32af3d3ccfe0b7d3f7c8c68b9906734bc5d9639553659cdec659f63194870d84e4f8c1a012bf1e8d1d3f9cc4bf40a795f27fcb2931e55517b5378b378ed32a7234c443799eded9e7982db065dd17e01fd6eae267fe8bb65fcc00241cc610b5473a322489ce4667f908e10c254d6d62a808bceffefab3f23a0e9ecf8de786b4b2468e7c93af5b267e2c549a6287e2d9d50e479d3bbf7ef92ee582ab84a7f1accb50535ca6ed81fa5719150acc8921496edbf0c2fe2150ce94ffe856b534813cb20ecc78e64277204367900dc1fee12626f9a9cde7007b1d6ab854ba5b6947e18030aa164d236cec342e1fc638c63e4f805aff18434c9ed6a3a7dffed969405ae7a16bcb5b09d35122dbe5fda587e1f8c6bdace394fd5c639ca2a5ad5c04f912cff2b23450e7ea66a52e2b9d95b4709fcad9b869a18388dc6a7b1b6cac48b9d8ab0fd4ba352d1652634112a590cf3cd4a8d5bbddcbe0b703f3934bd730fea4475fc25964b5f5a2a29ea1548f5c1ca4525c338b277d4c43855ea79f049e430f51304613f7c8d5b4cb2e0207db14f39693363dc228300ddd46f47af37ba44ce1db9efeced1db5e830db2bc47fef2949624e27fde8b8443724474347561f2923bda4c029afc16c362f64cd1e594e77a89c04e62081232b4a3261dc61a688c61ae8a3fcf81879a3ef7fff66d38f7fa0993868ba4724872b11d15266e3cc12f8f8050e311f0efbf492255c8c218e9a47d1fd6be5ae365fa0890cf1ece39106f8be447fa7efa1b4a7e78f4cbe69aee774ab3d0011d6b7bc12c4837a5f9b749c5f0d983b6e46a5fcb8689acbc47cd3d310b3302ac36dc7223986336b586014f0da2719a074802f89daca88afbbc69c7603761e00d3935feb81b928178f8a79623e31a394754f53b4a2c6ac0929e3463c3defaa553b0014d39be2adc80659d3f69f81e08d7fa713bc71ee7b4df122b5948bc3d01b289d136c05704e2c9c2e064b51349dd6f14a46859cabb6b4d6540aabf6004d3d308e299f6dac59d04db91638c6e2f4c16cceeabc18ddb214262508ce07f3b8388776ccd37192816e57918bd9febb65ee6eef1292604bb642e4b79095a40d8ff3ce3e4ff110017c745a128ce2e35b9c1d57ac3d9a86138d426bedbfb1f50b21b31943cd12bc58bd3bd1090f647bf2c4410ab23a8af3e188c55c5cfe01ff44059eea60cbd9c6a5d2d449c46a6a681561aa417f2277c06f986029b73b6d6efab4847b43ba7e5ea00353d9169b5dc695a31d2cf6d96e6a28247af94863d4aa482e502ffbea6bec308c53bbdfad0ac8db7a5a5287a467a50009e2d930b2e0e96dcc6de93c83d2c7e22db581af96c47ed038cd41bee973c7309a3842e423c716965a600ea3c21a49d501a02ec69eefdceb14519f700ab6fbba5f3af1ca6b66713016579d8e52eb99ec4df9c35ee04d9c25aca725749481bba16ead32d681b523600a8deb57a757c98493fa8a3ad6bab861b24f1c7dffbc2740654992b360048b7f5f833dd9d069e5b87469a4117585ccddae1eac31bd71013b58240e6188affdb45b7e882e3a669bc533eea9296ef6fa045337bdf95cbf6beb025ff5d75eb13b6581465877dec300cc618443bbbe332cb2795c741df86165eeedc1bd87fd10080395b4f4e3b3ec32eea284156ee4c2e142839c97d4f7a2d386fb51d08eb3bdbdf8063dc819aadeedd86b6143ed208d08030d41ee18c65d9c5091e97b1e26993b9dd00c60a1aa6a2def4729c2bc4762f8b92acfb0615764e1f6de2a847403dcde86404f52b343a598a9826593c5c10ae852bd95ffb14bc4d915393e1c78f36b116d40d44538e19af20ace0bdc3822d2e9c036fbd831dc44028039694e94e5ccba059fe2de461d6c688111b203a9ec27e77f40cb512896e94798cc9a8faddf7d798416369478052e0483a9afb69a3a866b63a2ca6d9bc19ab2510717a539be130489f821750deb6dc0e75f5c7182b9420cd782d9f3961265d68e0fcc72036cb33f4d6693a0422fb4ba2229bfcaccec7902cc44a0672e6ea7cdbab3ffe0146fe407e7e16efd62aebd48a55b44153af81cd31fa247bdeb916a4d853895187e5b8f87bd888984a89625fea0a46bff177cec2edfbbfc0339101493516941712590f1aa260a5aca9acd44956d4a990a327fcbb758e192d7f61ae8a6a18b5b9646a5aa77b4c0a7d2838313a607cabbeeb23d723c4a3a82932eaba8ca8c4211f0ffff38694321459f9a4c261903216830ec84c2b7ce573f52e8fc1826c7bb037d6e0f5e57fdd7de5aa3142fd5949190f96ffb7ca2252c3bab28fac0d07231dc86374f5de675f08e2114f28b1f454c91527cf37675b6d8159f75c913ad2631f210d28644c26c5bc0b2c4fff71e4bf8b3dee8893890ed6b12c45db331ef12473820537ce92d5e4acdcea195096c01a95d284f0b6ae95a1e9e68592219a94a04511c74ec34825466fbbe9cae9237ae0a7c50d7b187410019fca67c0afb14ec6162f3fd2784efc493afe0b626420336d67fb056e872342dc3a12fc23ca0cb90bf1a28beef3dc3bd96a9ac81d407c01102ce49b7d3aead85f5aebf98e11f6437f046d9144c780f0c569a233e99d99712b505cd3762f8f19413d2a6f7ff2d1df82ea5dc33c86248f81ea9f2968e95c1a92d4fc83e79f7b01592d78fa567ed440fd3ae09ecdb0ce9e3fa71748cc3ecca9e7d0d15a80a391e1d71c9c0fe59f40b58ae9a263848ad7c1498b65bbce23294bfd8349bfcf96dc40337ace948ad468feae68760bd6502bca724008bca8cb7b499c2fdd35bd9e84dd028b868903b475b74184f96e6620ff3e17c93ac54c6e30008a676d3d5b6f80b042e5a91d0018520467b7c80bc8af1d5a893b93ed631c51e3eab2c2edf762a513464fbdd4e5df3fdb735b7941f3af