[ 34.596924][ T26] audit: type=1800 audit(1552565615.850:30): pid=7378 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.36' (ECDSA) to the list of known hosts. 2019/03/14 12:13:47 fuzzer started 2019/03/14 12:13:50 dialing manager at 10.128.0.26:36439 2019/03/14 12:13:50 syscalls: 1 2019/03/14 12:13:50 code coverage: enabled 2019/03/14 12:13:50 comparison tracing: enabled 2019/03/14 12:13:50 extra coverage: extra coverage is not supported by the kernel 2019/03/14 12:13:50 setuid sandbox: enabled 2019/03/14 12:13:50 namespace sandbox: enabled 2019/03/14 12:13:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/14 12:13:50 fault injection: enabled 2019/03/14 12:13:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/14 12:13:50 net packet injection: enabled 2019/03/14 12:13:50 net device setup: enabled 12:15:27 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000440)="ef", 0x1}, {0x0}], 0x2) syzkaller login: [ 146.126713][ T7543] IPVS: ftp: loaded support on port[0] = 21 12:15:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x40000) read(r0, &(0x7f00000000c0)=""/227, 0xe3) [ 146.223214][ T7543] chnl_net:caif_netlink_parms(): no params data found [ 146.304499][ T7543] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.312897][ T7543] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.322320][ T7543] device bridge_slave_0 entered promiscuous mode [ 146.331671][ T7543] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.348331][ T7543] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.368359][ T7543] device bridge_slave_1 entered promiscuous mode [ 146.399894][ T7546] IPVS: ftp: loaded support on port[0] = 21 [ 146.411011][ T7543] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.433775][ T7543] bond0: Enslaving bond_slave_1 as an active interface with an up link 12:15:27 executing program 2: [ 146.480770][ T7543] team0: Port device team_slave_0 added [ 146.487902][ T7543] team0: Port device team_slave_1 added [ 146.550960][ T7543] device hsr_slave_0 entered promiscuous mode [ 146.598536][ T7543] device hsr_slave_1 entered promiscuous mode [ 146.605021][ T7548] IPVS: ftp: loaded support on port[0] = 21 12:15:28 executing program 3: [ 146.717002][ T7543] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.724345][ T7543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.732395][ T7543] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.739513][ T7543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.797073][ T7546] chnl_net:caif_netlink_parms(): no params data found [ 146.904055][ T7552] IPVS: ftp: loaded support on port[0] = 21 [ 146.930164][ T7543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.943379][ T7546] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.951506][ T7546] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.960661][ T7546] device bridge_slave_0 entered promiscuous mode [ 146.977944][ T7546] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.986076][ T7546] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.994215][ T7546] device bridge_slave_1 entered promiscuous mode 12:15:28 executing program 4: [ 147.024118][ T7543] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.032140][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.048056][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.090422][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.111496][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 147.179666][ T7556] IPVS: ftp: loaded support on port[0] = 21 [ 147.188688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.197616][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.204730][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.214346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.223030][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.230126][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.254727][ T7548] chnl_net:caif_netlink_parms(): no params data found [ 147.280247][ T7546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.291272][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.304496][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.326267][ T7546] bond0: Enslaving bond_slave_1 as an active interface with an up link 12:15:28 executing program 5: [ 147.351185][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.361468][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.373028][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.381948][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.405986][ T7543] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 147.423050][ T7543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.452503][ T7548] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.459726][ T7548] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.467399][ T7548] device bridge_slave_0 entered promiscuous mode [ 147.482271][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.494812][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.507122][ T7559] IPVS: ftp: loaded support on port[0] = 21 [ 147.520500][ T7546] team0: Port device team_slave_0 added [ 147.526381][ T7548] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.534495][ T7548] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.542416][ T7548] device bridge_slave_1 entered promiscuous mode [ 147.588458][ T7546] team0: Port device team_slave_1 added [ 147.619473][ T7548] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.702941][ T7546] device hsr_slave_0 entered promiscuous mode [ 147.758735][ T7546] device hsr_slave_1 entered promiscuous mode [ 147.829521][ T7548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.851838][ T7552] chnl_net:caif_netlink_parms(): no params data found [ 147.864032][ T7543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.886273][ T7548] team0: Port device team_slave_0 added [ 147.911575][ T7548] team0: Port device team_slave_1 added 12:15:29 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x80010a) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0) exit_group(0x0) [ 148.040755][ T7548] device hsr_slave_0 entered promiscuous mode [ 148.061772][ T7548] device hsr_slave_1 entered promiscuous mode [ 148.103418][ T7552] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.110639][ T7552] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.118881][ T7552] device bridge_slave_0 entered promiscuous mode [ 148.130458][ T7552] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.137526][ T7552] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.145555][ T7552] device bridge_slave_1 entered promiscuous mode [ 148.167528][ T7552] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.179844][ T7552] bond0: Enslaving bond_slave_1 as an active interface with an up link 12:15:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_tid_address(0x0) [ 148.230720][ T7556] chnl_net:caif_netlink_parms(): no params data found [ 148.258039][ T7548] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.265193][ T7548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.272582][ T7548] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.279705][ T7548] bridge0: port 1(bridge_slave_0) entered forwarding state 12:15:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x401, 0x11, "c4d22c3b87fb1407118e07e78c7ee4121e"}) write$P9_RSTATFS(r0, 0x0, 0x0) [ 148.321910][ T7559] chnl_net:caif_netlink_parms(): no params data found 12:15:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f1245123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') writev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)='+4', 0x2}], 0x1) [ 148.375171][ T7552] team0: Port device team_slave_0 added [ 148.384124][ T7552] team0: Port device team_slave_1 added [ 148.440790][ T7558] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.448854][ T7558] bridge0: port 2(bridge_slave_1) entered disabled state 12:15:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x1) read$eventfd(r0, 0x0, 0x0) 12:15:29 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r0) close(0xffffffffffffffff) socket$unix(0x1, 0x5, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100), 0x8) [ 148.490110][ T7556] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.505192][ T7556] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.517596][ T7556] device bridge_slave_0 entered promiscuous mode 12:15:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x15a) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'dummy0\x00', 0x400}) [ 148.593694][ T7552] device hsr_slave_0 entered promiscuous mode [ 148.648887][ T7552] device hsr_slave_1 entered promiscuous mode [ 148.718442][ T7556] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.725565][ T7556] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.733427][ T7556] device bridge_slave_1 entered promiscuous mode [ 148.748414][ T7548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.766121][ T7559] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.773327][ T7559] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.781584][ T7559] device bridge_slave_0 entered promiscuous mode [ 148.790247][ T7559] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.797383][ T7559] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.805411][ T7559] device