[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.683786] kauditd_printk_skb: 7 callbacks suppressed [ 28.683797] audit: type=1800 audit(1543007090.091:29): pid=5861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.711622] audit: type=1800 audit(1543007090.091:30): pid=5861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.499460] sshd (5999) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.32' (ECDSA) to the list of known hosts. 2018/11/23 21:05:00 fuzzer started 2018/11/23 21:05:02 dialing manager at 10.128.0.26:46179 2018/11/23 21:05:02 syscalls: 1 2018/11/23 21:05:02 code coverage: enabled 2018/11/23 21:05:02 comparison tracing: enabled 2018/11/23 21:05:02 setuid sandbox: enabled 2018/11/23 21:05:02 namespace sandbox: enabled 2018/11/23 21:05:02 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/23 21:05:02 fault injection: enabled 2018/11/23 21:05:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/23 21:05:02 net packet injection: enabled 2018/11/23 21:05:02 net device setup: enabled 21:07:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000300)={@remote, @link_local, [{}], {@ipv6={0x86dd, {0x0, 0x6, "08d39e", 0x10, 0x0, 0x0, @local, @loopback, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d35d2e", 0x0, "ab5f38"}}}}}}}, &(0x7f0000000080)) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000180)=@can, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/50, 0x32}, 0x0) [ 210.593146] IPVS: ftp: loaded support on port[0] = 21 21:07:52 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) [ 210.883679] IPVS: ftp: loaded support on port[0] = 21 21:07:52 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bond0\x00', 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 211.132078] IPVS: ftp: loaded support on port[0] = 21 21:07:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000280)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @local}}]}, 0x110) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 211.671070] IPVS: ftp: loaded support on port[0] = 21 21:07:53 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x2, 0x0, @mcast2}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000029000000050000009602020100000016"], 0x18}}], 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3ffffeb, 0x0) [ 212.147680] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.162095] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.183653] device bridge_slave_0 entered promiscuous mode [ 212.303406] IPVS: ftp: loaded support on port[0] = 21 [ 212.328856] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.352764] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.370347] device bridge_slave_1 entered promiscuous mode [ 212.476702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.613908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.682796] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.691948] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.699494] device bridge_slave_0 entered promiscuous mode 21:07:54 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x6012, r2, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) [ 212.860693] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.885465] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.894776] device bridge_slave_1 entered promiscuous mode [ 212.988503] IPVS: ftp: loaded support on port[0] = 21 [ 213.021951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.061331] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.171001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.198119] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.339424] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.362313] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.369830] device bridge_slave_0 entered promiscuous mode [ 213.491395] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.503503] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.511007] device bridge_slave_1 entered promiscuous mode [ 213.552881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.575458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.608741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.624250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.734925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.748148] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.837910] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.871883] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.879518] device bridge_slave_0 entered promiscuous mode [ 213.897594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.936739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.033438] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.041271] team0: Port device team_slave_0 added [ 214.053315] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.059829] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.068688] device bridge_slave_1 entered promiscuous mode [ 214.077766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.112771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.162749] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.178235] team0: Port device team_slave_1 added [ 214.185401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.324866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.337832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.355947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.424671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.497975] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.508790] team0: Port device team_slave_0 added [ 214.525002] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.562027] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.579582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.588471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.616113] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.648966] team0: Port device team_slave_1 added [ 