[info] Using makefile-style concurrent boot in runlevel 2. [ 24.665437] audit: type=1800 audit(1539861789.397:21): pid=5221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.31' (ECDSA) to the list of known hosts. 2018/10/18 11:23:31 fuzzer started 2018/10/18 11:23:33 dialing manager at 10.128.0.26:33253 2018/10/18 11:23:33 syscalls: 1 2018/10/18 11:23:33 code coverage: enabled 2018/10/18 11:23:33 comparison tracing: enabled 2018/10/18 11:23:33 setuid sandbox: enabled 2018/10/18 11:23:33 namespace sandbox: enabled 2018/10/18 11:23:33 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/18 11:23:33 fault injection: enabled 2018/10/18 11:23:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/18 11:23:33 net packed injection: enabled 2018/10/18 11:23:33 net device setup: enabled 11:26:05 executing program 0: syz_open_dev$amidi(&(0x7f0000000a40)='/dev/amidi#\x00', 0x2000000, 0xc241) syzkaller login: [ 201.107293] IPVS: ftp: loaded support on port[0] = 21 11:26:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$key(r1, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x2, 0x2c}, 0x3a8}}, 0x0) [ 201.399392] IPVS: ftp: loaded support on port[0] = 21 11:26:06 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x868c0e7f12629e2b) [ 201.626471] IPVS: ftp: loaded support on port[0] = 21 11:26:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) [ 202.106244] IPVS: ftp: loaded support on port[0] = 21 11:26:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) [ 202.512769] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.550005] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.570468] device bridge_slave_0 entered promiscuous mode [ 202.718232] IPVS: ftp: loaded support on port[0] = 21 [ 202.736741] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.748995] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.780385] device bridge_slave_1 entered promiscuous mode [ 202.889619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:26:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000800)) [ 203.070515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.207375] IPVS: ftp: loaded support on port[0] = 21 [ 203.517772] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.531748] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.539814] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.547266] device bridge_slave_0 entered promiscuous mode [ 203.642968] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.674673] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.698810] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.707136] device bridge_slave_1 entered promiscuous mode [ 203.722844] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.743559] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.751235] device bridge_slave_0 entered promiscuous mode [ 203.813995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.867464] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.896973] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.904761] device bridge_slave_1 entered promiscuous mode [ 203.932385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.027551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.156131] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.269335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.278758] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.305382] team0: Port device team_slave_0 added [ 204.337836] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.359631] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.389175] device bridge_slave_0 entered promiscuous mode [ 204.403384] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.423999] team0: Port device team_slave_1 added [ 204.443917] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.502789] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.515702] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.525442] device bridge_slave_1 entered promiscuous mode [ 204.619073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.666542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.695763] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.738218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.815253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.846077] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.876731] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.905583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.925972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.013127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.021474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.037762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.055580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.099023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.111011] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.117384] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.124947] device bridge_slave_0 entered promiscuous mode [ 205.154454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.179758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.198411] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.229997] team0: Port device team_slave_0 added [ 205.245502] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.282266] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.288714] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.310474] device bridge_slave_1 entered promiscuous mode [ 205.354518] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.373689] team0: Port device team_slave_1 added [ 205.384171] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.418992] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.426292] device bridge_slave_0 entered promiscuous mode [ 205.436125] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.452905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.479214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.493299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.519983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.554505] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.571872] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.586431] device bridge_slave_1 entered promiscuous mode [ 205.594957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.607473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.619774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.650036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.672091] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.679852] team0: Port device team_slave_0 added [ 205.701841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.738500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.759538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.769461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.820408] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.833963] team0: Port device team_slave_1 added [ 205.861142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.881248] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.901555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.920220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.990709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.074800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.088209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.100272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.126757] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.170864] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.178224] team0: Port device team_slave_0 added [ 206.219717] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.256814] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.277743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.295255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.309800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.326309] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.337873] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.354598] team0: Port device team_slave_1 added [ 206.370285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.379561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.400517] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.427770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 206.444242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.516367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.534520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.550235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.561314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 206.571446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 206.579038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.599312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.617953] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.624487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.631435] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.637796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.651761] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.665556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.680443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.699126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.807481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.824307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.834526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.969167] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.976315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.985432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.049082] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.057668] team0: Port device team_slave_0 added [ 207.072285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.175359] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.199640] team0: Port device team_slave_0 added [ 207.207638] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.219951] team0: Port device team_slave_1 added [ 207.302196] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.309701] team0: Port device team_slave_1 added [ 