05a159cc004dd80844626d5d45421dac35d650553953eec218df9a61b4da5465a6b350f7a5756bedfc008a3ef5d55007a58ca0959d433532c2b0153272b5e280c1ffceedd6c743b949b679138d75cfe80ba2a8bf59f0d7e35364d05c3966ee9f1ab70bc645a13b90df40fcbc161465e175623658ea020348d780db06d0d15e1737d406211630c2572f82cc0de87aafa007cd453eb9f58d509f950c256a3aa5b516a9be19250fd7883da217bdff75c3a0728e9e2cf29868a5c2ae676493522b8c05d3e5e4acd5a1b5a8ca7066acb8a5dd7c5ccf61c097667740931fbb748591a796466c5e01e91c820d018fa59640af51bdf41bb5817f20721d76676cb80aac9a4889c01339c7358caf4a7145d069f8a234b78b4051a26f629ce4b77f14940555c18c360c3ef43d123d09876f6f2ff2c885b8532b5f76151d2cb216a96ed85daf03eec79ea0ffb7656620181037d14d15c3ae29d1ea0a91407245a81baf6c79ac23e51d4377774153f46391b4f7a691c9777a11f7cfd3b331d45e556a4d5adbf6d24acbe88cc39f9cb9f2e137da56f0dd30890120908623a426a26d29d12500d43f89b7d46812eed96b227a08b941ca10b66fc737038b8ebbc92adcf84cbd36823ea235a575bec7255fba8f38bf13f5cd7ddcf071f48264f26b33b422ca31437d9ec5d8352d9eba8fb34e26696b441c6df7c9c13af29cbd7580bb7a05b17ca0db2c203414622a3aabbba9a63492659931675b1546ac3d8bab33e0df6aa4468ae7d05c70c6059e10af73275c14bc600396161461df294f1c9f16a4c14f7b37df00230ee3f718b28277010774e997664af2c24a3e757386dee740d98b81523b8042b72d6a3a2", {0x2, 0xffffffff00000000, 0x7d7f7f5f, 0x1, 0x0, 0x1000, 0xf, 0x4a}}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r2, 0x0) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000400), 0x10) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:42:55 executing program 0: clock_nanosleep(0xfffffbfffffffff2, 0xfffffffffffffff9, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 14:42:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x202000, 0x0) r4 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x5, 0x401) syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4700) r5 = dup3(r1, r0, 0x80000) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/150, 0x96, 0x2, &(0x7f00000001c0)={0xa, 0x4e21, 0xb, @loopback, 0x8}, 0x1c) r6 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r7 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getpeername$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) getsockname$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0}, &(0x7f0000000a00)=0x14) getsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000000a40)={@remote, @multicast2, 0x0}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(r6, 0x29, 0x1f, &(0x7f0000002580)={@rand_addr, 0x0}, &(0x7f00000025c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000002900)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000048}, 0xc, &(0x7f00000028c0)={&(0x7f0000002600)={0x284, r8, 0x404, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x1a0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20000}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x1c, 0x7, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r13}, {0xc0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff01}}, {0x8}}}]}}]}, 0x284}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e24, 0xff, @loopback, 0x100000000}}}, 0x38) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf10001, 0xeffffdef) openat$userio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/userio\x00', 0x200, 0x0) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000580)={[{0x800, 0x9, 0x2, 0x7f, 0xffffffff, 0xfff, 0x2, 0x57, 0x3, 0x3, 0x21045b65, 0xffff, 0x9}, {0x100000001, 0x1, 0x74a, 0x1, 0x7fff, 0x6, 0x2, 0x5, 0x2, 0x9, 0x1000, 0x100, 0x2}, {0x20, 0x80000001, 0x2, 0x8, 0x7, 0x3, 0x9, 0x0, 0x400, 0x9, 0x8, 0x99b, 0x15c}], 0x1f}) close(r6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000700)={r15, 0x1, 0x6, @remote}, 0x10) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000380)={0x6, 0x3}) epoll_wait(r6, &(0x7f0000000080)=[{}, {}], 0x2, 0xfff) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x2) 14:42:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500003a8409a80015000000000000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xc3, &(0x7f0000000480)=""/195}, 0x48) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x800000000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xfffffe11) r3 = getuid() setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000980), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r1, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/228, 0xe4, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000380)=""/238, 0xe8, r4}}, 0xc) mq_getsetattr(r1, &(0x7f00000006c0)={0xaaa, 0x1, 0xfff, 0x2, 0x9b2e, 0x9, 0xcd8f, 0xffffffffffffffff}, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80785659, &(0x7f0000000040)) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000880)={{{@in=@multicast2, @in6=@remote, 0x4e20, 0x4, 0x4e20, 0x4, 0xa, 0x20, 0x80, 0x2e, r2, r3}, {0x20, 0x6, 0x4, 0x7c8, 0x5, 0x80000001, 0x7b034ded, 0x6e2}, {0x6, 0x9, 0x800, 0x8000}, 0x800, 0x6e6bb6, 0x0, 0x1, 0x1, 0x3}, {{@in=@multicast1, 0x4d5}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3506, 0x3, 0x3, 0x3, 0x6, 0x4, 0x7}}, 0xe8) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "d8a1ffab3b6b2a92fc43bc36822b38bd78ba3669"}, 0x15, 0x3) fsetxattr$trusted_overlay_upper(r5, &(0x7f00000009c0)='trusted.overlay.upper\x00', &(0x7f0000000a00)={0x0, 0xfb, 0x3d, 0x2, 0xe828881, "35287d950f7eb59e52327e098ffa4ce1", "4d3d784dc20b533b4894fd61525d6f46a35c0c9a283f3f4901312a277a043deb1704be1b633e73e0"}, 0x3d, 0x2) 14:42:56 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x1000000200000581) r2 = dup2(r1, r0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) lseek(r4, 0x0, 0x3) r6 = openat$cgroup_int(r5, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r6, &(0x7f0000000700), 0x100000000000019a) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x2dd) 14:42:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(0xffffffffffffffff) 14:42:56 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x2}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x14, &(0x7f0000000040)='securitylo((}md5sum\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) 14:42:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') accept4$tipc(r0, &(0x7f0000000100)=@id, &(0x7f0000000180)=0x10, 0x80000) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f0000000140)={0x56, 0xfffffffffffffff8, 0xffffffffffffffff, {0x5a, 0xb6}, {0x80, 0x4}, @period={0x5a, 0x1, 0x100000000, 0x1, 0x8, {0x0, 0x0, 0x1ff, 0x8}, 0x0, &(0x7f0000000100)}}) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8013, r0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x1000000) [ 163.075478][ T8097] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 14:42:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="006386840756aac9244ea270500d"], 0xe) open$dir(&(0x7f0000000040)='./file0\x00', 0x10500, 0x140) 14:42:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(0xffffffffffffffff) 14:42:56 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340), &(0x7f0000000640)=0x18) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net\x00') fcntl$setstatus(r0, 0x4, 0x404) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x8bfff, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x788a32af, {{0xa, 0x4e24, 0x10001, @mcast2, 0x6}}}, 0x84) tee(0xffffffffffffffff, r1, 0x2, 0xffffffffffffffff) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x27a) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000500)=@req={0x3fc, 0x0, 0x2}, 0x10) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000003c0)={0x7, 0x2, 0xc05}) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0xfffffdef) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e23, @loopback}, 0x10) syz_open_dev$loop(&(0x7f000091dff5)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x29c8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000180)=0x84) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f000000d000)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x4) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) clone(0x1000000000, &(0x7f0000000400), 0x0, &(0x7f00000001c0), &(0x7f0000000440)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000040)={r5, 0x8}, 0x8) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000580)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 14:42:56 