214.677849] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.702260] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.709838] device bridge_slave_0 entered promiscuous mode [ 214.732154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.740084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.754922] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.768591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.792096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.814802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.832572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.850663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.860792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.881482] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.894319] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.901836] device bridge_slave_1 entered promiscuous mode [ 214.912427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.919740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 214.933411] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.962818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.972746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.999781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.049247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.088331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.099055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.117692] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.142432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.153134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.235662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.288180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.313579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.331073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.370744] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.386857] team0: Port device team_slave_0 added [ 215.539700] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.562964] team0: Port device team_slave_1 added [ 215.619772] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.642764] team0: Port device team_slave_0 added [ 215.651152] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.725805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.733834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.750632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.776601] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.789331] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.813972] team0: Port device team_slave_1 added [ 215.823622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.830803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.858016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.899330] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.919107] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.944372] device bridge_slave_0 entered promiscuous mode [ 215.965367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.981087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.997049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.019770] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.032391] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.052317] device bridge_slave_1 entered promiscuous mode [ 216.060307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.082840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.091164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.111493] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.120443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.141534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.150332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.174520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.182471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.194251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.206329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.241944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.259890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.290711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.313280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.327898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.341649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.353871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.421990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.429949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.442752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.499833] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.506424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.513642] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.520014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.536373] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.549374] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.562949] team0: Port device team_slave_0 added [ 216.574344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.692140] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.703531] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.710980] team0: Port device team_slave_1 added [ 216.842803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.856524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.887467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.913153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.959537] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.975878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.003061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.035087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.059417] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.065888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.072611] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.079036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.095211] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.106961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.135578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.159670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.189910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.290149] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.308618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.318456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.528031] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.553173] team0: Port device team_slave_0 added [ 217.582005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.691873] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.703437] team0: Port device team_slave_1 added [ 217.811625] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.818180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.824995] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.831461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.854368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.872227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.885889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.903425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.022267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 218.029184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.038197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.077479] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.083970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.090697] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.097165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.106782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.152406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.159867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.183309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.239506] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.247927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.262976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.592541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.612975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.800924] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.807428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.814182] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.820567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.832315] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.636150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.661407] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.667880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.674693] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.681088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.707574] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.692084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.370208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.526572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.890303] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.026137] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.311551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.335836] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.350681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.363091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.494917] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.501175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.509000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.546328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.752117] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.896917] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.950386] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.064560] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.116973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.343052] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.350803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.369626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.625371] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.631562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.652464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.670320] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.712604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.838242] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.070882] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.160975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.222500] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.228663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.242519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.582027] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.600001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.615847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.645721] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.163185] 8021q: adding VLAN 0 to HW filter on device team0 21:08:08 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) 21:08:08 executing program 0: ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x27a6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb58906d6b66732e66617400100110000200040000f804", 0x17}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 21:08:08 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) [ 227.078178] FAT-fs (loop0): Directory bread(block 24) failed [ 227.122332] FAT-fs (loop0): Directory bread(block 25) failed [ 227.128268] FAT-fs (loop0): Directory bread(block 26) failed 21:08:08 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) [ 227.163016] FAT-fs (loop0): Directory bread(block 27) failed [ 227.183165] FAT-fs (loop0): Directory bread(block 28) failed [ 227.192008] FAT-fs (loop0): Directory bread(block 29) failed [ 227.220255] FAT-fs (loop0): Directory bread(block 30) failed [ 227.244766] FAT-fs (loop0): Directory bread(block 31) failed 