bridge_slave_1 entered promiscuous mode [ 148.825048][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.839632][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.849307][ T7548] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.872433][ T7556] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.883330][ T7556] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.901270][ T7556] team0: Port device team_slave_0 added [ 148.912517][ T7559] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.927204][ T7559] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.949858][ T7556] team0: Port device team_slave_1 added [ 148.966436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.975581][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.987365][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.994516][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.002365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.011145][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.019554][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.026581][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.034220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.042748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.051402][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.059830][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.068428][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.086575][ T7546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.100371][ T7559] team0: Port device team_slave_0 added [ 149.107327][ T7559] team0: Port device team_slave_1 added [ 149.170652][ T7556] device hsr_slave_0 entered promiscuous mode [ 149.218713][ T7556] device hsr_slave_1 entered promiscuous mode [ 149.297032][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.306322][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.314914][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.323624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.331998][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.340817][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.349179][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.356785][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.369791][ T7552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.382954][ T7546] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.392447][ T7548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.461162][ T7559] device hsr_slave_0 entered promiscuous mode [ 149.479071][ T7559] device hsr_slave_1 entered promiscuous mode [ 149.522445][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.530400][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.538242][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.546741][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.555553][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.562685][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.572378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.581118][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.589516][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.596558][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.604360][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.626191][ T7552] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.634261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.643300][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.664602][ T7548] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.685202][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.694421][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.703626][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.712433][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.721226][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.729965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.738337][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.746835][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.755295][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.762392][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.770063][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.778779][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.787039][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.794132][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.802349][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.811470][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.819287][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.844181][ T7546] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.855984][ T7546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.873522][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.882522][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.893167][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.936914][ T7559] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.962112][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.977909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.986863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.995908][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.004480][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.013010][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.030387][ T7559] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.042009][ T7546] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.050221][ T7552] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.062228][ T7552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.070214][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.077962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.086693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.095021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.103088][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.125255][ T7556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.148821][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.157484][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.167767][ T2914] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.174898][ T2914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.183290][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.192019][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.200941][ T2914] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.207980][ T2914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.215648][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.224866][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.233619][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.250407][ T7556] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.278053][ T7552] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.300712][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.313658][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.322096][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.331312][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.340008][ T2914] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.347037][ T2914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.355000][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.365131][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.373601][ T2914] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.380662][ T2914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.402786][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.410820][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.419937][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.428633][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.437050][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.446784][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.455620][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.464041][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.472715][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.481175][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.489547][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.499105][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.506881][ T2914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.522534][ T7556] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.543123][ T7556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.559402][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.567744][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.576598][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.586051][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.595514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 12:15:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x8}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 12:15:31 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800813ee45ae087185082cf0400b0eba06ec4000023000500000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 150.605243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.624439][ T7559] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 12:15:31 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r1, &(0x7f0000000280)=0xdf, 