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7ff, 0x500) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x10c, r2, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcbd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc7c}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x667}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8000}, 0x2000c000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000000)) 14:42:56 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(r0) [ 163.316914][ T8122] device nr0 entered promiscuous mode [ 163.397469][ T8128] binder: BINDER_SET_CONTEXT_MGR already set [ 163.439597][ T8128] binder: 8127:8128 ioctl 40046207 0 returned -16 [ 163.495452][ T8135] binder: 8127:8135 ioctl c018620c 20000000 returned -1 14:42:56 executing program 2: r0 = socket(0x11, 0x8000a, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0x2, @tick=0x4, 0x40, {0x0, 0x7}, 0xfffffffffffffffa, 0x1, 0x7}) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)=@nfc, 0x12, 0x0}}], 0x1, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x81, 0x4) 14:42:57 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r2, 0x1f}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r3}, 0x10) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x40) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000000040)=0x2, 0x4) setsockopt(r0, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r4, &(0x7f0000000100)={0x1d, r3}, 0xffffffffffffff0d) 14:42:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(r0) 14:42:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x4, 0x9, 0x5, 0x1, 0x8001, 0x4, 0xfffffffffffffffe, {0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x3, 0x9f, 0x40, 0x2, 0x8}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x2, 0xf0ffff0000000a}]}}}]}, 0x3c}}, 0x0) 14:42:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r2, 0x80000000, 0x1, [0x7ff]}, &(0x7f0000000200)=0xa) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}}}, &(0x7f0000000040)=0x98) 14:42:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000300)={0x0, r2}) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r3, &(0x7f0000000000), r3, &(0x7f0000000080), 0x98f0, 0x4) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x1}) 14:42:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000180)=ANY=[@ANYBLOB="3f00000010000000ae0a000004000000000800007ede3b96d89301d797a3cf5381708881c914d0fbf5c14ac26f5090e8d807b71f2a"]) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) fcntl$addseals(r0, 0x409, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'\x00', 0x0}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000140)) bind(r0, &(0x7f0000000080)=@xdp={0x2c, 0x5, r2, 0x2f}, 0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000002c0)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x2c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)={r3, 0x2b, "5118e45e26ebd685f112d04bfdb9fd51ff41d29ce390146689d6df8ffced12e01ed4857e3d72f49f280688"}, &(0x7f0000000380)=0x33) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0xe4, 0x29, 0x2, {0x8, [{{0x80, 0x1}, 0x0, 0xc093, 0x7, './file0'}, {{0xc3679392093aa99a, 0x1, 0x2}, 0x100000001, 0x2, 0x7, './file0'}, {{0x40, 0x0, 0x4}, 0x7, 0x5, 0x7, './file0'}, {{0xe, 0x4, 0x3}, 0x1, 0x3, 0x7, './file0'}, {{0x0, 0x1}, 0x80, 0x5, 0x7, './file0'}, {{0x8, 0x1, 0x3}, 0x1, 0xfffffffffffff000, 0x7, './file0'}, {{0x0, 0x0, 0x1}, 0xfa00000, 0x1, 0x7, './file0'}]}}, 0xe4) [ 164.139795][ T8160] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode balance-rr(0) 14:42:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @remote}, 0x2f3) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x1500}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) poll(&(0x7f0000000000)=[{r2, 0x9}, {r0, 0x1020}], 0x2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0xf6c) [ 164.234911][ T8172] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode balance-rr(0) 14:42:57 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4008641c, &(0x7f0000000100)={0x0, 0x0}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', 'vboxnet0/\x00'}, 0x10) 14:42:57 