21:08:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_subtree(r0, &(0x7f0000000080), 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000900)={0x5, @raw_data="505c631f862d8d38f4ea9bbd00d6e25e2efb4afa4fd49df79e5058d0ce4acc08a81b4eef32e733d658c9b38715fbb4f6fe4e9f19357b24983b35625498c8d32d94b89cce480fc78a24839298205853ed2e2f8917426319d51bcc54c7a3b8e5b5c9d579c985f2709e7c22429dde7e5524e2b767eb263c3dc79b47fc46fa003ab1150874efd688474d19b014e867b7651249f1a2cfd0c87fef34dd111b2a8c01290c62c27456cb98aef0a997ad1d903f83034d248b5898562375e855aa06e0277b482631802a496fdf"}) 21:08:08 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x83, &(0x7f0000000040)={0x0, 0x80000000001, 0x1, 0x2, 0x0, 0x0, 0x8, 0xe6}) eventfd(0x467) fcntl$getownex(r0, 0x10, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001c80)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000040), &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) 21:08:08 executing program 1: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2300000007ffff160065747a3065269dd03fe36400"], 0x15) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 21:08:08 executing program 0: syz_open_dev$midi(&(0x7f0000000400)='/dev/midi#\x00', 0x2, 0x403d) [ 227.510309] 9pnet: p9_errstr2errno: server reported unknown error etz0e&?d 21:08:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) times(0x0) 21:08:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 228.074443] IPVS: ftp: loaded support on port[0] = 21 21:08:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="1a"]}) close(r2) close(r1) 21:08:10 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x6012, r2, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) 21:08:10 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[]) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x8}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) sched_setaffinity(0x0, 0xffffffffffffffd9, &(0x7f0000000280)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000380)=0x1) close(r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@local, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="6e444d33a51e9f2d9e9fd1be89f123ce", 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) write$P9_RXATTRCREATE(r6, &(0x7f0000000140)={0x383}, 0x7) write$P9_RSETATTR(r6, &(0x7f0000000040)={0x7}, 0x7) sendfile(r3, r6, &(0x7f0000d83ff8)=0x29, 0x800000000024) r7 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa0, 0xa0, 0x7f}, {0x101, 0x1, 0x19, 0x596d, 0x96f3, 0x6, 0x1, 0x5}, {0x7, 0x7ff}, 0x29fcf899, 0x6e6bbf, 0x0, 0x1, 0x0, 0x3}, {{@in=@loopback, 0x4d5, 0x3f}, 0x0, @in6=@loopback, 0x3507, 0x4, 0x0, 0x4, 0xa, 0x0, 0x100000000}}, 0xe8) fdatasync(r7) 21:08:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) 21:08:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) times(0x0) 21:08:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 228.604202] x86/PAT: syz-executor5:7630 map pfn RAM range req write-combining for [mem 0x1820b0000-0x1820b3fff], got write-back [ 228.622535] x86/PAT: syz-executor5:7632 map pfn RAM range req write-combining for [mem 0x1820b0000-0x1820b3fff], got write-back [ 228.695205] FAT-fs (loop0): Directory bread(block 1) failed [ 228.709158] FAT-fs (loop0): Directory bread(block 2) failed [ 228.731499] FAT-fs (loop0): Directory bread(block 3) failed 21:08:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x77622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0xfffffffffffffda3, 0x800020, &(0x7f0000009000)}) 21:08:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) times(0x0) [ 228.744495] IPVS: ftp: loaded support on port[0] = 21 [ 228.755891] FAT-fs (loop0): Directory bread(block 4) failed [ 228.767279] FAT-fs (loop0): Directory bread(block 5) failed [ 228.790302] x86/PAT: syz-executor5:7651 map pfn RAM range req write-combining for [mem 0x182200000-0x182203fff], got write-back [ 228.793931] FAT-fs (loop0): Directory bread(block 6) failed [ 228.827529] FAT-fs (loop0): Directory bread(block 7) failed 21:08:10 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x6012, r2, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) [ 228.849724] FAT-fs (loop0): Directory bread(block 8) failed [ 228.859895] FAT-fs (loop0): Directory bread(block 9) failed [ 228.872713] FAT-fs (loop0): Directory bread(block 10) failed [ 228.890258] hrtimer: interrupt took 27544 ns 21:08:10 executing program 0: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 228.955379] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.990208] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.010792] x86/PAT: syz-executor5:7663 map pfn RAM range req write-combining for [mem 0x181cc0000-0x181cc3fff], got write-back [ 229.046707] binder_alloc: binder_alloc_mmap_handler: 7654 20000000-20002000 already mapped failed -16 [ 229.076414] binder: 7654:7660 got new transaction with bad transaction stack, transaction 2 has target 7654:0 [ 229.096069] binder: BINDER_SET_CONTEXT_MGR already set [ 229.131592] binder: 7654:7655 ioctl 40046207 0 returned -16 [ 229.148785] binder: 7654:7660 transaction failed 29201/-71, size 40-8 line 2884 [ 229.167267] binder: send failed reply for transaction 2 to 7654:7660 21:08:10 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, 0x0) 21:08:10 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x6012, r2, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) 21:08:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) times(0x0) [ 229.298932] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:08:10 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9}]}}}]}, 0x3c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 229.340812] x86/PAT: syz-executor5:7677 map pfn RAM range req write-combining for [mem 0x181f50000-0x181f53fff], got write-back 21:08:10 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r1) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004040)=""/4096, 0x1000}, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_flags=0x2}) 21:08:10 