0x80000003) [ 150.670359][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.694128][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.710639][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.785707][ T7559] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.831703][ T7556] 8021q: adding VLAN 0 to HW filter on device batadv0 12:15:32 executing program 4: 12:15:32 executing program 5: 12:15:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0x20000000) 12:15:32 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200002, 0xfffffffffffffffd, 0x2012, r0, 0x4000) 12:15:32 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x100) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="003f1b60fb6fef17e4894835e6a8631c887bb553cd46ccfa"], 0x18) fsync(r1) fallocate(r1, 0x0, 0x40000, 0xfff) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:15:32 executing program 3: 12:15:32 executing program 2: 12:15:32 executing program 3: 12:15:32 executing program 4: 12:15:32 executing program 0: 12:15:32 executing program 5: 12:15:32 executing program 2: 12:15:32 executing program 4: 12:15:32 executing program 1: 12:15:32 executing program 3: 12:15:32 executing program 0: 12:15:32 executing program 2: 12:15:32 executing program 5: 12:15:32 executing program 3: 12:15:32 executing program 4: 12:15:32 executing program 1: 12:15:32 executing program 0: 12:15:32 executing program 2: 12:15:32 executing program 3: 12:15:32 executing program 5: 12:15:32 executing program 4: 12:15:32 executing program 1: 12:15:32 executing program 2: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000030) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @remote, 0x0, 0x0, 0x0, 0x132}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:15:32 executing program 0: 12:15:32 executing program 3: 12:15:32 executing program 5: 12:15:33 executing program 4: 12:15:33 executing program 1: 12:15:33 executing program 0: [ 151.752079][ T7694] ptrace attach of "/root/syz-executor.2"[7693] was attempted by "/root/syz-executor.2"[7694] 12:15:33 executing program 2: 12:15:33 executing program 3: 12:15:33 executing program 5: 12:15:33 executing program 0: 12:15:33 executing program 4: 12:15:33 executing program 1: 12:15:33 executing program 4: 12:15:33 executing program 3: 12:15:33 executing program 5: 12:15:33 executing program 2: 12:15:33 executing program 0: 12:15:33 executing program 3: 12:15:33 executing program 1: 12:15:33 executing program 5: 12:15:33 executing program 4: 12:15:33 executing program 2: 12:15:33 executing program 5: 12:15:33 executing program 3: 12:15:33 executing program 0: 12:15:33 executing program 1: 12:15:33 executing program 4: 12:15:33 executing program 5: 12:15:33 executing program 2: 12:15:33 executing program 0: 12:15:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f00000000c0)="0adc1f123c123f319bc070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000000)={'eql\x00\x00\x00\xa9[\x00', @ifru_map={0x1ff}}) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000080)={'eql\x00', @ifru_ivalue=0x10e8}) 12:15:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="000000000c00000000000000080001007366710048000200000000000000e8ffffffffffffff0000000000000000000000e6a200000000000000000000000000000000000000000000000000000000000000000000000000000000009491a7a2da5e2010c05be8c0ca1b2bd4938b97a0321e23b227fcf7cdc28bb5ee2543586059797e322564de85a9bb4399af57b1f3f021006e7b77e47d29fa510bdca9937dd10f9caf76324b97d8745d70730b7a449b21faef3283e0cd15d6e10dc46e0721632ec9ab994257754ed38798c3997cbb56e766ba8c59ed"], 0x1}}, 0x0) 12:15:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) 12:15:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x4000, 0x0) 12:15:33 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000000c0)={0x6, 0x40, 0x1, 'queue1\x00', 0x9}) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000080)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="38000000c08d3f2c5a217d7e71eb65bd0510100b0f000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100677265000c0002000800020000000000"], 0x38}}, 0x0) 12:15:33 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x8000, 0x8000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB="ebd3ad130fb8b29a01a29ecf72fc"], 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x20, @rand_addr="9fe98dc7793a325de99385d5fdce367d"}}, 0x9, 0x8}, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x80000001, 0x1, 0x0, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x0, 0x73d}, 0x29b) sendto$inet6(r2, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x3) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000140)) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4004b100, &(0x7f0000000080)={0x18, 0x0, {0x1, @remote, 'teql0\x00'}}) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x0, 0xffffffffffffffff, 0xffffffff}, &(0x7f0000000580)=0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000680)={0x6, 0x101, 0x9, 'queue1\x00', 0x8}) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000000)={@mcast2}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0xf7, "c6a189e3d94646e1401262f5976552e9447d4127ccecb4ecf5684930afdf47583b61361bcbce826c8a51b37daf7f1b6a8a2205c9ea5480baad2f90276036130a6a116bf20d44d3fd4ba9fe53c9d038c5da420b4ebb44681c42669caf3a4263916160d3ac474de367a3baec528d4e41a63ccdd677eef39de7db0b2d74520c72966617963256566b5d3c719aaaa7e6c23690da8e15b3895f3d5ecfc25f16da865e247173dae02aab313e83c22bc49130a8926a2ed5a94ba08b9299144fb4a176e6db9cf41e0dfe7295b062eeb10cbf378e933a36ea9d27eab0257177f6170418ba2ce0f34ca4267febc171992cc782ccf7452158ce8e4fd2"}, &(0x7f0000000400)=0xff) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000005c0)={r5, 0x1, 0x3ff, 0x1, 0x4, 0x1000, 0x8, 0x9, {r4, @in={{0x2, 0x4e21, @broadcast}}, 0x800, 0x8, 0x8001, 0x6, 0x4}}, &(0x7f0000000440)=0xb0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000200)=@req={0x10001, 0x1, 0x8, 0x6}, 0x10) 12:15:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5385, &(0x7f00000005c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigpending(&(0x7f0000000000), 0x4) 12:15:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, &(0x7f0000003140)) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0), 0x400027f, 0x0, &(0x7f0000003180)) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x33, @empty, 0x4e22, 0x1, 'none\x00', 0x0, 0x7fff, 0x62}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x88040, 0x0, 0xfffffdc2) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000001c0)={0x3, 0x2, 0x100000001, 0x8001, 0x6, 0x8, 0x2, 0x3, 0x3f, 0x2}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x4, 0x40, 0x2, 0x7, 0x2}, 0x0, &(0x7f0000000080)={0x20, 0x80000001, 0x2, 0x7, 0x4, 0x5, 0x8}, &(0x7f0000000100)={r3, r4+30000000}, &(0x7f0000000180)={&(0x7f0000000140)={0x400}, 0x8}) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 12:15:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) 12:15:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x109a80, 0x80) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x10001, 0x0, 0x4, 0x3, 0x1, 0x1f, 0x2, {0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xc05b, 0x9, 0x2, 0x9, 0x81}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x8, 0x4, [0x9, 0x2, 0x0, 0x985d]}, &(0x7f00000001c0)=0x10) r2 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x4a, 0x0, &(0x7f0000000180)) setsockopt$inet6_int(r0, 0x29, 0xcf, &(0x7f0000000200)=0x8, 0x4) [ 152.732704][ C0] hrtimer: interrupt took 27076 ns 12:15:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1}, 0x8) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000), 0x4) 12:15:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000013c0)='/dev/loop#\x00', 0x0, 0x4000010004006) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000001c0)={@rand_addr=0x80000000, @multicast1, r2}, 0xc) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)) 12:15:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000480)=@v1={0x2, "8ae5bd4af222b014a6383fc0b6d0b008b905"}, 0x13, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80080, 0x0) r2 = accept4$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x8, 0x5, 0x200, 0x41b6c844, 0x7, 0x4, {0x0, @in6={{0xa, 0x4e24, 0xfff, @local, 0x3}}, 0x2ed, 0x5, 0x9, 0x7, 0x200}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={r3}, &(0x7f0000000340)=0x8) stat(&(0x7f0000000200)='./file0/file0\x00', 0x0) 12:15:34 executing program 3: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000140)='sit0\x00') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_team\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000140)='sit0\x00') [ 152.890672][ T7794] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 152.903987][ T7788] IPVS: set_ctl: invalid protocol: 51 0.0.0.0:20002 12:15:34 executing program 3: mkdir(&(0x7f0000000680)='./file0\x00', 0x20) r0 = open(&(0x7f0000000140)='./bus\x00', 0x2000000, 0x19c) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x10) r1 = open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'bcsf0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mkdirat(r3, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f0000000180)={0x0, 0x9f, 0x0, [], &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x4e21, 0xe7d, @ipv4, 0x2}, {0xa, 0x4e23, 0x6, @remote, 