executing program 0: mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x1) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000140)='./file0\x00', 0x2) renameat2(r0, &(0x7f00000003c0)='./file0\x00', r0, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) 14:42:57 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(r0) 14:42:57 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0x4) pread64(r0, &(0x7f0000000100)=""/97, 0x61, 0x0) socket$inet(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0xf0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(0x0, 0x100, 0x101000) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000280)={0x8, {{0xa, 0x4e23, 0x81, @empty, 0xf81}}}, 0x84) write$FUSE_OPEN(r2, &(0x7f00000000c0)={0x20, 0xfffffffffffffff5}, 0x20) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f0000000040)=0x100000000001f, 0x4) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2a, {0x700, 0x0, 0x7}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}, 0x2000000}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 14:42:57 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(r0) 14:42:58 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10600, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp6\x00') close(r1) 14:42:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x88d889c21cc38711, 0x0) ioctl$TIOCSETD(r0, 0x5422, 0x0) 14:42:58 executing program 3: r0 = socket$inet6(0xa, 0x80d, 0x7f) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4c, &(0x7f00000000c0), &(0x7f00006ed000)=0x4) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000040)=@routing={0x67, 0xa, 0x0, 0xfffffffffffffffb, 0x0, [@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @rand_addr="a6caec82cd25e21af92eeece671c985e"]}, 0x58) 14:42:58 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(r0) 14:42:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x200000000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0xfffffffffffffede) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2cd3416f258a"}, 0x14) 14:42:58 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "db78ebd57f99106501a8eb79cc823de08fda1a0792fef4b965c0a9e179ac87f45e70f6609b79740534dcc9f98379871ebaf1f19bbddd"}, 0x3a) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c45513, &(0x7f0000000080)={{0x5, 0x7, 0x10000, 0xa8d, 'syz0\x00', 0x3}, 0x1, [0x5, 0x100, 0x1d90, 0x20, 0x40, 0x31, 0x4, 0x8001, 0x55a, 0x1, 0xcfb, 0x6, 0x2, 0xfffffffffffffffe, 0x1ff, 0xe3, 0x3, 0x8, 0x2, 0x1, 0x1ff, 0x3f, 0x3, 0x2, 0x7fffffff, 0x71a2, 0x800, 0x8, 0x4, 0x40, 0x6, 0x80000000, 0x2, 0x10000, 0x49, 0xf29, 0x0, 0xcc0, 0x1, 0x2, 0x80000000, 0x4, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0x4f0273fe, 0x3, 0x10000, 0x2, 0x3, 0x8001, 0xa8, 0x8, 0xb5, 0x800, 0x9, 0x6, 0x10000, 0xff, 0x9, 0x3f, 0x100000000, 0xa80, 0xec3, 0x7, 0x4, 0xfffffffffffffffd, 0x1000, 0x1, 0x300d, 0x81, 0x204, 0x2, 0x0, 0x0, 0x3, 0x6, 0x6, 0x1d71f59f, 0x2, 0xfffffffffffffff9, 0x0, 0x943, 0x1, 0x1000, 0x3, 0x4, 0xfffffffffffffffa, 0x8001, 0x45, 0x0, 0x100, 0x1, 0x2, 0x80000001, 0x9, 0x80000000, 0x2, 0x6, 0x7, 0xfffffffffffffff7, 0x9, 0x8000, 0x100000001, 0x1, 0xbd, 0x7, 0x7, 0x11000, 0xbd, 0x5, 0xf950, 0x0, 0x0, 0x8, 0x3, 0x1, 0x8, 0x7ff, 0x0, 0x0, 0x8, 0x6, 0xffff, 0x81, 0x7], {0x0, 0x989680}}) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) 14:42:58 executing program 0: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001080)='/dev/hwrng\x00', 0x100, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), 0x0}}, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x9) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000100)=""/9, &(0x7f0000000180)=0x9) readlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/224, 0xe0) r1 = socket$inet6(0xa, 0x6, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x20000, 0x0) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000580)=[@text16={0x10, &(0x7f0000000540)="660f380408ea0b90190166b9ae0200000f3266b9fb0b00000f32b884000f00d0260f22e30fd10600000f1f00ffb34ce5c18c003800", 0x35}], 