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000004e0007131dfffd946fa2830020090a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:08:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) write$binfmt_elf32(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="7f454c46ff0601060700000038000000ae01000001040000b1a62000010002000300ff0f0000018000000000000000007b0e0000800000000500000008000000fcffffff6c9800000000000000000000000000000000000053ae45e662efb6a3b9677427d242a0f0c117315569ad8ce7e72eaba2d7b4950babd40363000200000d86b2de02fbe8249ef1c5de15e3a844bfe2727e8bf0cdbae9df75a5d5ee4caba90263c7ae3ce1f1"], 0xa8) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) 21:08:11 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='n', 0x1}], 0x1, 0x4) 21:08:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000140)=0x54) 21:08:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000400)=""/129) 21:08:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000001c0)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) 21:08:11 executing program 0: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) write$binfmt_elf32(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="7f454c46ff0601060700000038000000ae01000001040000b1a62000010002000300ff0f0000018000000000000000007b0e0000800000000500000008000000fcffffff6c9800000000000000000000000000000000000053ae45e662efb6a3b9677427d242a0f0c117315569ad8ce7e72eaba2d7b4950babd40363000200000d86b2de02fbe8249ef1c5de15e3a844bfe2727e8bf0cdbae9df75a5d5ee4caba90263c7ae3ce1f1"], 0xa8) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) 21:08:11 executing program 5: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 229.894907] IPVS: ftp: loaded support on port[0] = 21 21:08:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) write$binfmt_elf32(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="7f454c46ff0601060700000038000000ae01000001040000b1a62000010002000300ff0f0000018000000000000000007b0e0000800000000500000008000000fcffffff6c9800000000000000000000000000000000000053ae45e662efb6a3b9677427d242a0f0c117315569ad8ce7e72eaba2d7b4950babd40363000200000d86b2de02fbe8249ef1c5de15e3a844bfe2727e8bf0cdbae9df75a5d5ee4caba90263c7ae3ce1f1"], 0xa8) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) 21:08:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000001c0)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) 21:08:11 executing program 4: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000001c0)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) 21:08:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) write$binfmt_elf32(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="7f454c46ff0601060700000038000000ae01000001040000b1a62000010002000300ff0f0000018000000000000000007b0e0000800000000500000008000000fcffffff6c9800000000000000000000000000000000000053ae45e662efb6a3b9677427d242a0f0c117315569ad8ce7e72eaba2d7b4950babd40363000200000d86b2de02fbe8249ef1c5de15e3a844bfe2727e8bf0cdbae9df75a5d5ee4caba90263c7ae3ce1f1"], 0xa8) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) 21:08:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000001c0)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) 21:08:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000140)=0x54) 21:08:12 executing program 5: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:12 executing program 3: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:12 executing program 0: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) write$binfmt_elf32(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="7f454c46ff0601060700000038000000ae01000001040000b1a62000010002000300ff0f0000018000000000000000007b0e0000800000000500000008000000fcffffff6c9800000000000000000000000000000000000053ae45e662efb6a3b9677427d242a0f0c117315569ad8ce7e72eaba2d7b4950babd40363000200000d86b2de02fbe8249ef1c5de15e3a844bfe2727e8bf0cdbae9df75a5d5ee4caba90263c7ae3ce1f1"], 0xa8) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) 21:08:12 executing program 4: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) write$binfmt_elf32(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="7f454c46ff0601060700000038000000ae01000001040000b1a62000010002000300ff0f0000018000000000000000007b0e0000800000000500000008000000fcffffff6c9800000000000000000000000000000000000053ae45e662efb6a3b9677427d242a0f0c117315569ad8ce7e72eaba2d7b4950babd40363000200000d86b2de02fbe8249ef1c5de15e3a844bfe2727e8bf0cdbae9df75a5d5ee4caba90263c7ae3ce1f1"], 0xa8) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) [ 230.843443] IPVS: ftp: loaded support on port[0] = 21 21:08:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) write$binfmt_elf32(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="7f454c46ff0601060700000038000000ae01000001040000b1a62000010002000300ff0f0000018000000000000000007b0e0000800000000500000008000000fcffffff6c9800000000000000000000000000000000000053ae45e662efb6a3b9677427d242a0f0c117315569ad8ce7e72eaba2d7b4950babd40363000200000d86b2de02fbe8249ef1c5de15e3a844bfe2727e8bf0cdbae9df75a5d5ee4caba90263c7ae3ce1f1"], 0xa8) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) 21:08:12 executing program 4: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:12 executing program 0: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:12 executing program 5: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:12 executing program 3: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev, @remote, @empty, 0x4, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 21:08:13 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) read(r0, &(0x7f0000000300)=""/128, 0x80) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000419000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@local, @broadcast}, &(0x7f0000000000)=0x8) 21:08:13 executing program 3: r0 = socket(0x1e, 0x2, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x5, &(0x7f0000ffb000/0x4000)=nil, 