0x7}, 0x8, [0x0, 0x0, 0x0, 0x34798395, 0xffffffffffff8001, 0x81, 0x6, 0x4]}, 0x5c) setsockopt$inet6_int(r3, 0x29, 0xcb, &(0x7f0000000100)=0x6, 0x4) ioctl$GIO_SCRNMAP(r3, 0x4b40, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000480)='security.ima\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fcntl$dupfd(r3, 0x7ffffffd, r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x3e2) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x3f, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) mkdirat(0xffffffffffffffff, &(0x7f0000000640)='./bus\x00', 0x20) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000500)=0x2) ioctl$VT_RELDISP(r5, 0x5605) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) memfd_create(&(0x7f0000000600)='\x00', 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000005, 0x32, r6, 0x0) ftruncate(r6, 0x7fff) sendfile(r3, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 12:15:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000013c0)='/dev/loop#\x00', 0x0, 0x4000010004006) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000001c0)={@rand_addr=0x80000000, @multicast1, r2}, 0xc) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)) 12:15:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1}, 0x8) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000), 0x4) 12:15:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000480)=@v1={0x2, "8ae5bd4af222b014a6383fc0b6d0b008b905"}, 0x13, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80080, 0x0) r2 = accept4$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x8, 0x5, 0x200, 0x41b6c844, 0x7, 0x4, {0x0, @in6={{0xa, 0x4e24, 0xfff, @local, 0x3}}, 0x2ed, 0x5, 0x9, 0x7, 0x200}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={r3}, &(0x7f0000000340)=0x8) stat(&(0x7f0000000200)='./file0/file0\x00', 0x0) [ 153.123805][ T7816] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:15:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1}, 0x8) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000), 0x4) [ 153.642617][ T7813] IPVS: set_ctl: invalid protocol: 51 0.0.0.0:20002 12:15:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, &(0x7f0000003140)) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0), 0x400027f, 0x0, &(0x7f0000003180)) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x33, @empty, 0x4e22, 0x1, 'none\x00', 0x0, 0x7fff, 0x62}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x88040, 0x0, 0xfffffdc2) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000001c0)={0x3, 0x2, 0x100000001, 0x8001, 0x6, 0x8, 0x2, 0x3, 0x3f, 0x2}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x4, 0x40, 0x2, 0x7, 0x2}, 0x0, &(0x7f0000000080)={0x20, 0x80000001, 0x2, 0x7, 0x4, 0x5, 0x8}, &(0x7f0000000100)={r3, r4+30000000}, &(0x7f0000000180)={&(0x7f0000000140)={0x400}, 0x8}) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 12:15:34 executing program 5: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x43, 0x3, 0x3}, 0x10) sendmmsg(r0, &(0x7f00000092c0), 0x4000256, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x400) 12:15:34 executing program 4: r0 = add_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000001040)="ed", 0x1, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0xb, r0) keyctl$revoke(0x3, r0) keyctl$revoke(0x3, r0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', 'user\x00'}, &(0x7f0000000080)=""/76, 0x4c) 12:15:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x0, 0x40000006], [0xc1]}) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x42000) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) 12:15:35 executing program 3: mkdir(&(0x7f0000000680)='./file0\x00', 0x20) r0 = open(&(0x7f0000000140)='./bus\x00', 0x2000000, 0x19c) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x10) r1 = open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'bcsf0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mkdirat(r3, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f0000000180)={0x0, 0x9f, 0x0, [], &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x4e21, 0xe7d, @ipv4, 0x2}, {0xa, 0x4e23, 0x6, @remote, 0x7}, 0x8, [0x0, 0x0, 0x0, 0x34798395, 0xffffffffffff8001, 0x81, 0x6, 0x4]}, 0x5c) setsockopt$inet6_int(r3, 0x29, 0xcb, &(0x7f0000000100)=0x6, 0x4) ioctl$GIO_SCRNMAP(r3, 0x4b40, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000480)='security.ima\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fcntl$dupfd(r3, 0x7ffffffd, r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x3e2) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x3f, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) mkdirat(0xffffffffffffffff, &(0x7f0000000640)='./bus\x00', 0x20) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000500)=0x2) ioctl$VT_RELDISP(r5, 0x5605) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) memfd_create(&(0x7f0000000600)='\x00', 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000005, 0x32, r6, 0x0) ftruncate(r6, 0x7fff) sendfile(r3, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 12:15:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, &(0x7f0000003140)) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0), 0x400027f, 0x0, &(0x7f0000003180)) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x33, @empty, 0x4e22, 0x1, 'none\x00', 0x0, 0x7fff, 0x62}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x88040, 0x0, 0xfffffdc2) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000001c0)={0x3, 0x2, 0x100000001, 0x8001, 0x6, 0x8, 0x2, 0x3, 0x3f, 0x2}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x4, 0x40, 0x2, 0x7, 0x2}, 0x0, &(0x7f0000000080)={0x20, 0x80000001, 0x2, 0x7, 0x4, 0x5, 0x8}, &(0x7f0000000100)={r3, r4+30000000}, &(0x7f0000000180)={&(0x7f0000000140)={0x400}, 0x8}) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) [ 153.735112][ T7840] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 153.820608][ T7847] IPVS: set_ctl: invalid protocol: 51 0.0.0.0:20002 [ 153.840063][ T7840] kvm [7839]: vcpu0, guest rIP: 0xfff0 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 [ 153.894301][ T7851] IPVS: set_ctl: invalid protocol: 51 0.0.0.0:20002 [ 153.912188][ T7853] kvm [7839]: vcpu0, guest rIP: 0xfff0 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 12:15:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, &(0x7f0000003140)) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0), 0x400027f, 0x0, &(0x7f0000003180)) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x33, @empty, 0x4e22, 0x1, 'none\x00', 0x0, 0x7fff, 0x62}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x88040, 0x0, 0xfffffdc2) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000001c0)={0x3, 0x2, 0x100000001, 0x8001, 0x6, 0x8, 0x2, 0x3, 0x3f, 0x2}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x4, 0x40, 0x2, 0x7, 0x2}, 0x0, &(0x7f0000000080)={0x20, 0x80000001, 0x2, 0x7, 0x4, 0x5, 0x8}, &(0x7f0000000100)={r3, r4+30000000}, &(0x7f0000000180)={&(0x7f0000000140)={0x400}, 0x8}) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 12:15:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xa0000012}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv6_delroute={0x34, 0x19, 0x805, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x14, 0x1, 0xfc, 0x0, 0xff, 0x5, 0x400}, [@RTA_ENCAP_TYPE={0x8}, @RTA_ENCAP_TYPE={0x8}, @RTA_MARK={0x8, 0x10, 0xfffffffffffffffa}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x80) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000280)=ANY=[@ANYBLOB="540000001000070d000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x54}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40000280000, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc044565d, &(0x7f0000000100)={0x856, 0xc, 0x4, 0x4, {}, {0x3, 0x1, 0x2, 0x417800000000, 0x3, 0xb0f, "ad24ec58"}, 0x7, 0x3, @offset=0x1, 0x4}) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000180)={{0x200000000000088a, 0xffffffffffffffff}, 0x20}, 0x10) 12:15:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8e) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xd, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x400, 0x4) [ 154.152538][ T7860] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 154.201327][ T7860] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 154.201853][ T7863] IPVS: set_ctl: invalid protocol: 51 0.0.0.0:20002 12:15:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000180)={0x0, "8d9249eedb97f5fd36fdcecb97505da185522e1542b413112afe7beaf70d909b", 0x3, 0x7ff8000000, 0x7fff, 0x0, 0x6}) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1000, 0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000040)) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000380)=0x10000) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={0x0, 0xff, 0x7fffffff, 0xfffffffffffffff8, 0x5, 0x4}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)={r4, 0xc6, "b891f41785ff60eaf419f527e2a3f7df3ec76990bfacb04543805d3a4f27705fbaec2c0be6640aad2e77de25c8b2630ae803667414ff21dcf1fd10de0da670df2fff73071640d8e18f88331dab51cf9dec4c555d6fd3e9a3a35fef9c1a9115227e32e9cc01f701edf887427079effc2ffe40152aed24315b8176c3e7edd11efcbfb9704f53ecfb500fc67025126b215a03c6a04b40a70885fd33f1922e5517958a4690f8209dae4c68408c4fbac0cad41ad4411c331460f063d5c33ffde44a6169bdb6863cf9"}, &(0x7f0000000340)=0xce) [ 154.275855][ T7860] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 154.289907][ T7860] netlink: 'syz-executor.0': attribute type 21 has an invalid length. 