207.358403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.376086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.390003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.409547] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.415910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.422610] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.429010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.464360] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.474298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.507040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.522306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.532364] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.559527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.568518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.603101] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.618316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.635459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.670802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.690163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.698197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.725733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.749713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.757675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.830627] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.839145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.847539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.865550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.879612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.887572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.042092] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.048478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.055202] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.061598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.087162] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.101082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.112322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.594204] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.600634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.607299] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.613731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.645133] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.117338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.266496] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.272944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.279646] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.286008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.333445] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.345383] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.351788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.358465] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.364889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.372595] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.189290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.196540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.869493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.319531] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.656681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.807560] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.819918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.835836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.962068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.109871] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.265694] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.451034] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.602597] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.609542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.619568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.774018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.950132] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.956306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.974745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.229539] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.238533] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.282700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.350823] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.671615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.728161] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.738317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.753536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.784541] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.109923] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.171082] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.255746] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.288940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.309324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.590001] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.596155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.610273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.650634] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.036206] 8021q: adding VLAN 0 to HW filter on device team0 11:26:21 executing program 0: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/dev_mcast\x00') read(r0, &(0x7f0000000380)=""/230, 0xffffffffffffffd2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)=',') 11:26:21 executing program 0: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/dev_mcast\x00') read(r0, &(0x7f0000000380)=""/230, 0xffffffffffffffd2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)=',') 11:26:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 216.700935] hrtimer: interrupt took 51044 ns 11:26:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYBLOB="78d0ade3c90400000054db5f9a17004acf9bd1aa1506000000d6cc943e87aed522b0bbbf2a41763c0b2a1a708382e84d00"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000280)={@loopback, 0x2c, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8936, &(0x7f00000000c0)={@remote, 0x75, r3}) clock_nanosleep(0x6, 0x1, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f0000000380)) r4 = socket$l2tp(0x18, 0x1, 0x1) semget(0x0, 0x3, 0x30) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3f000000]}, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r3}) r5 = semget$private(0x0, 0x2, 0x10a) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000640)) fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000840)={{0x3ff, r2, r6, r2, r7, 0x40, 0x34c5}, 0x6, 0x9, 0xfff}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) semget$private(0x0, 0x3, 0x400) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r8, 0x5382, &(0x7f0000000480)) getsockopt$bt_BT_CHANNEL_POLICY(r8, 0x112, 0xa, &(0x7f0000000680), &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r9, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0x1ff}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r8, 0x84, 0x11, &(0x7f0000000440)={r10, 0x2}, &(0x7f00000005c0)=0x8) sendto$inet6(r9, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 11:26:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x8, 0x10, r0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x200) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xba77, 0x81) creat(&(0x7f0000000340)='./control\x00', 0x182) getsockopt$packet_int(r2, 0x107, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = creat(&(0x7f0000001140)='./file0\x00', 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000380)) mmap$binder(&(0x7f0000010000/0x1000)=nil, 0x1000, 0x2000000, 0x813, r3, 0x8) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000380), 0x2) sendto$inet6(r1, &(0x7f00000001c0)="e41a0029561ae7629289edfde41001f18295b46b36ca006335b72d93f3d9f39ab19583e9a4218c8007186d41a9d71b60198fd7ebac3a0676b4d03264a912114b9e31da721ec932cabd489be3e90a2d22c27359d8d68032c250de076807493b7b92d82d04424b3ab5", 0x68, 0x8040, &(0x7f0000000040)={0xa, 0x4e24, 0x6, @mcast1, 0x9}, 0x1c) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0xc000, 0x1000}, 0x18) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000180), 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000300)={0x2c, 0xfffffffffffffffe, 0x0, 0x0, r3}, 0x10) 11:26:22 executing program 2: r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x2c2, @tick=0x100, 0xffffffffffffd38b, {0x0, 0x2}, 0x5, 0x0, 0x1e650679}) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0xfffffffffffffffe, @tick=0x1, {}, {}, @time=@time}], 0x30) tee(r0, r0, 0x0, 0xa) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000100)={0x800000000016, @time={0x0, 0x989680}}) 11:26:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0xe) write$nbd(r0, &(0x7f0000000f80)={0x67446698, 0x1, 0x4, 0x4, 0x1, "eeca37a84fbc089a434e0a9f0dc89297ef3cfb6d4ff522b6b7e987ca5041bd686339968013fc7490432f3ec149a8afee944996645c15c61326a0f9534f3c001c3eab8e56d018338fdbb310a2cdb8e7a40275c5b1db51ccc1eb0d74876b6795ba14f75bcd1c6b"}, 0x76) r1 = socket$kcm(0x10, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000014c0)={@loopback, @empty, 0x0}, &(0x7f0000001500)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001540)={'team0\x00', r2}) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000001000)={"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"}) recvmsg$kcm(r1, &(0x7f0000001740)={&(0x7f0000001600)=@sco, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/201, 0xc9}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x2, &(0x7f0000001700)=""/62, 0x3e}, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1, &(0x7f0000000000)}, 0x0) 11:26:22 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000080000002) 11:26:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x5, 0x1, 0x0, r0}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0xf4, &(0x7f0000000280)=""/244}, 0x15) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80000) 11:26:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)) r0 = epoll_create1(0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x10000009}) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xe6f55ebf2d66568b, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x2000, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x14f042, 0x0) close(r2) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)=0x5) 11:26:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x0, 0x0, 0x3fd) sendfile(r1, r2, &(0x7f00007ed000), 0x2) 11:26:23 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x80, 0x80800) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) fcntl$addseals(r1, 0x409, 0x2) r2 = dup3(r1, r1, 0x80000) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000280)={0x8, 0x47ce, 0x1000, 0x80000000}, 0x8) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f00000002c0)) sendto(r4, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000003c0)=@nl, 0x80) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000200), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000020007f9d0000000000000000020000000000000000000000100000000c001400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x34}}, 0x0) 11:26:23 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x300, 0x43) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x45) accept4(r2, 0x0, &(0x7f0000000200), 0x0) sendmmsg(r0, &(0x7f0000000180), 0x235, 0x10) 11:26:23 executing program 3: r0 = socket$inet6(0xa, 0x800000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0xffffffff}, &(0x7f0000000200)=0x8) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', @ifru_settings={0x705000, 0x0, @sync=&(0x7f0000000040)}}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0x8, 0x31, 0x1, 0x0, 0x8, 0x2, 0x4, 0x0, 0x1f, 0x5}) 11:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280)="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", 0x121, 0xfffffffffffffffe) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/74, 0x4a) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x10000, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x7fffffff, 0x1, 0x7, 0x1000000000}, {0x20, 0x6, 0xfffffffffffffffa, 0xf4e7}, {0x3, 0x0, 0x8, 0x6}]}) keyctl$dh_compute(0x17, &(0x7f0000000540)={r1, r0, r1}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00'}, &(0x7f0000000180)}) 11:26:23 executing program 4: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x7f}, 0x1c) [ 218.290542] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:26:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') signalfd(r0, &(0x7f0000000240)={0x7}, 0xfffffffffffffd60) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000480)) unshare(0x60000) write$P9_RREADLINK(r0, &(0x7f0000000cc0)={0x18, 