0x7) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x86000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000380)=""/247) msgctl$IPC_RMID(r4, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df8e0ba85312a0187080fa4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3632c12345e2174489e0eb0da74ae86b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec692effb7b672bb80ddd"], 0x7f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:08:13 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x9, @vbi}) 21:08:13 executing program 4: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0xdb) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000180)=""/45, &(0x7f00000001c0)=0x56b) 21:08:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="3e652e0f29f0260f0f2390f20f219a66b9ac0a00000f323ef20f1a5b00ba4100edfe47070f210866b8000000000f23c80f21f866350800f0000f23f8f3a5", 0x3e}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001380)={{{@in6, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000040)={0x7fffffff, 0xbff, &(0x7f0000000100)="82ed3731d16dd2865545853d8e1cf45037667b80afcce1636e46c065ab62dbf77946a1deb86df85a7b6aa5b795209b4304466f1f85861b80c5fa368b85c76f8a951b6e0ce6f00c9f66023575dbe5", 0x0, 0x4e}) [ 231.710405] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 21:08:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x6e0]}) 21:08:13 executing program 4: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x2b9) getsockopt$sock_cred(r0, 0x1, 0x14, 0x0, &(0x7f0000000440)) 21:08:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev, @remote, @empty, 0x4, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 231.774227] mmap: syz-executor2 (7805) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:08:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000002c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x9, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}}, 0xa0) 21:08:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev, @remote, @empty, 0x4, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 21:08:13 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000440)={0x20, 0x3, 'client1\x00', 0x2, "2305a3ae8eedef16", "8dcb9d354ba9e0d7f2485175da3c99296f2530786e1c173db69d40f7ac9b7c27", 0x4, 0x3be0}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f0000000300)="a6b6d309dc96c086c57f8cd1fb7d2064429bacd40ec0c52960f50a3e7b9b2893c65934415692ffedce05b90cd2a0f0a11fba17740c1b3c0e9cb81ed9fffe642bf6ee0d7003b2655917875e4ddb64eaa502aefde2c108b663d5da5b607c67e78b4ca57ec45f664956610a400830b7c7f7dc08d1b019c67f8fc336a9d77cd749240f593792a191f748fc3712cda416bf86cd2ca79b38763f4a5a3b2bdec5450ef5605045d1e03767a5356c1553b7d231fd75dc3f225caa73") bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r4, 0x80000001, 0x30}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={"7465616d5f736c6176655f3000000300", 0x200008000005}) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) close(0xffffffffffffffff) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) 21:08:13 executing program 1: mount(&(0x7f0000000000)=@sg0='u\ni!/#g0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) [ 232.197513] UBIFS error (pid: 7848): cannot open "u [ 232.197513] i!/#g0", error -22 [ 232.198224] UBIFS error (pid: 7848): cannot open "u [ 232.198224] i!/#g0", error -22 [ 232.305667] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.344311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 21:08:14 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000440)={0x20, 0x3, 'client1\x00', 0x2, "2305a3ae8eedef16", "8dcb9d354ba9e0d7f2485175da3c99296f2530786e1c173db69d40f7ac9b7c27", 0x4, 0x3be0}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f0000000300)="a6b6d309dc96c086c57f8cd1fb7d2064429bacd40ec0c52960f50a3e7b9b2893c65934415692ffedce05b90cd2a0f0a11fba17740c1b3c0e9cb81ed9fffe642bf6ee0d7003b2655917875e4ddb64eaa502aefde2c108b663d5da5b607c67e78b4ca57ec45f664956610a400830b7c7f7dc08d1b019c67f8fc336a9d77cd749240f593792a191f748fc3712cda416bf86cd2ca79b38763f4a5a3b2bdec5450ef5605045d1e03767a5356c1553b7d231fd75dc3f225caa73") bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r4, 0x80000001, 0x30}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={"7465616d5f736c6176655f3000000300", 0x200008000005}) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) close(0xffffffffffffffff) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) 21:08:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x6e0]}) 21:08:14 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev, @remote, @empty, 0x4, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 21:08:14 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") 21:08:14 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000440)={0x20, 0x3, 'client1\x00', 0x2, "2305a3ae8eedef16", "8dcb9d354ba9e0d7f2485175da3c99296f2530786e1c173db69d40f7ac9b7c27", 0x4, 0x3be0}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f0000000300)="a6b6d309dc96c086c57f8cd1fb7d2064429bacd40ec0c52960f50a3e7b9b2893c65934415692ffedce05b90cd2a0f0a11fba17740c1b3c0e9cb81ed9fffe642bf6ee0d7003b2655917875e4ddb64eaa502aefde2c108b663d5da5b607c67e78b4ca57ec45f664956610a400830b7c7f7dc08d1b019c67f8fc336a9d77cd749240f593792a191f748fc3712cda416bf86cd2ca79b38763f4a5a3b2bdec5450ef5605045d1e03767a5356c1553b7d231fd75dc3f225caa73") bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r4, 0x80000001, 0x30}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={"7465616d5f736c6176655f3000000300", 0x200008000005}) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) close(0xffffffffffffffff) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) 21:08:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="130000001000ffdde200f49ff60f050000230a009d000000110ac53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000", 0xb3) 21:08:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x6e0]}) [ 232.929090] netlink: 137 bytes leftover after parsing attributes in process `syz-executor0'. 21:08:14 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") [ 233.018081] netlink: 137 bytes leftover after parsing attributes in process `syz-executor0'. 