12:15:35 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4000, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7afb, 0x18881) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)={0x2, 0x0, [{0x1}, {0xd, 0x9727}]}) 12:15:35 executing program 0: syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x101, 0x20000) getsockopt$inet6_buf(r0, 0x29, 0xff, &(0x7f0000000080)=""/66, &(0x7f0000000100)=0x42) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x81) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000000)) 12:15:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000200)={0xffffffffffffffff, 0xd6c4}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r2 = dup(r0) write$P9_RCLUNK(r2, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0x1f4}, 0xffffffffffffffc4) mmap(&(0x7f0000014000/0x3000)=nil, 0x3000, 0x2000000, 0x13, 0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, 0x0) 12:15:35 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) truncate(&(0x7f0000000140)='./file0\x00', 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = getpgrp(0x0) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x1) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000)=0x4, 0x4) ioprio_set$pid(0x0, r1, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x0, 0x5, 0x0, 0x1f, 0x1000, 0x6, 0x40, 0x7f]}) set_mempolicy(0x40000000007fff, &(0x7f0000000100)=0x3, 0x100000009) clone(0x2102001dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) 12:15:35 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="d800000018008100e00f80ecdb4cb904021965000b007c05e87c55a11200e1730000000000000000000000000000812fa80008000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb5d5da007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200000000000070784e5c25ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x48) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000002c0)=0x9) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, r3, 0x400, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x28}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}]}, 0x90}}, 0x24040080) r4 = getpgrp(0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000440)={[], 0x3, 0xfff, 0x9, 0x10001, 0x4, r4}) syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x9, 0x80000) 12:15:35 executing program 4: r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, r0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x20, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x0, 0x0, [], [], [], 0x81}) 12:15:36 executing program 0: r0 = socket$kcm(0x10, 0x803, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80100, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x41017e24, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000180)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x1}], 0x1}, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x8, @loopback, 0x4}, 0x1c) bind$rxrpc(r1, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) 12:15:36 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) truncate(&(0x7f0000000140)='./file0\x00', 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = getpgrp(0x0) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x1) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000)=0x4, 0x4) ioprio_set$pid(0x0, r1, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x0, 0x5, 0x0, 0x1f, 0x1000, 0x6, 0x40, 0x7f]}) set_mempolicy(0x40000000007fff, &(0x7f0000000100)=0x3, 0x100000009) clone(0x2102001dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) 12:15:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x3, 0x8972, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000a90000/0x4000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x20000002, 0x0, 0x0, &(0x7f0000b1c000/0x4000)=nil}) mprotect(&(0x7f0000b1d000/0xe000)=nil, 0xe000, 0x1) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000000)={0x3ff}) vmsplice(r0, &(0x7f0000b1d000)=[{0x0}], 0x1, 0x0) 12:15:36 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) truncate(&(0x7f0000000140)='./file0\x00', 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = getpgrp(0x0) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x1) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000)=0x4, 0x4) ioprio_set$pid(0x0, r1, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x0, 0x5, 0x0, 0x1f, 0x1000, 0x6, 0x40, 0x7f]}) set_mempolicy(0x40000000007fff, &(0x7f0000000100)=0x3, 0x100000009) clone(0x2102001dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) 12:15:36 executing program 3: r0 = socket(0x840000000015, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000040)=0x1c) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f000033bffc)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x101}, 0x1) 12:15:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/route\x00') pipe2(&(0x7f0000000000), 0x4000) preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x0) 12:15:36 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) truncate(&(0x7f0000000140)='./file0\x00', 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = getpgrp(0x0) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x1) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000)=0x4, 0x4) ioprio_set$pid(0x0, r1, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x0, 0x5, 0x0, 0x1f, 0x1000, 0x6, 0x40, 0x7f]}) set_mempolicy(0x40000000007fff, &(0x7f0000000100)=0x3, 0x100000009) clone(0x2102001dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) 12:15:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) setrlimit(0x8c00000000000007, &(0x7f00000000c0)) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000002c0)={0x4}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x2, r2, 0x1}) 12:15:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000200)={0xffffffffffffffff, 0xd6c4}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r2 = dup(r0) write$P9_RCLUNK(r2, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0x1f4}, 0xffffffffffffffc4) mmap(&(0x7f0000014000/0x3000)=nil, 0x3000, 0x2000000, 0x13, 0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, 0x0) 12:15:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000040)=0x1, 0x4) recvmsg(r0, &(0x7f0000000700)={&(0x7f00000005c0)=@xdp, 0x80, &(0x7f00000006c0)}, 0x10001) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x5, 0x10000, 0x6, 0x8, 0x3ff}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x1f}, 0x8) 12:15:36 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) truncate(&(0x7f0000000140)='./file0\x00', 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = getpgrp(0x0) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000f80)=ANY=[@ANYBLOB="7f000001e000000200000000000000ff7665746830000000000000000000000076657468300000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000ff0002100000000000000000000000000000e8001801000000000000400000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000d068001000000002800727066696c74657200000000000000000000000000000000000000000000080000002000000030005450524f585900000000000000000000000000000000000000000000000006000000ffff0000000000034e200000ffffffff7f000001ff000000ffffff006272696467655f736c6176655f31000069705f76746930000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff0000000000000000000000000000005e00020c0000000000000000000000000000e8001001000000000000000000000000000000000000000000000000280074746c00000000000000000000000000000000000000000000000000000000400000000000002800727066696c7465720000000000000000000000000000000000000000000001000000f2000000280054544c00000000000000e3c11f90b32955d4000000000000000000000000000000000000000002ff00000000000000000000000000000000000000000000000000000000000000000000288e934edbae5100000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000098a28800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000104030000000000000004efac1414aaffffffff00000000697036746e6c3000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000014b2b80f3f7838ca7c24cd96ae1bff2f0000ff0002040000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000003000616464727479706500000000000000000000000000000000000000000000900004000000000000000000000000002800544f5300000000000000000000000000000000000000000000000000000001090000000000000000000000000000ffffff00ffffff006c6f00000000978593fc00000000000069726c616e300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a100001000000000000000000000000000009800c80000000000000000000000000000000000000000000000000030005450524f5859000000000000000000000000000000000000000000000000ff7f0000ac000000e00000024e2300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000000000000000eb060fa70ce6a3022fc33f0a34e07ea0f3b76dd9cfe581c2ab53d08cb65f5cd3aaeaf0b6206112b5c167e4e4032141b94d9a568b4810376f9cdfe35af1e85f66879058f722aa12f492fea4e4e6d8413a9c470c118bba022c5a"], 0x1) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000)=0x4, 0x4) ioprio_set$pid(0x0, r1, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x0, 0x5, 0x0, 0x1f, 0x1000, 0x6, 0x40, 0x7f]}) set_mempolicy(0x40000000007fff, &(0x7f0000000100)=0x3, 