0x17, 0x2, {0xf, './control/file0'}}, 0x18) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000007c0)=@security={'security\x00', 0xe, 0x4, 0x450, 0x278, 0x0, 0x158, 0x0, 0x0, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f00000003c0), {[{{@uncond, 0x0, 0x110, 0x158, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x3}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x621543a9, 0x2, 0x0, 0x2}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'vlan0\x00', 0x2e}}}, {{@ip={@multicast1, @multicast2, 0x0, 0xffffffff, 'veth0_to_team\x00', 'vcan0\x00', {0xff}, {}, 0x7d, 0x3, 0x1}, 0x0, 0xe0, 0x120, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x7fffffff}}, @common=@socket0={0x20, 'socket\x00'}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xffffffffffffffff, 0x28, "dd2f4115cd80337e495c7fdb0854deee591ba42bee5d3d63521eaf73cd81"}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x200, 0x3, 0x1, 0x2}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0xa08, 0xcb, 0x0, 0x1}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0xa, 0x2, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b0) mount(&(0x7f000000a000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='btrfs\x00', 0x2018000, &(0x7f0000000d80)) chdir(&(0x7f0000000000)='./file0\x00') r1 = creat(&(0x7f0000000640)='./bus\x00', 0x10000) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0xc543}, &(0x7f0000000300)=0x8) ptrace$setregs(0xffffffffffffffff, 0x0, 0x6, &(0x7f00000004c0)="812da184711a4e6bd7eaeb537fc9b3bff33629598e016bd17e303aead9ac077de8ba1fd1e3d33e7f6742b5c171cd07ec83f67964e5f7f90dc1c5b83bda658414091d69c5f57e2071e7765ed1ce1ffb14035d6ca64f8e427920669a05d3782c7e158f8a5c406541efaebc3b7f9b1ed9ad83dca7469f66b38b220e40b89839555b9c960e286f459987a74ff78d09e04b38bf0f43179b68051cf0c0ecdfc4fb6d369748d17f124de01307efc8110175e258e94b0619b649516c1c75602157aff23d9be87a4f59d7703cc9da7ad7b38e603249ab9c138a795010e738f4f7fc0ee6b8ca57bd2450767a836807e899623f82537620df75") setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r3, 0xffffffff, 0x4, [0x3, 0x2, 0x80000001, 0x7]}, 0x10) accept$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000c80)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=@delqdisc={0x6c, 0x25, 0x400, 0x70bd29, 0x25dfdbfe, {0x0, r4, {0xf, 0xf}, {0x10, 0xa}, {0xfff2, 0xffff}}, [@TCA_RATE={0x8, 0x5, {0x4, 0x3f}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7ff}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x100}, @TCA_RATE={0x8, 0x5, {0xec, 0xfff}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x3}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xc6}, @TCA_RATE={0x8, 0x5, {0x6, 0x3ff}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x2}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x101}]}, 0x6c}}, 0x40) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) open$dir(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000080)={r3, 0x3}, 0x8) r6 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="8268004bff6c61"], &(0x7f0000000380)='./control/file0\x00', &(0x7f0000000140)='sysv\x00', 0x1000, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000d00)={0x0, 0x0}) write$sndseq(r2, &(0x7f0000000d40)=[{0xffff, 0x8001, 0x100, 0xca20, @time={0x77359400}, {0x401, 0x70}, {0xffffffffffff0004, 0x10000}, @time=@time={r7, r8+10000000}}], 0xffffffffffffffdb) ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f0000000100)={0x0, 0x0, 0x5, 0x7fffffff, 0x0, 0x9}) write$P9_RLINK(r2, &(0x7f0000000200)={0x2b0, 0x47, 0x2}, 0x0) 11:26:23 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="4300000036c46f0100380000004a42d6a74bd560f471df53ea658a80c30735000000000060a105dc8eb30b5db1383112131652b161666953a36b0b1922f8402ea0c9deac6dc8cb158b351b3b000000000000000000000000000000000000000000b7ca958db0be808999d4d5b6ab85b6bb"], 0x71) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x2040, 0x0) write$P9_RATTACH(r3, &(0x7f0000000440)={0x14, 0x69, 0x2, {0x8, 0x4, 0x8}}, 0x14) r4 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='nr0\x00', 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r4, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=@md5={0x1, "3a49e291e333836f9395e25841b8044c"}, 0x11, 0x2) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x7fffffff, 0x83b}}, 0x30) fcntl$setlease(r2, 0x400, 0x0) 11:26:23 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) fchmod(r0, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) listen(r4, 0xffffffffffffff7f) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0xe9, 0x4004001, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0xae) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) r5 = memfd_create(&(0x7f0000000400)='\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(r5, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UI_SET_SWBIT(r0, 0xc0105512, 0x0) 11:26:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x3}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 11:26:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$vcsn(&(0x7f0000002680)='/dev/vcs#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={"0200"}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) ioctl$BLKRRPART(r1, 0x125f, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000000)={0x7, 0x9, 0x1, {}, 0x6, 0xffffffffffffbd2b}) 11:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280)="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", 0x121, 0xfffffffffffffffe) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/74, 0x4a) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x10000, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x7fffffff, 0x1, 0x7, 0x1000000000}, {0x20, 0x6, 0xfffffffffffffffa, 0xf4e7}, {0x3, 0x0, 0x8, 0x6}]}) keyctl$dh_compute(0x17, &(0x7f0000000540)={r1, r0, r1}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00'}, &(0x7f0000000180)}) 11:26:23 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001140)='/dev/snd/pcmC#D#c\x00', 0x100000001, 0x800) write$FUSE_INIT(r0, &(0x7f0000001180)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x4, 0x0, 0x80000000, 0x7f, 0x4f7, 0x2}}, 0x50) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000001580)={{0xa, 0x4e22, 0x5, @empty, 0x1}, {0xa, 0x4e23, 0x6, @remote}, 0x3a, [0xadf, 0x6, 0x6, 0x7, 0x6, 0x3, 0x9, 0x7fffffff]}, 0x5c) recvfrom$inet6(r0, &(0x7f0000001200)=""/40, 0x28, 0x2, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x1ff, 0x0, 0x402, 0x0, 0x3553800000, 0x7f}) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000000100", 0x208800}) read(r2, &(0x7f0000000140)=""/4096, 0x1000) r3 = gettid() ptrace$getregs(0xe, r3, 0x81, &(0x7f0000001600)=""/99) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000001240)=0x6) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) openat$cgroup_procs(r0, &(0x7f0000001440)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000001300)={0x0, 0x6c, &(0x7f0000001280)=[@in={0x2, 0x4e21}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0xfffffffffffffff9, @empty, 0x21}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000001340)=0x10) prctl$getname(0x10, &(0x7f0000001680)=""/13) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001380)=@assoc_id=r4, &(0x7f00000013c0)=0x4) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = dup3(r2, r1, 0x80000) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000001400)={0x2, &(0x7f0000000100)=[{0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000001480)={r6, 0x1c}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003a40)={0x0, @broadcast, @loopback}, &(0x7f0000003a80)=0xc) 11:26:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00\x00d\x00', 0x20, 0x1, 0x3b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'syz_tun\x00', 'bond_slave_0\x00', 'veth0_to_team\x00', 'veth0\x00', @link_local, [], @empty, [], 0x2f8, 0x2f8, 0x328, [@bpf0={'bpf\x00', 0x210, {{0x60}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv6}}}]}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x430) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x5) [ 218.626761] Invalid option length (1038965) for dns_resolver key 11:26:23 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect(r0, &(0x7f0000000000)=@ethernet, 0xfffffffffffffd4b) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=@getpolicy={0x124, 0x15, 0x12, 0x70bd29, 0x25dfdbfd, {{@in6=@local, @in6=@remote, 0x4e24, 0x101, 0x4e24, 0x5, 0xa, 0xa0, 0x20, 0x3c, r2, r3}, 0x6e6bb8, 0x1}, [@tmpl={0x84, 0x5, [{{@in6=@local, 0x4d5, 0x2b}, 0x2, @in6=@mcast1, 0x34ff, 0x3, 0x0, 0xf961, 0x1, 0x46a06ae1, 0x3ff}, {{@in6=@local, 0x4d5, 0x3f}, 0xa, @in6=@loopback, 0x0, 0x2, 0x0, 0x4, 0x5, 0x6, 0x5}]}, @lifetime_val={0x24, 0x9, {0x0, 0x1, 0xff, 0x8001}}, @user_kmaddress={0x2c, 0x13, {@in=@rand_addr=0x7fff, @in6=@remote, 0x0, 0xa}}]}, 0x124}, 0x1, 0x0, 0x0, 0x800}, 0x90) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x3e8, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) [ 218.690418] Invalid option length (1038965) for dns_resolver key [ 218.768117] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.779246] bridge0: port 1(bridge_slave_0) entered disabled state 11:26:23 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020127bd7000fddbdf2501000001000000000008000100000000000c00040003000000000000000000000000000000000400000000009dcd9b303928e19cb199d83306299a2d41802bd11fdcbd486287ff165048972dcee0367c725a178c6cea4a9a767748fdbb682b19868d0ef55471e1a7c8f6d648764230e7c5447ff59fafe59087eee0d5eb1eb26c04596bf4817d2d6215570cb78b743110"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ffffff0000000000000000000000000000000000000000000000000000000000020000000a00000000000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a6c6c8dae059daa20a00000000000000ff0200000000000000000000000000010000000000000000000000000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x190) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01ecffffffffffffff000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000010000000a00000000000000ff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x110) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) 11:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a2f6c6c623a00c1381ca9d7c9ef13750b7ec328eb8b7fdbc9d36df000698ce370ce02664b8e81aad2a347f0076432bd875a28ad9820e3c4e884a56fa53972dcdcd75ff081edc8dbdc4fbf75ccce17aeb1281c4f28a4c32f1e69784c506316eae51b0d59e514c3ab2994dc3bd62164e3357900360fc8dede137efc797b25f44773a38064c5e29794917a0844701504cf6e39c916e080c9fc835d16f0a84e7f84948e509d8ec81612e5f3fc6731e7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x1fffff) msgget(0x3, 0x40) getpgrp(0xffffffffffffffff) 11:26:23 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000480)="153f6234488dd25d766070") r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0xca6, 0x7c84, 0x6, 0x9, 0x2}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="cf000000e4daa2591e7de14a46b9626d9ecfe9e585d2759258378755b2251adc011e4662dbfa3c41880b87e69835c9cc0a0b08722dcb74e7dfba7617c22573e485c1fb53cfc087925c7c820693c4a66c6d025eea1db576c52d26dad17cc288e76621e83fda0b5dd63ca1317fc7893672f30e28161408928a2f453047666bee8270c1345dd8fc93af23d28ac8b056f5f46cce65f1c5e9fe96e7d26736cb9883e247455d1c6f245a3b085b83cc18fc4208fefff7fe270383afc6120ff4b18cd9a72bb9049f31503409756b445a561b10aad1202389a8a891b2515a919b11bbedeb16575646b9145174f8802dc07cf7ca5cbb39042046b10e3b2f5864902fcda21fa5998e24b2b50b41ddb5a19a2804bc4c849d609c384716d4bbe0d386f13ba9fd07143c5c1fd84e5aabeaf2725e0cfee636365e3382f6d8a8a41f87031b68c5b4b4d41d939f3dd10c90c2baff057123f7d4f6d5cb44002df47e8cbcd939414ba8b2705daedca12af2db6330f44738cc3ec797673131c9f6df5797996f55376cfa455339b2f9370f2ee31a16b1ec0a2275d2c251a5373104d7c8cd1cc573aaf80f8a8cf61a6d035ac3b238d8e0801d2098586180306bc9bf34c410c7b3a4e65f4c25fb4c17250b64e1dd74b576dbec4f0684fe71d3c03fa2977f15f72202a336d6f40b25a7dbb9a68b4743d09c8b09cd074d820739717a4f47d518bf63d2ab6f3334549a6f62f6097be24dcde2c0"], &(0x7f00000003c0)=0xd7) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0x2000000000000000, 