0x1, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000440)=@known='trusted.overlay.redirect\x00') connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) setsockopt$inet6_int(r5, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000080)) socketpair(0x1, 0x6, 0x1, &(0x7f0000000480)) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xc0ffffff00000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="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"], 0x20}}, 0x20004000) write$FUSE_WRITE(r3, &(0x7f0000000240)={0x18, 0x0, 0x7, {0x6}}, 0x18) r7 = dup2(r1, r0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) 14:42:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(r0) 14:42:58 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x180323}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x8000, 0x32, 0x0, 0x8a7, 0x1a, 0x7, 0x3, 0x3f, 0x81, 0x8c1, 0x1, 0x8}) 14:42:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) read$FUSE(r0, &(0x7f0000001340), 0x1000) 14:42:58 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="6a9ca2f052fa29812e88536257d63d4b9b426a895299fb9bde4406771b32c7c464c1d454092c3593b595e51f69c3232f4a40310eeaa2723c80241835b2e4100d4200f21d7f20e61e91fa33d252453097518fa619467c7ed7e03eba1c039a8820b834d31a6811af746c338cc1a4bb0f73c3af8ef93a22f0faa33ac68a0df8b48e2d754605d185ffb28cc972cf7c6e80ec64dfb5ebb6ede988928de7ba8a916b83d2f4c1fca3f41de56d53298439d27853d84b89460081581dc113edd03042309f609855f6f105032f"}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x800, 0x7, 0x4}) 14:42:58 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x2) shutdown(r0, 0x2) shutdown(r0, 0x800000000000002) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 14:42:58 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x28e100) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0xfe24, 0x80000001, 0x1, 0x0, 0x3ff, 0x1ff, 0x10000, 0x3, 0x80000000, 0x8, 0x80000000, 0x401, 0x4, 0x10001, 0x10, 0x11}}) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpgrp(0x0) r5 = getpid() kcmp$KCMP_EPOLL_TFD(r5, r4, 0x7, r1, &(0x7f0000000000)={r3, r2, 0x1000000}) 14:42:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044591) close(r0) 14:42:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$RTC_PLL_GET(r2, 0x801c7011, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'eql\x00', 0x2}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x80000, 0x0) prctl$PR_GET_SECCOMP(0x15) ioctl$TUNSETLINK(r5, 0x400454cd, 0x10308) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000400)="a9cc854f537dd5a2098721a1e001d156e3dfb2c896c98da6291a1447ef9dc4ae828cc870235d87dafb820689c5ff328556a534127352138f0b2ecf35a7d780ed92d08a3b61737ef711d49ce49b0816a88991320a4f85f3935c8830caa302058995a092abdd1fd38b5606cc0b7ba8841757342354e0180366f95eec40481bf3ddcc1548f02da48123494d80407a86175e8df45c5ac6956ff431b078578646ce5e9250e7982f9a08ad5c0f5beeded4d292f3", 0xb1, r4}, 0x68) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) readahead(r3, 0x0, 0x9) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r6, 0xc1205531, &(0x7f00000002c0)={0x0, 0xffff, 0x2, 0x0, [], [], [], 0x43, 0x0, 0x3d, 0x5, "93c202d7e6547d9b8466de7d9025e241"}) ioctl$VIDIOC_S_INPUT(r6, 0xc0045627, &(0x7f00000000c0)) ioctl$VIDIOC_S_INPUT(r6, 0xc0045627, &(0x7f0000000040)=0x3) ioctl$sock_ifreq(r4, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_addrs=@nfc}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000680)={&(0x7f0000000600)=""/113, 0x110000, 0x800, 0x9}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000700)={&(0x7f0000000040)=""/13, 0xc000, 0x804, 0x8000000000000001}, 0x18) ioctl$sock_netdev_private(r8, 0x89ee, &(0x7f0000000540)="ea4d80d50ff5c943a26991c1a5baccf3008f4e1658c116e62e4dd0c6409d6741ad7dff58dfb9f6c5595fe38b526105a76da586bcaca8e08ae4621f7e3c23c7bd07a5db3bbf8885fc4b7aaab0e969365d646ee2fb7dcd3c64d914e1be9bd1da0a18ae41d5fc21aef54482c6d1855a6b516b6e12dbb93eae5d66d104d3f11f264f9793f9a2936896a51b632ebce43449d56bfe1a2d01959cd953d27ff6bf0b5acd137fceec341f59412e23") r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x501000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r9, 0x112, 0xa, &(0x7f0000000000)=0x20, 0x4) syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) 