0x100000009) clone(0x2102001dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) 12:15:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)={0x4000009, 0xffffffff}) 12:15:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/route\x00') pipe2(&(0x7f0000000000), 0x4000) preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x0) 12:15:36 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x42) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x8000, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/igmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x80, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r4, 0x0) fstat(r2, &(0x7f00000000c0)) ioctl$sock_netdev_private(r4, 0x89f0, &(0x7f0000000240)="da23d089f7de4ee43ce8ad5295bb77ace405cd82a56ddcd6d3cd11f423b7838fa40ab6964248482b6f868d4ceb3efbf76d04d03727233a8a5c8568dcd9bccb93617cdb2d2513163429505b5442f45bb3424edd81bbfcd9ebf1a57cd8a36a1d0163d42d6aba4460d5eec563b17c074310f1a0c7309b0c21b2a8f7f4a8bba27c6cade62dfa4073171bf2a0e732557168970ce188f71a4fdb161643ac4ce99191342dd1fb") ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) 12:15:36 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0xfffffffffffffffb, &(0x7f0000000000)=""/149) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@nl=@unspec, 0x80, &(0x7f0000001280)=[{&(0x7f00000001c0)="a9", 0x1}], 0x1}, 0x20000810) 12:15:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)=0xffffffffffffffff) 12:15:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000001c0)={0x8, 0x4, [0x1e4]}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) setsockopt$inet_mreqn(r0, 0x0, 0x100000000000026, &(0x7f0000000140)={@multicast2, @local}, 0xc) 12:15:37 executing program 3: getsockopt$inet6_int(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000), &(0x7f0000000100)=0x4) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x183400, 0x0) getsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$FUSE_LSEEK(r0, &(0x7f0000000280)={0x18, 0xfffffffffffffffe, 0x3, {0x4}}, 0x18) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000140)) 12:15:37 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x42) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x8000, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/igmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x80, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r4, 0x0) fstat(r2, &(0x7f00000000c0)) ioctl$sock_netdev_private(r4, 0x89f0, &(0x7f0000000240)="da23d089f7de4ee43ce8ad5295bb77ace405cd82a56ddcd6d3cd11f423b7838fa40ab6964248482b6f868d4ceb3efbf76d04d03727233a8a5c8568dcd9bccb93617cdb2d2513163429505b5442f45bb3424edd81bbfcd9ebf1a57cd8a36a1d0163d42d6aba4460d5eec563b17c074310f1a0c7309b0c21b2a8f7f4a8bba27c6cade62dfa4073171bf2a0e732557168970ce188f71a4fdb161643ac4ce99191342dd1fb") ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) 12:15:37 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x42) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x8000, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/igmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x80, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r4, 0x0) fstat(r2, &(0x7f00000000c0)) ioctl$sock_netdev_private(r4, 0x89f0, &(0x7f0000000240)="da23d089f7de4ee43ce8ad5295bb77ace405cd82a56ddcd6d3cd11f423b7838fa40ab6964248482b6f868d4ceb3efbf76d04d03727233a8a5c8568dcd9bccb93617cdb2d2513163429505b5442f45bb3424edd81bbfcd9ebf1a57cd8a36a1d0163d42d6aba4460d5eec563b17c074310f1a0c7309b0c21b2a8f7f4a8bba27c6cade62dfa4073171bf2a0e732557168970ce188f71a4fdb161643ac4ce99191342dd1fb") ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) 12:15:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000240)={0x1, 0x0, [0x40000021, 0x100000000009]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:15:37 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x42) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x8000, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/igmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x80, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r4, 0x0) fstat(r2, &(0x7f00000000c0)) ioctl$sock_netdev_private(r4, 0x89f0, &(0x7f0000000240)="da23d089f7de4ee43ce8ad5295bb77ace405cd82a56ddcd6d3cd11f423b7838fa40ab6964248482b6f868d4ceb3efbf76d04d03727233a8a5c8568dcd9bccb93617cdb2d2513163429505b5442f45bb3424edd81bbfcd9ebf1a57cd8a36a1d0163d42d6aba4460d5eec563b17c074310f1a0c7309b0c21b2a8f7f4a8bba27c6cade62dfa4073171bf2a0e732557168970ce188f71a4fdb161643ac4ce99191342dd1fb") ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) 12:15:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/route\x00') pipe2(&(0x7f0000000000), 0x4000) preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x0) 12:15:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000c40)={0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000cc0)={'gre0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) io_setup(0x7, &(0x7f00000000c0)=0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x181682, 0x0) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0xf) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, 0x0, 0x9b}]) 12:15:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @broadcast}, 0x0, 0x4, 0x0, 0x2}}, 0x2e) read(r0, 0x0, 0x0) 12:15:37 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x42) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x8000, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/igmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x80, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r4, 0x0) fstat(r2, &(0x7f00000000c0)) ioctl$sock_netdev_private(r4, 0x89f0, &(0x7f0000000240)="da23d089f7de4ee43ce8ad5295bb77ace405cd82a56ddcd6d3cd11f423b7838fa40ab6964248482b6f868d4ceb3efbf76d04d03727233a8a5c8568dcd9bccb93617cdb2d2513163429505b5442f45bb3424edd81bbfcd9ebf1a57cd8a36a1d0163d42d6aba4460d5eec563b17c074310f1a0c7309b0c21b2a8f7f4a8bba27c6cade62dfa4073171bf2a0e732557168970ce188f71a4fdb161643ac4ce99191342dd1fb") ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) 12:15:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff080000130000000000009078ac1414bbac1414c40803907800000000450000000000000000000000ac1414aaac1414000000"], &(0x7f0000000000)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2100, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) 12:15:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000040)={0x18}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xf0ffff40000000}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) [ 156.678709][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 156.684998][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:15:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000280)=0x0) close(r0) socket$tipc(0x1e, 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 156.735430][ T8044] Unknown ioctl 28687 [ 156.744989][ T8046] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 12:15:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x30000, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1f) fchmod(r0, 0x0) [ 156.786088][ T8050] Unknown ioctl 28687 12:15:38 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x42) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x8000, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/igmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000300)) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x80, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r4, 0x0) fstat(r2, &(0x7f00000000c0)) ioctl$sock_netdev_private(r4, 0x89f0, &(0x7f0000000240)="da23d089f7de4ee43ce8ad5295bb77ace405cd82a56ddcd6d3cd11f423b7838fa40ab6964248482b6f868d4ceb3efbf76d04d03727233a8a5c8568dcd9bccb93617cdb2d2513163429505b5442f45bb3424edd81bbfcd9ebf1a57cd8a36a1d0163d42d6aba4460d5eec563b17c074310f1a0c7309b0c21b2a8f7f4a8bba27c6cade62dfa4073171bf2a0e732557168970ce188f71a4fdb161643ac4ce99191342dd1fb") ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) 12:15:38 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000100)={0x9, 0x3, 0x0, 0x6, 0xd4}) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x8000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x4}) 12:15:38 executing program 3: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x14) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="5c0701000000000400050023cab0c3989535af9aaed947e008e16952a49896aef671d3ff11163955dfcf5a39fd82f44ae81bf3a244b0e98ad329a41008415b6d7920933f6d460a4f05ca336d35397709dfaf9989a93b229c2242830875f9398e978b48af9104c70346d9ae2c1d62e6581444c5e75ffdd55d8fcc48653e67140383f26a10b397a98cf842be922e6e0dbd3ddbe74792391c3eda132e4a0ea5bfa2a51e8b35f6282443a9dc0e007a237771ac8b6e36770a8db93a98e9a9e102d9a3ea12f49c68795e64685c68090a57a591987f3b426fb7822d54e0265ebfdb8657ea552a98909be84f057bb40fdbe9e2a314b77aea9ea509266d7de767"], &(0x7f0000000080)=0x1a) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x8, 0x7f}, 0x8) rmdir(&(0x7f0000000040)='./file0\x00') unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x0) 12:15:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) dup(r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x2000, 0x3) socket$xdp(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000440)={0x9b, {{0xa, 0x0, 0x4, @mcast2, 0x7}}, {{0xa, 0x4e20, 0xd0c, @rand_addr="294aea6cb59b6fc0a9cac25bab337e43", 