0x1, 0xd41f, 0x8, 0x4, 0x7, 0x8, r2}, &(0x7f0000000300)=0x20) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r3, 0x800000c0045005, &(0x7f0000000000)=0x1000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r4, &(0x7f0000000140)=0x4) readv(r3, &(0x7f0000000180)=[{&(0x7f0000000740)=""/4096, 0x2000}], 0x1) 11:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a2f6c6c623a00c1381ca9d7c9ef13750b7ec328eb8b7fdbc9d36df000698ce370ce02664b8e81aad2a347f0076432bd875a28ad9820e3c4e884a56fa53972dcdcd75ff081edc8dbdc4fbf75ccce17aeb1281c4f28a4c32f1e69784c506316eae51b0d59e514c3ab2994dc3bd62164e3357900360fc8dede137efc797b25f44773a38064c5e29794917a0844701504cf6e39c916e080c9fc835d16f0a84e7f84948e509d8ec81612e5f3fc6731e7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x1fffff) msgget(0x3, 0x40) getpgrp(0xffffffffffffffff) 11:26:23 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) time(&(0x7f00000000c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000140)=0x7) [ 219.116477] sctp: [Deprecated]: syz-executor0 (pid 7086) Use of int in maxseg socket option. [ 219.116477] Use struct sctp_assoc_value instead 11:26:23 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) fchmod(r0, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) listen(r4, 0xffffffffffffff7f) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0xe9, 0x4004001, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0xae) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) r5 = memfd_create(&(0x7f0000000400)='\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(r5, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UI_SET_SWBIT(r0, 0xc0105512, 0x0) 11:26:23 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x4000) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000080)=""/5, &(0x7f00000000c0)=0x5) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='pagemap\x00') fcntl$setstatus(r3, 0x4, 0x2000) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000040)) sendfile(r3, r4, &(0x7f0000000140), 0x20010000) 11:26:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @loopback}, 0x2}}, 0x26) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x400000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000001780)={0x5, 0x70, 0x6, 0x7, 0x2, 0x9, 0x0, 0x81, 0x5, 0x3, 0xfffffffffffffff9, 0x93, 0x0, 0x0, 0x101, 0x0, 0x5, 0x1, 0x6, 0x0, 0xca, 0x0, 0x8, 0x7fff800000, 0x0, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001740)}, 0x0, 0x0, 0x0, 0x7}) getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000001c0)={{0x6, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 'syz0\x00', &(0x7f0000000100)=[')\x00'], 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x2}}, 0x1f) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}, r3, 0x1}}, 0x48) socket$packet(0x11, 0x3, 0x300) sendto$unix(r2, &(0x7f0000000140)="51f8143cbf229d471234b2ae502f1e69bdc49a4e1c6f5cf4cbc7261e9657", 0x1e, 0x0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e22, 0xe000, @loopback, 0x3}}, 0x9, 0x0, 0x3, 0x69b5, 0x44}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000580)=r4, 0xffffffffffffff4c) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000001940), &(0x7f0000001980)=0x30) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r5 = socket(0x10, 0x2, 0xf) r6 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") sendfile(r5, r6, &(0x7f0000000000), 0x80000002) setpriority(0x0, 0x0, 0x0) 11:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a2f6c6c623a00c1381ca9d7c9ef13750b7ec328eb8b7fdbc9d36df000698ce370ce02664b8e81aad2a347f0076432bd875a28ad9820e3c4e884a56fa53972dcdcd75ff081edc8dbdc4fbf75ccce17aeb1281c4f28a4c32f1e69784c506316eae51b0d59e514c3ab2994dc3bd62164e3357900360fc8dede137efc797b25f44773a38064c5e29794917a0844701504cf6e39c916e080c9fc835d16f0a84e7f84948e509d8ec81612e5f3fc6731e7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x1fffff) msgget(0x3, 0x40) getpgrp(0xffffffffffffffff) [ 219.401215] sctp: [Deprecated]: syz-executor0 (pid 7086) Use of int in maxseg socket option. [ 219.401215] Use struct sctp_assoc_value instead 11:26:24 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001140)='/dev/snd/pcmC#D#c\x00', 0x100000001, 0x800) write$FUSE_INIT(r0, &(0x7f0000001180)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x4, 0x0, 0x80000000, 0x7f, 0x4f7, 0x2}}, 0x50) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000001580)={{0xa, 0x4e22, 0x5, @empty, 0x1}, {0xa, 0x4e23, 0x6, @remote}, 0x3a, [0xadf, 0x6, 0x6, 0x7, 0x6, 0x3, 0x9, 0x7fffffff]}, 0x5c) recvfrom$inet6(r0, &(0x7f0000001200)=""/40, 0x28, 0x2, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x1ff, 0x0, 0x402, 0x0, 0x3553800000, 0x7f}) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000000100", 0x208800}) read(r2, &(0x7f0000000140)=""/4096, 0x1000) r3 = gettid() ptrace$getregs(0xe, r3, 0x81, &(0x7f0000001600)=""/99) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000001240)=0x6) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) openat$cgroup_procs(r0, &(0x7f0000001440)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000001300)={0x0, 0x6c, &(0x7f0000001280)=[@in={0x2, 0x4e21}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0xfffffffffffffff9, @empty, 0x21}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000001340)=0x10) prctl$getname(0x10, &(0x7f0000001680)=""/13) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001380)=@assoc_id=r4, &(0x7f00000013c0)=0x4) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = dup3(r2, r1, 0x80000) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000001400)={0x2, &(0x7f0000000100)=[{0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000001480)={r6, 0x1c}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003a40)={0x0, @broadcast, @loopback}, &(0x7f0000003a80)=0xc) 11:26:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) clock_adjtime(0x7, &(0x7f00000000c0)={0x1, 0xfff, 0xfffffffffffffffd, 0x7ff, 0x28c1d3e, 0x0, 0x10000, 0x7fffffff, 0x7f, 0x200, 0x8, 0x0, 0x13a0, 0x400, 0x6, 0x8, 0xb4b7, 0x3, 0x8, 0x3, 0x7, 0xfffffffffffffffd, 0xff, 0x7, 0xff, 0x7ff}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x80000) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{r2, r3/1000+10000}, {0x0, 0x2710}}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="a30cdf3b55386c0000000000000000000000000003ad7889ded8d7fd66ab274aeb3b82c8c518a011af85ecc8f505eaef2d9100000000000000bccfbb6b295e86f14e630b17f3f9e04e08b25c483cd69a893ab37bbc00a6f3b7f9f70e8103c8955581956dc4419c6bda39b5c5a7ee09189d5b09ba41c8529185a8e7f36db6ddc48ec5767dad0120c4699f0419575164e2096eae6adb6ad6f7f0aecbeb47f2e7838dc91a64170539ff60299ca6b203763aeb7f98e65e6f3035"], 0x1) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000040)=0x3, 0x4) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000280)={0x0, 0x11001, 0x3, 0x6, 0x4}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000340)) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000300)={0x6, &(0x7f00000002c0)=[{0xff, 0x5}, {0x400, 0x100000000}, {0x401, 0x7f}, {0x6, 0x8}, {0xff}, {0x10000, 0x344}]}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000440)=0x0) capset(&(0x7f0000000480)={0x0, r4}, &(0x7f00000004c0)={0x3, 0x2, 0x2, 0xd5, 0x800, 0x4}) prctl$intptr(0x2e, 0x1) 11:26:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a2f6c6c623a00c1381ca9d7c9ef13750b7ec328eb8b7fdbc9d36df000698ce370ce02664b8e81aad2a347f0076432bd875a28ad9820e3c4e884a56fa53972dcdcd75ff081edc8dbdc4fbf75ccce17aeb1281c4f28a4c32f1e69784c506316eae51b0d59e514c3ab2994dc3bd62164e3357900360fc8dede137efc797b25f44773a38064c5e29794917a0844701504cf6e39c916e080c9fc835d16f0a84e7f84948e509d8ec81612e5f3fc6731e7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x1fffff) msgget(0x3, 0x40) getpgrp(0xffffffffffffffff) 11:26:24 executing program 0: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000001c0)={0x1000, 0xffffffffffffbddf, 0x8000}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0), 0x111}}, 0x20) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x3e) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000300)=0x5, 0xc0, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000480)={r5, 0x8000}, &(0x7f0000000440)=0x8) renameat(r4, &(0x7f00000004c0)='./file0\x00', r2, &(0x7f0000000500)='./file0\x00') mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r4) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000003, 0x401, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffc0}, &(0x7f0000000140)=0x8) getegid() mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 11:26:24 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x101, @mcast1}}, 0x0, 0x81}, 0x90) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8a240, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xfa3) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, 0x1c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x7ffffffb, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4, 0x0, 0x0, 0x100000001}, &(0x7f0000000340)=0x18) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x2}, &(0x7f0000000240)=0x8) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x2, 0x8001, 0xbfa}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)=@sg0='/dev/sg0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='debugfs\x00', 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') getpgrp(0x0) ioctl(r1, 0x7, &(0x7f0000000380)="352b790362556bc3a90c681239b157e494031872ac332c7746b6a854ec98f8df57fbe167f583c49c4b4e9737bf9cb12f9bb069017e1e0f0041565f918e7621a9e6188cc2601b922439a1d58b288191199b5d530c02739c17af76fc2facfadfde363af1637fc97e333d1972ccf43a4a35a69bd8a63ce3e4f7c2205d256c0964dd5af32f9c62b301aad830dfa9507411d01058b8e69aee63a2be585386addd99c34a23feafb96ed80f36a14cd9efa4aa0b51811e72914c0c7571126d5ca3b1a3e7d1a69afed67d05b8676e596f3435851d09f84d88622943eff33609cee18aafa8cc2a2f376becbbe9000f474f6b0b3aaf") open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000000c0)={0x2, @broadcast, 0x100004e23, 0x4, 'nq\x00', 0x2, 0x89, 0x200000016}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380), &(0x7f0000000ac0)=[&(0x7f0000000b40)='ramfs\x00']) 11:26:24 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) fchmod(r0, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) listen(r4, 0xffffffffffffff7f) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0xe9, 0x4004001, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0xae) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) r5 = memfd_create(&(0x7f0000000400)='\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(r5, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UI_SET_SWBIT(r0, 0xc0105512, 0x0) [ 219.736069] mmap: syz-executor0 (7126) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 11:26:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file1\x00', 0x0) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18}, 0x0) r1 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) lstat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x1, r1}, {0x2, 0x5, r2}], {}, [{0x8, 0x6, r3}], {0x10, 0x4}, {0x20, 0x7}}, 0x3c, 0x1) 