14:42:58 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 165.610374][ C0] ================================================================== [ 165.618619][ C0] BUG: KASAN: use-after-free in ccid_hc_tx_delete+0xde/0x100 [ 165.625991][ C0] Read of size 8 at addr ffff8880923aeb40 by task ksoftirqd/0/9 [ 165.633605][ C0] [ 165.635937][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.0.0+ #15 [ 165.642951][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.653003][ C0] Call Trace: [ 165.656303][ C0] dump_stack+0x172/0x1f0 [ 165.660639][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 165.665673][ C0] print_address_description.cold+0x7c/0x20d [ 165.665694][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 165.665708][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 165.665724][ C0] kasan_report.cold+0x1b/0x40 [ 165.665739][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 165.665755][ C0] __asan_report_load8_noabort+0x14/0x20 [ 165.665769][ C0] ccid_hc_tx_delete+0xde/0x100 [ 165.665788][ C0] dccp_sk_destruct+0x3f/0x90 [ 165.691518][ C0] ? dccp_init_sock+0x3f0/0x3f0 [ 165.691532][ C0] __sk_destruct+0x55/0x6d0 [ 165.691546][ C0] ? proto_unregister+0x4e0/0x4e0 [ 165.691563][ C0] rcu_core+0x928/0x1390 [ 165.691585][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 165.691597][ C0] ? sched_clock+0x2e/0x50 [ 165.691622][ C0] __do_softirq+0x266/0x95a [ 165.691636][ C0] ? __sched_text_start+0x8/0x8 [ 165.691661][ C0] ? takeover_tasklets+0x7b0/0x7b0 [ 165.702114][ C0] run_ksoftirqd+0x8e/0x110 [ 165.702127][ C0] smpboot_thread_fn+0x6ab/0xa10 14:42:59 executing program 5: r0 = getpgrp(0x0) r1 = gettid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f0000000180)=0x1e) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0)={0x2}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x3a, &(0x7f0000000240)) rt_tgsigqueueinfo(r0, r1, 0x10000000036, &(0x7f0000000040)) signalfd4(r3, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000000340)=""/128, 0xff23) [ 165.702143][ C0] ? sort_range+0x30/0x30 [ 165.702157][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 165.702170][ C0] ? __kthread_parkme+0xfb/0x1b0 [ 165.702187][ C0] kthread+0x357/0x430 [ 165.702198][ C0] ? sort_range+0x30/0x30 [ 165.702210][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 165.702228][ C0] ret_from_fork+0x3a/0x50 [ 165.715016][ T8256] kobject: 'queues' (000000000e71f6a8): kobject_add_internal: parent: 'eql', set: '' [ 165.716221][ C0] [ 165.716229][ C0] Allocated by task 8227: [ 165.716245][ C0] save_stack+0x45/0xd0 [ 165.716259][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 165.716272][ C0] kasan_slab_alloc+0xf/0x20 [ 165.716284][ C0] kmem_cache_alloc+0x11a/0x6f0 [ 165.716295][ C0] ccid_new+0x256/0x3f0 [ 165.716306][ C0] dccp_hdlr_ccid+0x27/0x150 [ 165.716319][ C0] __dccp_feat_activate+0x17a/0x270 [ 165.716332][ C0] dccp_feat_activate_values+0x33a/0x766 [ 165.716352][ C0] dccp_rcv_state_process+0x116f/0x1935 [ 165.723052][ T8256] kobject: 'queues' (000000000e71f6a8): kobject_uevent_env [ 165.725587][ C0] dccp_v6_do_rcv+0x269/0xbf0 [ 165.725599][ C0] __release_sock+0x12e/0x3a0 [ 165.725610][ C0] release_sock+0x59/0x1c0 [ 165.725622][ C0] __inet_stream_connect+0x59f/0xea0 [ 165.725633][ C0] inet_stream_connect+0x58/0xa0 [ 165.725647][ C0] __sys_connect+0x266/0x330 [ 165.725660][ C0] __ia32_sys_connect+0x72/0xb0 [ 165.725672][ C0] do_fast_syscall_32+0x281/0xc98 [ 165.725683][ C0] entry_SYSENTER_compat+0x70/0x7f [ 165.725687][ C0] [ 165.725694][ C0] Freed by task 16: [ 165.725706][ C0] save_stack+0x45/0xd0 [ 165.725719][ C0] __kasan_slab_free+0x102/0x150 [ 165.725731][ C0] kasan_slab_free+0xe/0x10 [ 165.725742][ C0] kmem_cache_free+0x86/0x260 [ 165.725754][ C0] ccid_hc_tx_delete+0xc1/0x100 [ 165.725766][ C0] dccp_hdlr_ccid+0x7d/0x150 [ 165.725778][ C0] __dccp_feat_activate+0x17a/0x270 [ 165.725798][ C0] dccp_feat_activate_values+0x33a/0x766 [ 165.732492][ T8256] kobject: 'queues' (000000000e71f6a8): kobject_uevent_env: filter function caused the event to drop! [ 165.735910][ C0] dccp_create_openreq_child+0x40c/0x570 [ 165.735923][ C0] dccp_v6_request_recv_sock+0x214/0x1da0 [ 165.735935][ C0] dccp_check_req+0x35c/0x6f0 [ 165.735947][ C0] dccp_v6_rcv+0x6d7/0x191e [ 165.735959][ C0] ip6_protocol_deliver_rcu+0x303/0x16c0 [ 165.735969][ C0] ip6_input_finish+0x84/0x170 [ 165.735978][ C0] ip6_input+0xe4/0x3f0 [ 165.735988][ C0] ip6_rcv_finish+0x1e7/0x320 [ 165.735997][ C0] ipv6_rcv+0x10e/0x420 [ 165.736017][ C0] __netif_receive_skb_one_core+0x115/0x1a0 [ 165.741435][ T8256] kobject: 'rx-0' (0000000086f65de5): kobject_add_internal: parent: 'queues', set: 'queues' [ 165.745329][ C0] __netif_receive_skb+0x2c/0x1c0 [ 165.745341][ C0] process_backlog+0x206/0x750 [ 165.745352][ C0] net_rx_action+0x4fa/0x1070 [ 165.745364][ C0] __do_softirq+0x266/0x95a [ 165.745367][ C0] [ 165.745378][ C0] The buggy address belongs to the object at ffff8880923aeb40 [ 165.745378][ C0] which belongs to the cache ccid2_hc_tx_sock of size 1240 [ 165.745389][ C0] The buggy address is located 0 bytes inside of [ 165.745389][ C0] 1240-byte region [ffff8880923aeb40, ffff8880923af018) [ 165.745393][ C0] The buggy address belongs to the page: [ 165.745405][ C0] page:ffffea000248eb80 count:1 mapcount:0 mapping:ffff88809c78f040 index:0x0 compound_mapcount: 0 [ 165.745419][ C0] flags: 0x1fffc0000010200(slab|head) [ 165.745442][ C0] raw: 01fffc0000010200 ffff88809ac31948 ffff88809ac31948 ffff88809c78f040 [ 165.751491][ T8256] kobject: 'rx-0' (0000000086f65de5): kobject_uevent_env [ 165.755024][ C0] raw: 0000000000000000 ffff8880923ae040 0000000100000005 0000000000000000 [ 165.755030][ C0] page dumped because: kasan: bad access detected [ 165.755034][ C0] [ 165.755038][ C0] Memory state around the buggy address: [ 165.755049][ C0] ffff8880923aea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 165.755059][ C0] ffff8880923aea80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 165.755069][ C0] >ffff8880923aeb00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 165.755075][ C0] ^ [ 165.755085][ C0] ffff8880923aeb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 165.755095][ C0] ffff8880923aec00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 165.755100][ C0] ================================================================== [ 165.755104][ C0] Disabling lock debugging due to kernel taint [ 165.755174][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 166.196471][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.0.0+ #15 [ 166.204864][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.214917][ C0] Call Trace: [ 166.218208][ C0] dump_stack+0x172/0x1f0 [ 166.222539][ C0] panic+0x2cb/0x65c [ 166.226426][ C0] ? __warn_printk+0xf3/0xf3 [ 166.231010][ C0] ? retint_kernel+0x2d/0x2d [ 166.235600][ C0] ? trace_hardirqs_on+0x5e/0x230 [ 166.240620][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 166.245642][ C0] end_report+0x47/0x4f [ 166.249787][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 166.254803][ C0] kasan_report.cold+0xe/0x40 [ 166.259471][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 166.264503][ C0] __asan_report_load8_noabort+0x14/0x20 [ 166.270303][ C0] ccid_hc_tx_delete+0xde/0x100 [ 166.275146][ C0] dccp_sk_destruct+0x3f/0x90 [ 166.279812][ C0] ? dccp_init_sock+0x3f0/0x3f0 [ 166.284656][ C0] __sk_destruct+0x55/0x6d0 [ 166.289158][ C0] ? proto_unregister+0x4e0/0x4e0 [ 166.294175][ C0] rcu_core+0x928/0x1390 [ 166.298418][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 166.304129][ C0] ? sched_clock+0x2e/0x50 [ 166.308546][ C0] __do_softirq+0x266/0x95a [ 166.313049][ C0] ? __sched_text_start+0x8/0x8 [ 166.318374][ C0] ? takeover_tasklets+0x7b0/0x7b0 [ 166.323478][ C0] run_ksoftirqd+0x8e/0x110 [ 166.327970][ C0] smpboot_thread_fn+0x6ab/0xa10 [ 166.332911][ C0] ? sort_range+0x30/0x30 [ 166.337230][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 166.343472][ C0] ? __kthread_parkme+0xfb/0x1b0 [ 166.348419][ C0] kthread+0x357/0x430 [ 166.352477][ C0] ? sort_range+0x30/0x30 [ 166.356794][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 166.363027][ C0] ret_from_fork+0x3a/0x50 [ 166.368163][ C0] Kernel Offset: disabled [ 166.372486][ C0] Rebooting in 86400 seconds..