21:08:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000002c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x9, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}}, 0xa0) 21:08:14 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000440)={0x20, 0x3, 'client1\x00', 0x2, "2305a3ae8eedef16", "8dcb9d354ba9e0d7f2485175da3c99296f2530786e1c173db69d40f7ac9b7c27", 0x4, 0x3be0}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f0000000300)="a6b6d309dc96c086c57f8cd1fb7d2064429bacd40ec0c52960f50a3e7b9b2893c65934415692ffedce05b90cd2a0f0a11fba17740c1b3c0e9cb81ed9fffe642bf6ee0d7003b2655917875e4ddb64eaa502aefde2c108b663d5da5b607c67e78b4ca57ec45f664956610a400830b7c7f7dc08d1b019c67f8fc336a9d77cd749240f593792a191f748fc3712cda416bf86cd2ca79b38763f4a5a3b2bdec5450ef5605045d1e03767a5356c1553b7d231fd75dc3f225caa73") bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r4, 0x80000001, 0x30}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={"7465616d5f736c6176655f3000000300", 0x200008000005}) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) close(0xffffffffffffffff) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) 21:08:14 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000440)={0x20, 0x3, 'client1\x00', 0x2, "2305a3ae8eedef16", "8dcb9d354ba9e0d7f2485175da3c99296f2530786e1c173db69d40f7ac9b7c27", 0x4, 0x3be0}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f0000000300)="a6b6d309dc96c086c57f8cd1fb7d2064429bacd40ec0c52960f50a3e7b9b2893c65934415692ffedce05b90cd2a0f0a11fba17740c1b3c0e9cb81ed9fffe642bf6ee0d7003b2655917875e4ddb64eaa502aefde2c108b663d5da5b607c67e78b4ca57ec45f664956610a400830b7c7f7dc08d1b019c67f8fc336a9d77cd749240f593792a191f748fc3712cda416bf86cd2ca79b38763f4a5a3b2bdec5450ef5605045d1e03767a5356c1553b7d231fd75dc3f225caa73") bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r4, 0x80000001, 0x30}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={"7465616d5f736c6176655f3000000300", 0x200008000005}) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) close(0xffffffffffffffff) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) 21:08:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x6e0]}) 21:08:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="130000001000ffdde200f49ff60f050000230a009d000000110ac53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000", 0xb3) 21:08:14 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") [ 233.233166] netlink: 137 bytes leftover after parsing attributes in process `syz-executor0'. 21:08:14 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") 21:08:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="130000001000ffdde200f49ff60f050000230a009d000000110ac53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000", 0xb3) 21:08:14 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") [ 233.390403] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready 21:08:14 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") [ 233.460205] netlink: 137 bytes leftover after parsing attributes in process `syz-executor0'. [ 233.480880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 21:08:15 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000440)={0x20, 0x3, 'client1\x00', 0x2, "2305a3ae8eedef16", "8dcb9d354ba9e0d7f2485175da3c99296f2530786e1c173db69d40f7ac9b7c27", 0x4, 0x3be0}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f0000000300)="a6b6d309dc96c086c57f8cd1fb7d2064429bacd40ec0c52960f50a3e7b9b2893c65934415692ffedce05b90cd2a0f0a11fba17740c1b3c0e9cb81ed9fffe642bf6ee0d7003b2655917875e4ddb64eaa502aefde2c108b663d5da5b607c67e78b4ca57ec45f664956610a400830b7c7f7dc08d1b019c67f8fc336a9d77cd749240f593792a191f748fc3712cda416bf86cd2ca79b38763f4a5a3b2bdec5450ef5605045d1e03767a5356c1553b7d231fd75dc3f225caa73") bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r4, 0x80000001, 0x30}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={"7465616d5f736c6176655f3000000300", 0x200008000005}) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) close(0xffffffffffffffff) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) 21:08:15 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000440)={0x20, 0x3, 'client1\x00', 0x2, "2305a3ae8eedef16", "8dcb9d354ba9e0d7f2485175da3c99296f2530786e1c173db69d40f7ac9b7c27", 0x4, 0x3be0}) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f0000000300)="a6b6d309dc96c086c57f8cd1fb7d2064429bacd40ec0c52960f50a3e7b9b2893c65934415692ffedce05b90cd2a0f0a11fba17740c1b3c0e9cb81ed9fffe642bf6ee0d7003b2655917875e4ddb64eaa502aefde2c108b663d5da5b607c67e78b4ca57ec45f664956610a400830b7c7f7dc08d1b019c67f8fc336a9d77cd749240f593792a191f748fc3712cda416bf86cd2ca79b38763f4a5a3b2bdec5450ef5605045d1e03767a5356c1553b7d231fd75dc3f225caa73") bind$unix(r3, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r4, 0x80000001, 0x30}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={"7465616d5f736c6176655f3000000300", 0x200008000005}) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) close(0xffffffffffffffff) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) 21:08:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000002c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x9, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}}, 0xa0) 21:08:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="130000001000ffdde200f49ff60f050000230a009d000000110ac53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000", 0xb3) 21:08:15 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") 21:08:15 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") 21:08:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)="636f6d6d0001dbd2a4084e8e9d6b4288ac58a7001d2bf0bd2c64c9ed3d58a657b5005ab106a5917026b21f54254cfa4c3d03fd654a83400815572c677c2ea4de864c898cba20d9a5810f388b7843310000000000000000000000") sendfile(r1, r0, 0x0, 0x79ffff00000011) [ 233.935318] netlink: 137 bytes leftover after parsing attributes in process `syz-executor0'. 