11:26:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={"0061a40000ffebf9000000000200", 0x9d01}) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) close(0xffffffffffffffff) 11:26:24 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 11:26:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000000, 0x84) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xa4}, &(0x7f0000000100)=0xc) msgget$private(0x0, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e24, @multicast2}}, 0x101, 0x5}, 0x90) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r4, &(0x7f0000000100), 0xd3b1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0x40dc, 0x3ff, 0x6, 0x0, 0x5954, 0x6c, 0xb7, 0x9, 0x6, 0x1}) sendto$inet6(r4, &(0x7f0000000000)="fe", 0x1, 0x1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, 0x1c) splice(r2, 0x0, r3, 0x0, 0xab11, 0x0) [ 220.091721] binder: BINDER_SET_CONTEXT_MGR already set [ 220.098137] binder: 7156:7157 ioctl 40046207 0 returned -16 [ 220.150175] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:26:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @loopback}, 0x2}}, 0x26) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x400000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000001780)={0x5, 0x70, 0x6, 0x7, 0x2, 0x9, 0x0, 0x81, 0x5, 0x3, 0xfffffffffffffff9, 0x93, 0x0, 0x0, 0x101, 0x0, 0x5, 0x1, 0x6, 0x0, 0xca, 0x0, 0x8, 0x7fff800000, 0x0, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001740)}, 0x0, 0x0, 0x0, 0x7}) getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000001c0)={{0x6, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 'syz0\x00', &(0x7f0000000100)=[')\x00'], 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x2}}, 0x1f) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}, r3, 0x1}}, 0x48) socket$packet(0x11, 0x3, 0x300) sendto$unix(r2, &(0x7f0000000140)="51f8143cbf229d471234b2ae502f1e69bdc49a4e1c6f5cf4cbc7261e9657", 0x1e, 0x0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e22, 0xe000, @loopback, 0x3}}, 0x9, 0x0, 0x3, 0x69b5, 0x44}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000580)=r4, 0xffffffffffffff4c) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000001940), &(0x7f0000001980)=0x30) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r5 = socket(0x10, 0x2, 0xf) r6 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") sendfile(r5, r6, &(0x7f0000000000), 0x80000002) setpriority(0x0, 0x0, 0x0) [ 220.294344] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:26:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl(r1, 0x40084149, &(0x7f0000000040)) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) 11:26:25 executing program 5: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[]) r0 = getpid() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r2, 0x8}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0xffffffffffffffd9, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000500)) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000240)={r2, 0x0, 0x20}, 0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@dev, 0x0}, &(0x7f0000000540)=0x14) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000340)={r5, 0x1, 0x6, @dev={[], 0xb}}, 0x10) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000000)=r0) write$P9_RXATTRCREATE(r8, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) write$P9_RSETATTR(r8, &(0x7f0000000040)={0x7}, 0x7) sendfile(r4, r8, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) 11:26:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={"0061a40000ffebf9000000000200", 0x9d01}) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) close(0xffffffffffffffff) 11:26:25 executing program 3: r0 = socket$inet(0x2, 0x3, 0x800000800000001) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000002c0)={0x75a, 0x2eab1743, 0x5, 0x3}, 0x8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x100, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000a00000/0x600000)=nil, 0x600000}, 0x2}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000001c0)=0xc) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x400, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x40, 0x3, 0x4, "2017624556ffafe7bbdb74a11bea1132", "16e769a19e8dc3eb963334f1e93c6184b12db34af8909fdbafda6a56bf178ba52c78e09df8d92fbd11f7fe"}, 0x40, 0x2) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x67, @empty, 0x4e21, 0x1, 'ovf\x00', 0x4, 0x7, 0x26}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000240)={@broadcast, @multicast1, @local}, &(0x7f0000000280)=0xc) [ 220.617586] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.630076] IPVS: set_ctl: invalid protocol: 103 0.0.0.0:20001 [ 220.663850] IPVS: set_ctl: invalid protocol: 103 0.0.0.0:20001 [ 220.985249] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.991711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.003427] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.029760] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 221.056330] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 221.100928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.196493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.203886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.229521] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.236156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.307029] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:26:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000002c0)={0xfa, @dev={0xac, 0x14, 0x14, 0x12}, 0x4e20, 0x3, 'wrr\x00', 0x0, 0x6, 0x5d}, 0x2c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000040)=0x40, 0x4) sendto$inet6(r2, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0xd9, "4498b4b4d6a435bbf79ebf23c6cd897767b3aea4f42b3fffa0f96af1c0b8257f020040527081da9f4d2b353d6f4554c6bb3e7dcdb7d14466797ce3bf6c7277500a0021108508e4c850a8167bd22acc9a012bf5d3638f1a285177e481827d26e5a152d6b3ee357179fb8fa41d79bf9aed97d68f0a005c93bb3e31433a4890c704d93d5fc0d01e61c4364f38206ac53fb332c3d41ea86ffaaff2eac0d42862b332e9fd72c847db6b0e8e6531b61dc2a012cfe70478cabd4468712d80c8ae8d198baa085f04150809115e93e565a938ae152a4fc95a4bb9aa3efd"}, &(0x7f00000001c0)=0xe1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000200)={r4, 0x6}, &(0x7f0000000240)=0x8) 11:26:26 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000340), 0x4) getsockopt$inet_tcp_int(r1, 0x6, 0xb, &(0x7f0000bfcffc), &(0x7f0000000100)=0x4) fsetxattr(r1, &(0x7f0000000000)=@random={'osx.', '/systemcpusetppp1vmnet0@\x00'}, &(0x7f0000000040)='/dev/usbmon#\x00', 0xd, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x62, "0418e6671afdbc89602b59354f4933f284bc67b91712f4395f1ed1fc9154ec7eaa0ee5a71c918c4a56936cc22d6e0e1c61b02bcb34edf7222bd73c74f5c209764570b25b3aae9e752f7437634bea8176ec7ec2f7ca762dd8aefec7f91bf1d1267979"}, &(0x7f0000000140)=0x6a) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) 11:26:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x0, r0}) connect$netlink(r0, &(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x4, 0x1c4) r3 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setstatus(r3, 0x4, 0x40000) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) sendto$inet6(r1, &(0x7f0000000040)="f5", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback, 0xc0fe}, 0x1c) 11:26:26 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000780)}], 0x1, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') 11:26:26 executing program 0: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000001c0)={0x1000, 0xffffffffffffbddf, 0x8000}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0), 0x111}}, 0x20) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x3e) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000300)=0x5, 0xc0, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000480)={r5, 0x8000}, &(0x7f0000000440)=0x8) renameat(r4, &(0x7f00000004c0)='./file0\x00', r2, &(0x7f0000000500)='./file0\x00') mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r4) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000003, 0x401, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffc0}, &(0x7f0000000140)=0x8) getegid() mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 11:26:26 executing program 5: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[]) r0 = getpid() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r2, 0x8}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0xffffffffffffffd9, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000500)) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000240)={r2, 0x0, 0x20}, 0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@dev, 0x0}, &(0x7f0000000540)=0x14) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000340)={r5, 0x1, 0x6, @dev={[], 0xb}}, 0x10) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000000)=r0) write$P9_RXATTRCREATE(r8, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) write$P9_RSETATTR(r8, &(0x7f0000000040)={0x7}, 0x7) sendfile(r4, r8, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) [ 221.614197] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:26:26 executing program 4: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[]) r0 = getpid() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r2, 0x8}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0xffffffffffffffd9, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000500)) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000240)={r2, 0x0, 0x20}, 0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@dev, 0x0}, &(0x7f0000000540)=0x14) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000340)={r5, 0x1, 0x6, @dev={[], 0xb}}, 0x10) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000000)=r0) write$P9_RXATTRCREATE(r8, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) write$P9_RSETATTR(r8, &(0x7f0000000040)={0x7}, 0x7) sendfile(r4, r8, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) 11:26:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000800)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00000000c0)=@nl=@proc, 0x80, &(0x7f0000000440)=[{&(0x7f0000002480)=""/4096, 0x34000}], 0x1, &(0x7f0000003480)=""/4096, 0x1000}, 0x0) 11:26:26 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200081) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x1000, @ipv4={[], [], @broadcast}, 0x9}}, 0x800}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000600)=ANY=[@ANYRES32=r2, @ANYBLOB="dd000000546f7e3ed020b97b9ec6628c25bdae2caf41a18ae1ed4201f861c03a58675cd50b52f15e7f11616c8f0698f615d24fbd14d1498992b3fad83138e311c1cc056d7969c4706b99d7ac243ec47abb684b5c40c03afa802c0469558bb006462b8ef3751bd906c0d3000004108bd226b569a22d908ffd0cc8021773b8f3bfaca7e718efaea27d12359393749eeac738dc906b5af0387b2a9ef1c1fb8ea924e453595575696b255349caf134b84ae80f3d30d1e6c9dfe5492c94403a5051e659e63f125b98df20a968f82e57b390e0bc3a1342bf15450cc1f5f902d0d2a1e0dc5d8a673e68e6df057759a1a248a001725e71ad23495cc4c4d327a0ee1718c3dbbc3734463abc9e5992a7ddb5e02aa056b2574a957588069d690a8e705277e06cdbf8d73eb78bfce494069db819ec1ee3a2d1776394eed4434babc816e4d1a7f256097d35e4c140e6ddca70c194ff8326f3eb164312efa31c089a624cbbffdbbac595d07b80c46aa9a3cd55181fc4c11a02d3b7ac6183a20a61116b620be2f26c03c9218064bb334c5b0e62eae7810a1f566226d924188ada819d65b3632f2e1e1d9c7a95d19fbef9000000000000000000cd534e9e56b6b33070f1a3a45acaa8dae024308f69e3edf79f315541c97b7e96e89384f6a7986a74d67bebbec14a76150eb74578835b6829ded69b4a93e47202458131d53bad6b036f4c2e7dfda8fadcb4f523ad76e46266d7674e413ac53504e8ab2737ed5286730d870449342e5941e7199b16cee192d0d388101d5ac20dda4cd414cf40f31b8960090b2c41d290b32257c146cf2af73531985c0f3175c8687dabe2efd920987e7bf5a9091d9a026990537a04fcc704a5252abcc74280cdef2615"], &(0x7f0000000080)=0xe5) syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0xffffffff, 