0x8}}}, 0x108) setsockopt(r3, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="1184332a62d14aac1ab8d07e20487e4bca35576c7ccf09209bf795551bab3f2bc45e06dba29d414f41f43c66bb72e7c1b443fb79e14bfc094477d41d125adad91670b8c7646a5ba8ca1eed1376a33c6b456c7e6389b82715d50bd61708f57b0097a98bbe5e9671bb0bd6b0e4ba403fca1bc333970f4975cb8040974a36da8a8bb1a53fac8766c67d2d03841627ac219eb126bc899a553a6ff35bbf3d2c7866e956a2f675d1ad7986fe2ee7c0c780aa87a2e60cf3a6adbf162fe28cffce54c3a95783b98db677fa0433752cc1f9f806f92d4c94e8dd", 0xd5) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000600)={0x0, 0x6}, 0x8) r4 = dup3(0xffffffffffffffff, r3, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xd}, 0x7cb674b2}}, 0x3ff, 0xcb52, 0x7, 0x0, 0x10}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000380)=r6, 0xffffffffffffff9b) r7 = getegid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) write$P9_RSTATu(r2, &(0x7f00000026c0)=ANY=[@ANYBLOB="610000007d010000004c00c30b03000000000300000001000000000000000000090000000000000000000500000000000000000004006574683000001500747275737465646367726f75706e6f646576403a5d000066668dc76dbb4dcd69ede60385af76dac2cafb45be6cda7e96ca33082f845bf336bb6aa8365a2fba2555fa463988a978fd0d37c5c62f044098d58f125ef4f3a7cdfc87c4b861b49bff17bf8c4e463fb56b4d4ad8b1156c377636a53a428a404f3f0b9301d5db00f85e318f84a9a80518b535cd896a5b1c9f5acf71ea7915da4f0ed4c20a6848e4290e98f7b80aeee2c054c2f2432c314b5b593c03be4ef6247f3b65122896722aab1a02cb3f971acce4b63349dcd772", @ANYRES32=r5, @ANYRES32=r7, @ANYRES32], 0x117) fadvise64(r1, 0x0, 0x0, 0x0) unshare(0x40000000) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f00000003c0)={@multicast1, @dev}, &(0x7f0000000400)=0xc) bind$netlink(r0, &(0x7f0000000000)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r0, 0x10e, 0x8000000009, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x1c) 12:15:38 executing program 2: rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) mq_notify(r1, &(0x7f0000000280)={0x0, 0x17, 0x4, @tid=r2}) 12:15:38 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x83, 0x8400) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000640)={'eql\x00', &(0x7f0000000780)=@ethtool_drvinfo={0x3, "32ff5930ba57b2620a244ab458b54adc8137d9dc1e03360313ecd6201f4572d5", "976027343f4af1e2f6e8740845405c95aab7580d359b63132f6e5019123dd5d9", "a3b2e014a6a1c529c7e0ecef3a7adc033814483d0b93a4c653642fe3da4724b7", "095c18d123ae9a0ac6333d0951537c1da6ec393f871e3b273803adfd1a7133b2", "80f52a29c8d5f27123da97230067cea1007fc5294ace4e85c25ca14e77074ea3", "7c182bf11eb904c044599c64", 0x7, 0x7ded, 0x8, 0x80, 0x2}}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000500)=0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x5, 0x100000001, 0x8, 0x800, 0x0, 0x800, 0x10808, 0x8, 0x7, 0x7, 0xfa, 0x0, 0x20, 0x12, 0x1ff, 0x3, 0x6, 0xb7fc, 0xe66, 0x1, 0xffffffffffffde0c, 0x19680000, 0x1f, 0x100, 0x8, 0x6, 0x5, 0x100, 0x3, 0x7, 0x1000, 0x3f, 0xfffffffffffffff9, 0x2, 0x800, 0x4, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000440), 0x3}, 0x1, 0xffff, 0x7f, 0x6, 0x990, 0x4, 0x1}, r1, 0x0, r0, 0x2) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x7fffffff, {{0x2, 0x4000000004e23, @multicast2}}}, 0x84) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000540)) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001a257da280a65db44231bbb1c7a301956bca7b4c011d0449d7757a5ba088beb9fa007c7d", @ANYRES16=r3, @ANYBLOB="0087560a6477a0e1a4d608b78010"], 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x40000) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000240)={{0x2, @addr=0x1}, 0x8, 0x5, 0x9}) setsockopt$inet6_int(r2, 0x29, 0xd0, &(0x7f00000000c0), 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000001c0)={'v\x00\b\x00\x00\x00\x00\x00\x00\xfd\xff\x00', {0x2, 0x4e24, @loopback}}) r4 = getpgid(0x0) r5 = getpgid(r4) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000080)=r5) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000003c0)='tIPCv2\x00') [ 157.165531][ T8069] IPVS: ftp: loaded support on port[0] = 21 12:15:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000100)=0x15, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6c50400aeb995298992ea5400c2", 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002240)={0x0, 0x0, &(0x7f0000002200)={&(0x7f0000001e40)={0x14}, 0x20001e54}}, 0x0) 12:15:38 executing program 4: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x200000000114, 0x271a, &(0x7f00000000c0)=""/1, &(0x7f0000000080)) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000)=0xd92, 0x4) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v2={0x3, 0x2, 0x13, 0x8, 0x3a, "beaf30677f0c4e3ee7f46cea7b70a1e4f947404504a261d9d18e2d62db24c7dad05a32c208c1f6b590aa09c542a1ceeb95e8ccf4448f57ee31ae"}, 0x44, 0x2) 12:15:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in, 0x0, 0x558e, 0x0, "ed28df49bee4c58c52f8830854145bbd028ccb2f5a26b88c72c4a90defc65c0d62354d30514f8d19c718485594db170f9a8158850c7dd4e810157ce594813516c2ede753df01b9bc97e19d786d251f11"}, 0xd8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x500, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000040)={{{@in=@remote, @in6=@remote}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) 12:15:38 executing program 4: lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "1f491a254e9e1154c057918758c98ebe51c2"}, 0x13, 0x3) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060007001900154014000001d40000dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x103502, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000001c0)={0x320, @time={0x0, 0x1c9c380}, 0xffffffffffff8076, {0x6, 0x7}, 0x800, 0x2, 0x1ff}) 12:15:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x80, 0x0}}], 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4, 0x2, @empty, 0x5}, 0xf) socketpair(0x1f, 0x0, 0x10001, &(0x7f0000000080)) 12:15:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000100)=0x15, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6c50400aeb995298992ea5400c2", 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002240)={0x0, 0x0, &(0x7f0000002200)={&(0x7f0000001e40)={0x14}, 0x20001e54}}, 0x0) 12:15:38 executing program 2: rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) mq_notify(r1, &(0x7f0000000280)={0x0, 0x17, 0x4, @tid=r2}) 12:15:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00\x86o\x9br\xcc&p:4\x96\x1dn\x17B\x00\xbccT\x8c\f2b\xd8\x80\xf8\x19\tq>\x95\x04\xd2io\t\xbb\x14\xd5o\xa8\x92\t\xe2\x9a\x9d\x8e\xb4\xc8l\x99=\x9acU)\xae\x8f0x0}, &(0x7f0000000180)=0xc) ptrace$setsig(0x4203, r2, 0x1df, &(0x7f00000001c0)={0x1d, 0x77c7, 0x5}) r3 = dup(r1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) [ 157.801564][ T8121] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 157.832208][ T8121] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 157.903096][ T8124] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 157.936230][ T8124] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 158.014793][ T8079] IPVS: ftp: loaded support on port[0] = 21 12:15:41 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, 0x0) 12:15:41 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000500)={0x0, {0x0, 0x0, 0x0, 0x1ff, 0x6}}) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@hci, &(0x7f0000000100)=0x80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000240)={0xa, 0x4e20, 0x3, @empty, 0x7}, 0x10b) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000340)='lp\x00', 0x3) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0xb84) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r3 = gettid() ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000280)={0x8, 0x0, 0x2017, 0x4, 0x7ff, {0x800, 0x7}}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) fsetxattr$security_smack_entry(r0, &(0x7f00000002c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='lp\x00', 0x3, 0x3) syz_emit_ethernet(0x65, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00102c00fe8000000000000040000000000000aa72b3fe540000000000000000000000aa2c000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 12:15:41 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x43, &(0x7f0000000040)=0x1, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 12:15:41 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0xb5b5, 0xec]) 12:15:41 executing program 3: eventfd2(0x3, 0x80800) r0 = eventfd2(0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000340)={'filter\x00'}, &(0x7f0000000440)=0x24) writev(r0, &(0x7f0000000340), 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 12:15:41 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001080)='/dev/hwrng\x00', 0x100, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) getsockopt$inet6_buf(r1, 0x29, 0x20, &(0x7f0000000100)=""/9, &(0x7f0000000180)=0x9) readlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/224, 0xe0) r2 = socket$inet6(0xa, 0x6, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x4800) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x20000, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000580)=[@text16={0x10, &(0x7f0000000540)="660f380408ea0b90190166b9ae0200000f3266b9fb0b00000f32b884000f00d0260f22e30fd10600000f1f00ffb34ce5c18c003800", 0x35}], 0x1, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000440)=@known='trusted.overlay.redirect\x00') connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) setsockopt$inet6_int(r5, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)={r0}) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000080)) socketpair(0x1, 0x6, 0x1, &(0x7f0000000480)) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xc0ffffff00000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) r6 = dup2(r2, r1) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) 12:15:41 executing program 4: unshare(0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x404, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1000}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x4040010) futex(0x0, 0x0, 0x100002, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r3, &(0x7f0000000140)={0x1d, r4}, 0x10) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r5 = socket$pptp(0x18, 0x1, 0x2) setsockopt(r3, 0x65, 0x1, &(0x7f0000000080), 0x1d0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) close(r3) dup(r2) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000380)=""/8, &(0x7f0000000180)=0x1) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4004081) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'ve\xfa\xfd\x00\x00\x00\x001\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000040)={0x1000, 0x2, @value=0x3}) 12:15:41 executing program 3: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r0 = socket$kcm(0x2, 0x1, 0x84) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000001c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001380)="f1", 0x1}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 12:15:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xd8, 0x0, &(0x7f0000000040)=0xffffff70) 12:15:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x2, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x40) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000100)={0x7, 0x100, 0x6, {0x80000001, 0x1a7, 0xe29, 0x6}}) [ 160.228928][ C0] ================================================================== [ 160.237958][ C0] BUG: KASAN: use-after-free in ccid_hc_tx_delete+0xde/0x100 [ 160.237976][ C0] Read of size 8 at addr ffff888089bff640 by task ksoftirqd/0/9 [ 160.237979][ C0] [ 160.237993][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.0.0+ #21 [ 160.238018][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.238022][ C0] Call Trace: [ 160.238040][ C0] dump_stack+0x172/0x1f0 [ 160.238052][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 160.238069][ C0] print_address_description.cold+0x7c/0x20d [ 160.238079][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 160.238091][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 160.238108][ C0] kasan_report.cold+0x1b/0x40 [ 160.238119][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 160.238134][ C0] __asan_report_load8_noabort+0x14/0x20 [ 160.238145][ C0] ccid_hc_tx_delete+0xde/0x100 [ 160.238160][ C0] dccp_sk_destruct+0x3f/0x90 [ 160.238172][ C0] ? dccp_init_sock+0x3f0/0x3f0 [ 160.238188][ C0] __sk_destruct+0x55/0x6d0 [ 160.238202][ C0] ? proto_unregister+0x4e0/0x4e0 [ 160.238219][ C0] rcu_core+0x928/0x1390 [ 160.238240][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 160.238255][ C0] ? sched_clock+0x2e/0x50 [ 160.238280][ C0] __do_softirq+0x266/0x95a [ 160.238295][ C0] ? __sched_text_start+0x8/0x8 [ 160.238320][ C0] ? takeover_tasklets+0x7b0/0x7b0 [ 160.238333][ C0] run_ksoftirqd+0x8e/0x110 [ 160.238346][ C0] smpboot_thread_fn+0x6ab/0xa10 [ 160.238362][ C0] ? sort_range+0x30/0x30 [ 160.238378][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 160.238392][ C0] ? __kthread_parkme+0xfb/0x1b0 [ 160.238409][ C0] kthread+0x357/0x430 [ 160.238420][ C0] ? sort_range+0x30/0x30 [ 160.238434][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 160.238452][ C0] ret_from_fork+0x3a/0x50 [ 160.238471][ C0] [ 160.238478][ C0] Allocated by task 8152: [ 160.238493][ C0] save_stack+0x45/0xd0 [ 160.238506][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 160.238518][ C0] kasan_slab_alloc+0xf/0x20 [ 160.238529][ C0] kmem_cache_alloc+0x11a/0x6f0 [ 160.238540][ C0] ccid_new+0x256/0x3f0 [ 160.238551][ C0] dccp_hdlr_ccid+0x27/0x150 [ 160.238563][ C0] __dccp_feat_activate+0x17a/0x270 [ 160.238575][ C0] dccp_feat_activate_values+0x33a/0x766 [ 160.238587][ C0] dccp_rcv_state_process+0x116f/0x1935 [ 160.238599][ C0] dccp_v6_do_rcv+0x269/0xbf0 [ 160.238609][ C0] __release_sock+0x12e/0x3a0 [ 160.238619][ C0] release_sock+0x59/0x1c0 [ 160.238634][ C0] __inet_stream_connect+0x59f/0xea0 [ 160.238646][ C0] inet_stream_connect+0x58/0xa0 [ 160.238657][ C0] __sys_connect+0x266/0x330 [ 160.238668][ C0] __ia32_sys_connect+0x72/0xb0 [ 160.238684][ C0] do_fast_syscall_32+0x281/0xc98 [ 160.238695][ C0] entry_SYSENTER_compat+0x70/0x7f [ 160.238699][ C0] [ 160.238705][ C0] Freed by task 8152: [ 160.238717][ C0] save_stack+0x45/0xd0 [ 160.238729][ C0] __kasan_slab_free+0x102/0x150 [ 160.238742][ C0] kasan_slab_free+0xe/0x10 [ 160.238754][ C0] kmem_cache_free+0x86/0x260 [ 160.238764][ C0] ccid_hc_tx_delete+0xc1/0x100 [ 160.238775][ C0] dccp_hdlr_ccid+0x7d/0x150 [ 160.238787][ C0] __dccp_feat_activate+0x17a/0x270 [ 160.238799][ C0] dccp_feat_activate_values+0x33a/0x766 [ 160.238811][ C0] dccp_create_openreq_child+0x40c/0x570 [ 160.238823][ C0] dccp_v6_request_recv_sock+0x214/0x1da0 [ 160.238834][ C0] dccp_check_req+0x35c/0x6f0 [ 160.238845][ C0] dccp_v6_rcv+0x6d7/0x191e [ 160.238860][ C0] ip6_protocol_deliver_rcu+0x303/0x16c0 [ 160.238872][ C0] ip6_input_finish+0x84/0x170 [ 160.238882][ C0] ip6_input+0xe4/0x3f0 [ 160.238893][ C0] ip6_rcv_finish+0x1e7/0x320 [ 160.238904][ C0] ipv6_rcv+0x10e/0x420 [ 160.238918][ C0] __netif_receive_skb_one_core+0x115/0x1a0 [ 160.238930][ C0] __netif_receive_skb+0x2c/0x1c0 [ 160.238943][ C0] process_backlog+0x206/0x750 [ 160.238956][ C0] net_rx_action+0x4fa/0x1070 [ 160.238967][ C0] __do_softirq+0x266/0x95a [ 160.238971][ C0] [ 160.238981][ C0] The buggy address belongs to the object at ffff888089bff640 [ 160.238981][ C0] which belongs to the cache ccid2_hc_tx_sock of size 1240 [ 160.238992][ C0] The buggy address is located 0 bytes inside of [ 160.238992][ C0] 1240-byte region [ffff888089bff640, ffff888089bffb18) [ 160.239007][ C0] The buggy address belongs to the page: [ 160.239024][ C0] page:ffffea000226ff80 count:1 mapcount:0 mapping:ffff88821697a780 index:0x0 compound_mapcount: 0 [ 160.239039][ C0] flags: 0x1fffc0000010200(slab|head) [ 160.239059][ C0] raw: 01fffc0000010200 ffff88809ac11b48 ffff88809ac11b48 ffff88821697a780 [ 160.239074][ C0] raw: 0000000000000000 ffff888089bfe040 0000000100000005 0000000000000000 [ 160.239079][ C0] page dumped because: kasan: bad access detected [ 160.239083][ C0] [ 160.239087][ C0] Memory state around the buggy address: [ 160.239098][ C0] ffff888089bff500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 160.239108][ C0] ffff888089bff580: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 160.239118][ C0] >ffff888089bff600: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 160.239123][ C0] ^ [ 160.239134][ C0] ffff888089bff680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 160.239144][ C0] ffff888089bff700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 160.239148][ C0] ================================================================== [ 160.239153][ C0] Disabling lock debugging due to kernel taint [ 160.239194][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 160.239207][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.0.0+ #21 [ 160.239214][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.239217][ C0] Call Trace: [ 160.239230][ C0] dump_stack+0x172/0x1f0 [ 160.239248][ C0] panic+0x2cb/0x65c [ 160.239261][ C0] ? __warn_printk+0xf3/0xf3 [ 160.239273][ C0] ? retint_kernel+0x2d/0x2d [ 160.239290][ C0] ? trace_hardirqs_on+0x5e/0x230 [ 160.239303][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 160.239314][ C0] end_report+0x47/0x4f [ 160.239324][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 160.239335][ C0] kasan_report.cold+0xe/0x40 [ 160.239348][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 160.239361][ C0] __asan_report_load8_noabort+0x14/0x20 [ 160.239373][ C0] ccid_hc_tx_delete+0xde/0x100 [ 160.239387][ C0] dccp_sk_destruct+0x3f/0x90 [ 160.239399][ C0] ? dccp_init_sock+0x3f0/0x3f0 [ 160.239412][ C0] __sk_destruct+0x55/0x6d0 [ 160.239424][ C0] ? proto_unregister+0x4e0/0x4e0 [ 160.239437][ C0] rcu_core+0x928/0x1390 [ 160.239454][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 160.239465][ C0] ? sched_clock+0x2e/0x50 [ 160.239482][ C0] __do_softirq+0x266/0x95a [ 160.239493][ C0] ? __sched_text_start+0x8/0x8 [ 160.239510][ C0] ? takeover_tasklets+0x7b0/0x7b0 [ 160.239520][ C0] run_ksoftirqd+0x8e/0x110 [ 160.239528][ C0] smpboot_thread_fn+0x6ab/0xa10 [ 160.239538][ C0] ? sort_range+0x30/0x30 [ 160.239547][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 160.239556][ C0] ? __kthread_parkme+0xfb/0x1b0 [ 160.239566][ C0] kthread+0x357/0x430 [ 160.239574][ C0] ? sort_range+0x30/0x30 [ 160.239586][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 160.239600][ C0] ret_from_fork+0x3a/0x50 [ 160.240639][ C0] Kernel Offset: disabled [ 160.946662][ C0] Rebooting in 86400 seconds..