0x402) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x8) madvise(&(0x7f00000a3000/0x4000)=nil, 0x4000, 0x5) 11:26:26 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000080)=""/15) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x40400) ioctl$RTC_WIE_ON(r2, 0x700f) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0xa, &(0x7f0000000140)={&(0x7f000029b000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 11:26:26 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) epoll_create(0xe29f) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @remote}}, [0xb5c, 0x80, 0x7f, 0x7e2e, 0x1, 0x501, 0x9, 0x287, 0xb5, 0x0, 0x7, 0x8, 0x5, 0x80000001, 0x81]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={r2, 0x8}, &(0x7f0000000180)=0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x109) ioctl$KDENABIO(r1, 0x4b36) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x71000}], 0x200000000000000f, 0x0) 11:26:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = gettid() r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x101000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) r3 = syz_open_procfs(r1, &(0x7f00000001c0)='ns\x00') ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x100}) fchdir(r3) exit(0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) [ 222.171630] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.237847] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:26:27 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000000)=0x100) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000800)='syzkaller1\x00') r2 = socket$inet6_sctp(0xa, 0x105, 0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={r0, 0xfff}, &(0x7f0000000080)=0x8) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x53, &(0x7f0000000000), &(0x7f0000000100)=0x14a) 11:26:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x48000, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r3) 11:26:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x0, r0}) connect$netlink(r0, &(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x4, 0x1c4) r3 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setstatus(r3, 0x4, 0x40000) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) sendto$inet6(r1, &(0x7f0000000040)="f5", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback, 0xc0fe}, 0x1c) 11:26:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x6) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) write(r1, &(0x7f00000001c0)="999dbe8c11d143ab1461b96f4ad48e4537ad61f40b5fb1fa079a30ff4a24661bbd25218ffb3af8962c923369a9e3aa5140cc6dfc08bb92a7d9621898da6948005346196661b0363d73a34485d89a8b01cc2f5005b7ff848943f861f1668e8baf0e658588a4e4ce3b64d2fd5e78b3e1ddafb6fe5d061afb35a461df015cad260d9c19997c35d6f3dd2a4821cf736616ce6969bf23291d0d1c687d7e9fbdcd68d60c918730b52ae19c954ca2caa8cfe2f49a5692058d19dad0d70b9e29918a80e7a5f44dd7f38ada6fd0b59735aa12fe559277c048fe7f7b39f6e93430e32a15e67688952627e915c46259daff", 0xec) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x44, 0x0, &(0x7f0000000480)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000040)=[@flat={0x77682a85}], &(0x7f0000000080)=[0x0]}}], 0x0, 0x0, &(0x7f0000000500)}) 11:26:27 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34003}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x28, 0x829, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:26:27 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2c, 0x101) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x1, 0x2, 0x8}}, 0x14) pipe2$9p(&(0x7f0000000000), 0x800) r1 = socket(0x10, 0x2, 0x80000000c) write(r1, &(0x7f0000000640)="1f0000000104ff05fd010000000000200a0501000800010004f2511a10df00", 0x1f) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000000c0)={0xb4f7, 0xa, 0xffff, 'queue1\x00', 0x9}) 11:26:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000140)=0xc) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes-aesni)\x00'}, 0x58) [ 222.931384] binder: 7276:7277 got transaction with invalid handle, 0 [ 222.931662] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 222.938479] binder: 7276:7277 transaction failed 29201/-22, size 24-8 line 3062 [ 222.960745] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 11:26:27 executing program 5: io_setup(0x50, &(0x7f0000000080)) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0xfffffffffffffe15}, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) getresuid(&(0x7f0000003f40), &(0x7f0000003f80), &(0x7f0000003fc0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x6, 0x0, &(0x7f00000003c0)}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x40, 0x100) sendmsg(r2, &(0x7f00000003c0)={&(0x7f00000002c0)=@xdp={0x2c, 0x7, 0x0, 0xd}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000680)=[{0x80, 0x10b, 0x0, "acf13e14de64b8c50fc1b7437f909f6560c2a2ba9389bb8e5d9127ad3ea545fae6889cd1de4f6fa431b70689f6b7ded783a51afdb2c7bae7a972953637ceffd169fd99d0bd5c01e2d135f1753f5c67f65b23f41c3fef17e7e0594f9dbc73a545747794c362b719a0fe4a9a09b6"}], 0x80, 0x8000}, 0x4048001) getpid() madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xb) [ 223.031150] binder: BINDER_SET_CONTEXT_MGR already set [ 223.036506] binder: 7276:7277 ioctl 40046207 0 returned -16 [ 223.054580] binder_alloc: 7276: binder_alloc_buf, no vma [ 223.069273] binder: 7276:7289 transaction failed 29189/-3, size 24-8 line 2970 11:26:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000002d0001000000008099d481a0c45a431429ed1f2d0000000000030004000800000000000000"], 0x1c}}, 0x0) 11:26:27 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) epoll_create(0xe29f) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @remote}}, [0xb5c, 0x80, 0x7f, 0x7e2e, 0x1, 0x501, 0x9, 0x287, 0xb5, 0x0, 0x7, 0x8, 0x5, 0x80000001, 0x81]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={r2, 0x8}, &(0x7f0000000180)=0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c460001000409000000000000000300000005000000000000173800000000000000018000000008200002a701000a120101000088db2c0dd3b1d145ed3ff78066200000090000004a00000006000000060000000500e75ab4c7d2d3597a5aa49ffd34c6477a3261688fa7538725f3cfe136002b6674963a8a7b7b1e0d239f188f503428c2feb0de258fbcba7a216295dca7225adcaaca12f4567b7c545e750f9a0e1fced4eaeb76863088c1c733c0722c2e6a5a8fc2f2dabdc90468145b5e8cd2bde8ec2b47f48764665d4f5b3166a974056bcdd2e9682a3d4aa58692624e71a68a631d14cab48af891ef5b5f5dbcb05a8cb5049d2452be35e747ffb8444d13e366bfcbba968a"], 0x109) ioctl$KDENABIO(r1, 0x4b36) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x71000}], 0x200000000000000f, 0x0) 11:26:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="22c3ade32e5aa8c4151cf38a9403ab54c7419203c3ea2dc65f408cd9f3958c032d06493e155764b98f7ceaffeac63e2e392c2667686d3ed554d18dc29f1c0f126d06445bc78b52e3500dd28a76112e163cd56469c7875d9a834d47db0945f4d228804526b9f0e55a03ab484e54b542500439032cd4acf4a37300000000bb29ccf6508db7e3bc3b72a44b856f302831c248ef615f3ae9fbf17eab80c8fdceb2d4499e8273acc9eba013cb6d9ccfaf49b018d887743a6403e861ad47d04942ccac405ad4e2f9813494d37b065c6d68eee3d9a1dbe9821a0de83370b3b4a23165583305ddc30bb38181be7edb45d16dac7c2505f6bb23592daf81"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) [ 223.102276] binder: undelivered TRANSACTION_ERROR: 29201 [ 223.118948] binder: undelivered TRANSACTION_ERROR: 29189 [ 223.142099] binder: 7298:7299 transaction failed 29189/-22, size 0-0 line 2855 11:26:28 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x9) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=@known='security.capability\x00', &(0x7f0000000440), 0x0, 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="73654175aee00c120e3e8924088a276e5c6d726974792e73"], &(0x7f00000001c0)='security.capability\x00', 0x14, 0x0) unlink(&(0x7f0000000380)='./file0\x00') r2 = fcntl$dupfd(0xffffffffffffff9c, 0x0, r0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000027c0)={0x0, @in6={{0xa, 0x4e24, 0x7, @remote, 0x6}}, 0x20, 0x8, 0x9e, 0x1}, &(0x7f0000002880)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000028c0)={r3, 0xa8, "24e4ac061ebf0aa38872082cf72eb47033c739578d06923ab7900a6f7740c8bcd2c02192860a5170d99046257b63da5f6b682f2c22accd8644bc9adf5d3d3040f53e7e885f07f429433c5cfaa45ada7c97b0822e88158a6728f017f2f7cac26da7157fade043b3b1b6a65865511b826dae6da3dc8f4770e3c1b5678eb95d2d6e8e9001c3697cabe07b750619351e7265acaf762b8b443e97efd06334d7c7faacbbd9529a2ca76136"}, &(0x7f0000002980)=0xb0) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r4, 0x1f}, &(0x7f0000000300)=0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000240)={0x7, 0x5, 0x8, {0x77359400}, 0x9, 0xfffffffffffffe01}) splice(r1, &(0x7f0000000080), r6, &(0x7f00000003c0), 0x3, 0x4) recvfrom(r5, &(0x7f0000000480)=""/4096, 0x1000, 0x40012000, &(0x7f0000001480)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000440)={0x0, 0x10}) [ 223.265463] binder: 7298:7316 transaction failed 29189/-22, size 0-0 line 2855 [ 223.324552] binder: undelivered TRANSACTION_ERROR: 29189 [ 223.332218] binder: undelivered TRANSACTION_ERROR: 29189 11:26:28 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10a) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000040)="f0a59d86881da31dcea0c53778d8f48f6f246622d81b760601883752ad7b3eee6160e63bdbb77018444a73f14af87fa7f273b8addf") perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000003, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x125232b8, 0x2ede, 0x0, 0xffff, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0x4, 0xffffffffffffffff, 0x8) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x1, @rand_addr=0x100}}, 0x1d) 11:26:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x33, "1d1ceb71f995a36d54f1803ce172683c9c0b602cf793ab335d7ee31a848a625dc56557a780f6006513124fbfa3beecd440ef86"}, &(0x7f0000000040)=0x3b) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2, 0x8000000}, &(0x7f0000000100)=0x8) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x20000000001) 11:26:28 executing program 5: io_setup(0x50, &(0x7f0000000080)) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0xfffffffffffffe15}, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) getresuid(&(0x7f0000003f40), &(0x7f0000003f80), &(0x7f0000003fc0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x6, 0x0, &(0x7f00000003c0)}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x40, 0x100) sendmsg(r2, &(0x7f00000003c0)={&(0x7f00000002c0)=@xdp={0x2c, 0x7, 0x0, 0xd}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000680)=[{0x80, 0x10b, 0x0, "acf13e14de64b8c50fc1b7437f909f6560c2a2ba9389bb8e5d9127ad3ea545fae6889cd1de4f6fa431b70689f6b7ded783a51afdb2c7bae7a972953637ceffd169fd99d0bd5c01e2d135f1753f5c67f65b23f41c3fef17e7e0594f9dbc73a545747794c362b719a0fe4a9a09b6"}], 0x80, 0x8000}, 0x4048001) getpid() madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xb) 11:26:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f000088f000)='\x00\x00\x00', 0x4) ftruncate(r1, 0x1000000) io_setup(0xffff, &(0x7f0000000000)) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000180)) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="4da1c70ccf59c9e2b9981b0af431636b170cd50facc0262546bfe7b9867c171b433e11e6f028acf09954d6acb42ab8217ca8125c818c86947882583cff9761d46b23faf5530ee60c794c8a85fa0b309bbb6a9810b48374a7c3f383f7f814304ca2867f58b53dddaf7ada829fe39df830fe9cc911cb006422b3ad7a04a081a8fd994a145c4083eb68e6c087481bc53bb677e07d98f9a1bdf7931f703d3a9f8e36235ca06295ac848e6e6a1a2bb12ba3254fb9a5c8bc852c24ac09e57d0d"], 0xb, 0x1) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x77359400}, 0x10) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8, 0x8, '9P2000.u'}, 0x15) read(r1, &(0x7f0000000040)=""/48, 0xcb970290) 11:26:28 executing program 4: socket$nl_xfrm(0x11, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$TIOCNXCL(r1, 0x540d) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000003c0)={0x8}) close(r1) 11:26:28 executing program 5: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000805000), 0x0) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) socketpair(0x0, 0x1, 0x1000, &(0x7f0000000140)) read(r1, &(0x7f0000000000)=""/253, 0xfd) 11:26:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrlimit(0x0, &(0x7f0000002ff2)) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x8, 0x1, 0x100000) pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) select(0x40, &(0x7f0000000fc0)={0x20}, &(0x7f0000000180), &(0x7f0000002000), &(0x7f0000003000)={0x77359400}) [ 223.721052] binder: 7349:7350 transaction failed 29189/-22, size 0-0 line 2855 [ 223.746177] binder: undelivered TRANSACTION_ERROR: 29189 11:26:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYRES64=r1]) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x480, 0xfffffffffffffffd]}) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x4000) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000100)="6e949fa72d031f489117136f332d24416492cbc3ba0b84056850778ec76e971ceb34fc4accd6a7bf68c67e5439a2e83dc33f2f39b693e405b81825d53d3e626dc9859d23dfa5cb02cb805ada5c6b10ab79f7047d6a058f8ab8ae197f1b54299292dac0e0d48a09e3d90629dc195bdde2c35ae274b734d031d2bae49ef61662e4bdb8473a3cb580948869dd2222a4ff9276869f3911fcc17ce59101") clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r5 = getuid() ioprio_set$uid(0x3, r5, 0x5) write$input_event(r2, &(0x7f00000000c0)={{r3, r4/1000+10000}, 0x5, 0x80000001, 0x2c}, 0x18) 11:26:28 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000080), 0x8) r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x1, &(0x7f0000cbc000)=""/244, &(0x7f0000000000)=0xf4) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8, 0x200100) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x7, 0x1, 0x8, {r3, r4+30000000}, 0x975a, 0x101}) 11:26:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb00000000ecff"], &(0x7f0000000040)=""/174, 0x8, 0xae, 0x1}, 0x20) 11:26:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) shutdown(0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f000062fff8), 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7, &(0x7f0000000080), 0x8) 11:26:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), 0x10) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0x7e, &(0x7f0000000000)="b07bccdf05d1994ab5293922d887b34481584069122d0c26085e3a912266452181a1") 11:26:28 executing program 2: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x440000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0xfffffffffffffffa, 0x5, 0x8001, 0x2}) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0xa2, 0x4802) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x40000000000010) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000280)={[{0x401, 0x8000, 0x9, 0x4298, 0x948d, 0x0, 0x2, 0x8, 0xd1, 0xffffffffffff8000, 0x81, 0x3, 0x3}, {0x7fffffff, 0x20, 0x5, 0xffffffff, 0xdfc1, 0xf5a, 0x6e34b1ed, 0x7f, 0x5, 0x4, 0x9, 0xfffffffffffffffa, 0x165}, {0x800000000000000, 0x7, 0x0, 0x7, 0x1, 0x3, 0xffffffffffffffe0, 0x8, 0x0, 0x1, 0x5, 0x80000000, 0xfffffffffffffffe}], 0x3}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0x1, 0x4, 0x1, 0x1000}) [ 224.093365] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. [ 224.138098] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. 11:26:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@ethernet={0x0, @broadcast}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x3f, 0x0, 0xfffffffffffffffd}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:26:29 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfc08000000000000, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000640, 0x0, 0x0, 0x20000670, 0x200006a0], 0x0, &(0x7f0000000140), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x38010000}, {}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0x0, 0x0, 'veth1_to_bond\x00', 'vcan0\x00', 'syzkaller0\x00', 'bpq0\x00', @local, [], @random="fc1cb525cbc8", [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x1b0) 11:26:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000006, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 11:26:29 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x4, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x290) 11:26:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) socket$bt_rfcomm(0x1f, 0x0, 0x3) recvmmsg(r1, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x34f99}], 0x1, &(0x7f0000000d00)=""/210, 0xc9}}], 0x1, 0x0, &(0x7f0000000040)) 11:26:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000000300), 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5460, &(0x7f0000000000)) close(0xffffffffffffffff) 11:26:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 224.506398] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 11:26:29 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc) 11:26:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x10000000000062) read(r1, &(0x7f0000000040)=""/11, 0xffffff3a) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0xb41f}) [ 224.573482] *** Guest State *** 11:26:29 executing program 2: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0xffffbffeffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 224.606987] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 224.619132] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 224.660415] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 224.684121] CR3 = 0x0000000000000000 [ 224.690372] ================================================================== [ 224.694943] RSP = 0x0000000000000f80 RIP = 0x000000000000003f [ 224.697877] BUG: KASAN: slab-out-of-bounds in fscache_alloc_cookie+0x7ad/0x880 [ 224.697893] Read of size 4 at addr ffff8801c84f6054 by task syz-executor2/7427 [ 224.697897] [ 224.697915] CPU: 1 PID: 7427 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #289 [ 224.697931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.708718] RFLAGS=0x00010082 DR7 = 0x0000000000000400 [ 224.711264] Call Trace: [ 224.711286] dump_stack+0x1c4/0x2b4 [ 224.711307] ? dump_stack_print_info.cold.2+0x52/0x52 [ 224.711324] ? printk+0xa7/0xcf [ 224.711342] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 224.711379] print_address_description.cold.8+0x9/0x1ff [ 224.711403] kasan_report.cold.9+0x242/0x309 [ 224.722517] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 224.727638] ? fscache_alloc_cookie+0x7ad/0x880 [ 224.727661] __asan_report_load4_noabort+0x14/0x20 [ 224.727679] fscache_alloc_cookie+0x7ad/0x880 [ 224.727704] ? fscache_cookie_init_once+0x80/0x80 [ 224.727725] ? rpcauth_cache_shrink_scan+0x180/0x180 [ 224.741095] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 224.743033] ? __kmalloc_track_caller+0x14a/0x750 [ 224.743051] ? kstrdup+0x39/0x70 [ 224.743068] ? nfs_alloc_client+0x383/0x760 [ 224.743083] ? nfs_get_client+0x8e8/0x14d0 [ 224.743097] ? nfs_init_server+0x357/0x1010 [ 224.743124] ? nfs_create_server+0x86/0x5f0 [ 224.745890] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 224.749303] ? nfs_fs_mount+0x17f8/0x2f1c [ 224.749317] ? mount_fs+0xae/0x31d [ 224.749335] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 224.749347] ? do_mount+0x581/0x31f0 [ 224.749369] ? ksys_mount+0x12d/0x140 [ 224.749382] ? __x64_sys_mount+0xbe/0x150 [ 224.749398] ? do_syscall_64+0x1b9/0x820 [ 224.749420] __fscache_acquire_cookie+0x230/0xb60 [ 224.749442] ? fscache_cookie_put+0x880/0x880 [ 224.755685] SS: sel=0x0000, attr=0x04085, limit=0x00000000, base=0x0000000000000000 [ 224.757884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.757905] ? check_preemption_disabled+0x48/0x200 [ 224.757934] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 224.763273] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 224.768027] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 224.768046] ? rcu_pm_notify+0xc0/0xc0 [ 224.768066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.768092] nfs_fscache_get_client_cookie+0x463/0x600 [ 224.768113] ? nfs_readpage_from_fscache_complete+0x200/0x200 [ 224.768152] nfs_alloc_client+0x563/0x760 [ 224.773658] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 224.779215] ? register_nfs_version+0x280/0x280 [ 224.779237] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 224.779268] nfs_get_client+0x8e8/0x14d0 [ 224.779284] ? kmem_cache_alloc_trace+0x152/0x750 [ 224.779300] ? mount_fs+0xae/0x31d [ 224.779334] ? nfs_put_client+0x30/0x30 [ 224.784538] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 224.788951] ? nfs_alloc_server+0x5ca/0x730 [ 224.788965] ? depot_save_stack+0x292/0x470 [ 224.788982] ? nfs_wait_client_init_complete+0x210/0x210 [ 224.789002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.789019] ? check_preemption_disabled+0x48/0x200 [ 224.789034] ? check_preemption_disabled+0x48/0x200 [ 224.789048] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 224.789067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.794064] GDTR: limit=0x00000000, base=0x0000000000000000 [ 224.798397] nfs_init_server+0x357/0x1010 [ 224.798418] ? nfs_clone_server+0x920/0x920 [ 224.798436] ? nfs_alloc_fattr+0x48/0x1d0 [ 224.798452] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.798484] nfs_create_server+0x86/0x5f0 11:26:29 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000700)=""/118, 0x76}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000001c0), 0x15e, &(0x7f0000000100)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}}, 0x0) 11:26:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, "736b6369706865720000000400", 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) [ 224.804139] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 224.811526] nfs_try_mount+0x180/0xa80 [ 224.811549] ? lock_downgrade+0x900/0x900 [ 224.811568] ? nfs_request_mount.constprop.18+0x920/0x920 [ 224.811607] ? kasan_check_read+0x11/0x20 [ 224.811623] ? do_raw_spin_unlock+0xa7/0x2f0 [ 224.811654] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 224.811685] ? kasan_check_write+0x14/0x20 [ 224.811719] ? do_raw_spin_lock+0xc1/0x200 [ 224.817171] IDTR: limit=0x00000000, base=0x0000000000000000 [ 224.819906] ? _raw_spin_unlock+0x2c/0x50 [ 224.819923] ? find_nfs_version+0x138/0x190 [ 224.819945] nfs_fs_mount+0x17f8/0x2f1c [ 224.819968] ? nfs_show_options+0x250/0x250 [ 224.819989] ? nfs_clone_super+0x420/0x420 [ 224.820002] ? nfs_parse_mount_options+0x2660/0x2660 [ 224.820021] ? lock_downgrade+0x900/0x900 [ 224.824937] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 224.828559] mount_fs+0xae/0x31d [ 224.828584] vfs_kern_mount.part.35+0xdc/0x4f0 [ 224.828604] ? may_umount+0xb0/0xb0 [ 224.828617] ? _raw_read_unlock+0x2c/0x50 [ 224.828632] ? __get_fs_type+0x97/0xc0 [ 224.828650] do_mount+0x581/0x31f0 [ 224.833499] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 224.837274] ? copy_mount_string+0x40/0x40 [ 224.837302] ? copy_mount_options+0x5f/0x380 [ 224.837332] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.837350] ? kmem_cache_alloc_trace+0x353/0x750 [ 224.837394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.845887] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 224.849540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.849555] ? copy_mount_options+0x288/0x380 [ 224.849577] ksys_mount+0x12d/0x140 [ 224.849596] __x64_sys_mount+0xbe/0x150 [ 224.849617] do_syscall_64+0x1b9/0x820 [ 224.849632] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 224.849651] ? syscall_return_slowpath+0x5e0/0x5e0 [ 224.849670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 224.853777] Interruptibility = 00000000 ActivityState = 00000000 [ 224.857945] ? trace_hardirqs_on_caller+0x310/0x310 [ 224.857965] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 224.857984] ? prepare_exit_to_usermode+0x291/0x3b0 [ 224.858007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 224.858032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.862349] *** Host State *** [ 224.865520] RIP: 0033:0x457569 [ 224.865536] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.865546] RSP: 002b:00007f55b4d47c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 224.865564] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 224.865574] RDX: 000000002015bffc RSI: 0000000020343ff8 RDI: 0000000020000080 [ 224.865584] RBP: 000000000072bf00 R08: 000000002000a000 R09: 0000000000000000 [ 224.865593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55b4d486d4 [ 224.865610] R13: 00000000004c289b R14: 00000000004d3c78 R15: 00000000ffffffff [ 224.870458] RIP = 0xffffffff81212b2e RSP = 0xffff880185ed7350 [ 224.873814] [ 224.873823] Allocated by task 7427: [ 224.873838] save_stack+0x43/0xd0 [ 224.873850] kasan_kmalloc+0xc7/0xe0 [ 224.873864] __kmalloc+0x14e/0x760 [ 224.873879] fscache_alloc_cookie+0x6f7/0x880 [ 224.873899] __fscache_acquire_cookie+0x230/0xb60 [ 224.879276] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 224.883211] nfs_fscache_get_client_cookie+0x463/0x600 [ 224.883226] nfs_alloc_client+0x563/0x760 [ 224.883240] nfs_get_client+0x8e8/0x14d0 [ 224.883254] nfs_init_server+0x357/0x1010 [ 224.883269] nfs_create_server+0x86/0x5f0 [ 224.883281] nfs_try_mount+0x180/0xa80 [ 224.883294] nfs_fs_mount+0x17f8/0x2f1c [ 224.883310] mount_fs+0xae/0x31d [ 224.891898] FSBase=00007fcf50e6a700 GSBase=ffff8801daf00000 TRBase=fffffe0000003000 [ 224.896795] vfs_kern_mount.part.35+0xdc/0x4f0 [ 224.896807] do_mount+0x581/0x31f0 [ 224.896819] ksys_mount+0x12d/0x140 [ 224.896831] __x64_sys_mount+0xbe/0x150 [ 224.896846] do_syscall_64+0x1b9/0x820 [ 224.896861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.896864] [ 224.896871] Freed by task 4465: [ 224.896887] save_stack+0x43/0xd0 [ 224.902564] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 224.907416] __kasan_slab_free+0x102/0x150 [ 224.907428] kasan_slab_free+0xe/0x10 [ 224.907442] kfree+0xcf/0x230 [ 224.907458] load_elf_binary+0x3e84/0x5620 [ 224.907473] search_binary_handler+0x17d/0x570 [ 224.907488] __do_execve_file.isra.33+0x162f/0x2540 [ 224.907502] __x64_sys_execve+0x8f/0xc0 [ 224.907521] do_syscall_64+0x1b9/0x820 [ 224.916032] CR0=0000000080050033 CR3=00000001bea92000 CR4=00000000001426e0 [ 224.920749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.920753] [ 224.920765] The buggy address belongs to the object at ffff8801c84f6040 [ 224.920765] which belongs to the cache kmalloc-32 of size 32 [ 224.920779] The buggy address is located 20 bytes inside of [ 224.920779] 32-byte region [ffff8801c84f6040, ffff8801c84f6060) [ 224.920785] The buggy address belongs to the page: [ 224.920806] page:ffffea0007213d80 count:1 mapcount:0 mapping:ffff8801da8001c0 index:0xffff8801c84f6fc1 [ 224.920820] flags: 0x2fffc0000000100(slab) [ 224.920840] raw: 02fffc0000000100 ffffea0007653848 ffff8801da801248 ffff8801da8001c0 [ 224.920857] raw: ffff8801c84f6fc1 ffff8801c84f6000 000000010000003f 0000000000000000 [ 224.920868] page dumped because: kasan: bad access detected [ 224.929699] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87c013a0 [ 224.930262] [ 224.930267] Memory state around the buggy address: [ 224.930279] ffff8801c84f5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 224.930290] ffff8801c84f5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 224.930301] >ffff8801c84f6000: fb fb fb fb fc fc fc fc 00 00 06 fc fc fc fc fc [ 224.930307] ^ [ 224.930317] ffff8801c84f6080: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 224.930332] ffff8801c84f6100: fb fb fb fb fc fc fc fc 00 06 fc fc fc fc fc fc [ 224.935847] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 224.941475] ================================================================== [ 224.941481] Disabling lock debugging due to kernel taint [ 224.958016] Kernel panic - not syncing: panic_on_warn set ... [ 224.958016] [ 224.963882] *** Control State *** [ 224.967020] CPU: 1 PID: 7427 Comm: syz-executor2 Tainted: G B 4.19.0-rc8+ #289 [ 224.967029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.967033] Call Trace: [ 224.967057] dump_stack+0x1c4/0x2b4 [ 224.972214] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 224.975429] ? dump_stack_print_info.cold.2+0x52/0x52 [ 224.975449] panic+0x238/0x4e7 [ 224.975466] ? add_taint.cold.5+0x16/0x16 [ 224.979722] EntryControls=0000d1ff ExitControls=002fefff [ 224.987382] ? preempt_schedule+0x4d/0x60 [ 224.987397] ? ___preempt_schedule+0x16/0x18 [ 224.987416] ? trace_hardirqs_on+0xb4/0x310 [ 224.992008] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 224.996039] kasan_end_report+0x47/0x4f [ 224.996053] kasan_report.cold.9+0x76/0x309 [ 224.996073] ? fscache_alloc_cookie+0x7ad/0x880 [ 225.001893] VMEntry: intr_info=8000030c errcode=00000000 ilen=00000000 [ 225.007029] __asan_report_load4_noabort+0x14/0x20 [ 225.007045] fscache_alloc_cookie+0x7ad/0x880 [ 225.007064] ? fscache_cookie_init_once+0x80/0x80 [ 225.012419] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 225.017071] ? rpcauth_cache_shrink_scan+0x180/0x180 [ 225.017088] ? __kmalloc_track_caller+0x14a/0x750 [ 225.017107] ? kstrdup+0x39/0x70 [ 225.022624] reason=80000021 qualification=0000000000000000 [ 225.027812] ? nfs_alloc_client+0x383/0x760 [ 225.027841] ? nfs_get_client+0x8e8/0x14d0 [ 225.027855] ? nfs_init_server+0x357/0x1010 [ 225.027873] ? nfs_create_server+0x86/0x5f0 [ 225.036111] IDTVectoring: info=00000000 errcode=00000000 [ 225.039960] ? nfs_fs_mount+0x17f8/0x2f1c [ 225.039972] ? mount_fs+0xae/0x31d [ 225.039987] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 225.039998] ? do_mount+0x581/0x31f0 [ 225.040013] ? ksys_mount+0x12d/0x140 [ 225.044674] TSC Offset = 0xffffff85612bb64c [ 225.048478] ? __x64_sys_mount+0xbe/0x150 [ 225.048493] ? do_syscall_64+0x1b9/0x820 [ 225.048517] __fscache_acquire_cookie+0x230/0xb60 [ 225.053841] EPT pointer = 0x00000001d804401e [ 225.057669] ? fscache_cookie_put+0x880/0x880 [ 225.057687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.057708] ? check_preemption_disabled+0x48/0x200 [ 225.091151] kobject: 'loop5' (00000000f6a04877): kobject_uevent_env [ 225.092290] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 225.092306] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 225.092321] ? rcu_pm_notify+0xc0/0xc0 [ 225.092365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.096609] kobject: 'loop5' (00000000f6a04877): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 225.100816] nfs_fscache_get_client_cookie+0x463/0x600 [ 225.100834] ? nfs_readpage_from_fscache_complete+0x200/0x200 [ 225.100854] nfs_alloc_client+0x563/0x760 [ 225.116699] kobject: 'loop4' (00000000a1be286e): kobject_uevent_env [ 225.117265] ? register_nfs_version+0x280/0x280 [ 225.117284] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 225.117306] nfs_get_client+0x8e8/0x14d0 [ 225.126222] kobject: 'loop4' (00000000a1be286e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 225.129814] ? kmem_cache_alloc_trace+0x152/0x750 [ 225.129830] ? mount_fs+0xae/0x31d [ 225.129853] ? nfs_put_client+0x30/0x30 [ 225.129873] ? nfs_alloc_server+0x5ca/0x730 [ 225.228191] kobject: 'loop4' (00000000a1be286e): kobject_uevent_env [ 225.229614] ? depot_save_stack+0x292/0x470 [ 225.229631] ? nfs_wait_client_init_complete+0x210/0x210 [ 225.229648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.229666] ? check_preemption_disabled+0x48/0x200 [ 225.229685] ? check_preemption_disabled+0x48/0x200 [ 225.235066] kobject: 'loop4' (00000000a1be286e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 225.239967] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 225.239983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 225.240002] nfs_init_server+0x357/0x1010 [ 225.367663] kobject: 'loop0' (000000009fc49141): kobject_uevent_env [ 225.372098] ? nfs_clone_server+0x920/0x920 [ 225.372112] ? nfs_alloc_fattr+0x48/0x1d0 [ 225.372131] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.376976] kobject: 'loop0' (000000009fc49141): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 225.383379] nfs_create_server+0x86/0x5f0 [ 225.383401] nfs_try_mount+0x180/0xa80 [ 226.055404] ? lock_downgrade+0x900/0x900 [ 226.059537] ? nfs_request_mount.constprop.18+0x920/0x920 [ 226.065053] ? kasan_check_read+0x11/0x20 [ 226.069199] ? do_raw_spin_unlock+0xa7/0x2f0 [ 226.073588] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 226.078149] ? kasan_check_write+0x14/0x20 [ 226.082401] ? do_raw_spin_lock+0xc1/0x200 [ 226.086632] ? _raw_spin_unlock+0x2c/0x50 [ 226.090762] ? find_nfs_version+0x138/0x190 [ 226.095064] nfs_fs_mount+0x17f8/0x2f1c [ 226.099021] ? nfs_show_options+0x250/0x250 [ 226.103321] ? nfs_clone_super+0x420/0x420 [ 226.107533] ? nfs_parse_mount_options+0x2660/0x2660 [ 226.112620] ? lock_downgrade+0x900/0x900 [ 226.116751] mount_fs+0xae/0x31d [ 226.120110] vfs_kern_mount.part.35+0xdc/0x4f0 [ 226.124675] ? may_umount+0xb0/0xb0 [ 226.128278] ? _raw_read_unlock+0x2c/0x50 [ 226.132405] ? __get_fs_type+0x97/0xc0 [ 226.136274] do_mount+0x581/0x31f0 [ 226.139800] ? copy_mount_string+0x40/0x40 [ 226.144017] ? copy_mount_options+0x5f/0x380 [ 226.148406] ? rcu_read_lock_sched_held+0x108/0x120 [ 226.153403] ? kmem_cache_alloc_trace+0x353/0x750 [ 226.158224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.163744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.169263] ? copy_mount_options+0x288/0x380 [ 226.173739] ksys_mount+0x12d/0x140 [ 226.177393] __x64_sys_mount+0xbe/0x150 [ 226.181353] do_syscall_64+0x1b9/0x820 [ 226.185229] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 226.190577] ? syscall_return_slowpath+0x5e0/0x5e0 [ 226.195484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.200310] ? trace_hardirqs_on_caller+0x310/0x310 [ 226.205322] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 226.210320] ? prepare_exit_to_usermode+0x291/0x3b0 [ 226.215320] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.220155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.225323] RIP: 0033:0x457569 [ 226.228495] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.247395] RSP: 002b:00007f55b4d47c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 226.255097] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 226.262382] RDX: 000000002015bffc RSI: 0000000020343ff8 RDI: 0000000020000080 [ 226.269649] RBP: 000000000072bf00 R08: 000000002000a000 R09: 0000000000000000 [ 226.276898] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55b4d486d4 [ 226.284147] R13: 00000000004c289b R14: 00000000004d3c78 R15: 00000000ffffffff [ 226.292252] Kernel Offset: disabled [ 226.295872] Rebooting in 86400 seconds..