21:08:15 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") 21:08:15 executing program 3: r0 = socket$inet6(0xa, 0x40000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 21:08:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) write(r1, &(0x7f0000000180)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 21:08:15 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)=0x80) read$eventfd(r0, &(0x7f0000000000), 0x8) 21:08:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x1c5000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0x6, 0xaee, 0x10000, 0x0, 0x0, [], [], [], 0xce4, 0x40}) close(r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4e40c2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r4, 0x7005) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) write$UHID_CREATE2(r4, &(0x7f00000004c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x62, 0xffff, 0x5de, 0x21dcaaee, 0x7, 0x2, "8ce9fec683f4450f1bb12b887ad7bc2d29596660f42ccb85a0f11a21e09107cd1ea5d7081b811073b78b430932098ce5358117423ff7a015692416901159bc7ab5da1f36cfb8ca957437324361fb655bdc05df27876d28d4e005ace7d6bfe46f51f7"}, 0x17a) ioprio_set$uid(0x3, 0x0, 0x401) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x9, 0x40, 0x1, 0x2, 0xc6d, 0xfffffffffffffff7, 0x400, {0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffffd, @loopback, 0x4}}, 0x9, 0x4, 0x100000001, 0x7, 0x1}}, &(0x7f0000000400)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f000000a680)={0x0, 0xa7, "60b6a8b35e742d1b46e7a22bdd40b6aac562023f1ab850bf3b9e013d43eee0ea7276e6a6ac4ecc3af102e1ad9e07e84a7d78e269a558c222ba2aeacbfa22f711efb5881a6ed6d96066eba44350d130535721fa824ec72a87bfca10636e709ebc78ee59e3639f7b65af1cf2fb1582230bff76c60f05de72c1e687d6c4f4a73955b9057e460e1ef17d151687fe11dc964d749abba7b4065823d051284bba00a9a0ac6dcc7e7264a5"}, &(0x7f000000a740)=0xaf) ptrace$setsig(0x4203, r3, 0x9, &(0x7f0000000500)={0x29, 0x40, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@empty, r6}, 0x14) 21:08:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=@newtaction={0x54, 0x30, 0x701, 0x0, 0x0, {}, [{0x40, 0x1, @m_connmark={0x3c, 0x0, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c}}, {0x4}}}}]}, 0x54}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924924924924f0, 0x0) 21:08:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a000900000000008568f1ffffff0400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 234.403173] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 21:08:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000002c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x9, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}}, 0xa0) 21:08:15 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x300, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0xc000000000, 0x7}, &(0x7f0000000040)=0x98) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @broadcast}}, 0x0, 0x7fffffff, 0x1800000000000000, 0x6}, &(0x7f00000003c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x7, 0x8000}, 0x4) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0xfffffffffffffff9, 0x101, 0x1, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x9, 0x4, 0x9000}, 0x4) socket$inet6(0xa, 0x3, 0xfffffffffffffffc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000480)) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85") 21:08:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x7b, 0x0, [0x0, 0x0, 0x17b]}) 21:08:15 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)=0x80) read$eventfd(r0, &(0x7f0000000000), 0x8) 21:08:15 executing program 2: mmap(&(0x7f00008a4000/0x6000)=nil, 0x6000, 0x0, 0x400000000000031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000140)={{&(0x7f00008a6000/0x4000)=nil, 0x4000}}) move_pages(0x0, 0x24c, &(0x7f0000000040)=[&(0x7f0000cb8000/0x3000)=nil], &(0x7f0000003b80), &(0x7f0000000080), 0x0) 21:08:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='rdma.max\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r2, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") write$cgroup_int(r1, 0x0, 0x0) 21:08:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000340)="646374637000056ebc5901f6cbcd414ae37606b3d5fef67ace36e6306b72d5df31213f22e6c6955f62dda8db5d3bac1dbadb20566989373aa7071966f430afa932b7d921db9ed03a476512d9fb506001424eba69ba36aec456b47edb4804bc3f473977b9fda20603f2c1f88379e5abd6556aa8d601a6ff6c395186f282d7d11f62d651c94fc6a6c49eba4a54805006be83a6eafaf1b7d123a341874c7d91686ae43ccd62206e11a5558533fd2065d84ba133aeefd7cdb05633de55f27b8a00000000000000000000000000000000", 0x5) sendto$inet6(r1, &(0x7f0000000100), 0x8d2d601e8976aa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 21:08:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)={0x100000000000000b, 0x0, [{0x40000081}]}) 21:08:16 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)=0x80) read$eventfd(r0, &(0x7f0000000000), 0x8) 21:08:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x1c5000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0x6, 0xaee, 0x10000, 0x0, 0x0, [], [], [], 0xce4, 0x40}) close(r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4e40c2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r4, 0x7005) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) write$UHID_CREATE2(r4, &(0x7f00000004c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x62, 0xffff, 0x5de, 0x21dcaaee, 0x7, 0x2, "8ce9fec683f4450f1bb12b887ad7bc2d29596660f42ccb85a0f11a21e09107cd1ea5d7081b811073b78b430932098ce5358117423ff7a015692416901159bc7ab5da1f36cfb8ca957437324361fb655bdc05df27876d28d4e005ace7d6bfe46f51f7"}, 0x17a) ioprio_set$uid(0x3, 0x0, 0x401) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x9, 0x40, 0x1, 0x2, 0xc6d, 0xfffffffffffffff7, 0x400, {0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffffd, @loopback, 0x4}}, 0x9, 0x4, 0x100000001, 0x7, 0x1}}, &(0x7f0000000400)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f000000a680)={0x0, 0xa7, "60b6a8b35e742d1b46e7a22bdd40b6aac562023f1ab850bf3b9e013d43eee0ea7276e6a6ac4ecc3af102e1ad9e07e84a7d78e269a558c222ba2aeacbfa22f711efb5881a6ed6d96066eba44350d130535721fa824ec72a87bfca10636e709ebc78ee59e3639f7b65af1cf2fb1582230bff76c60f05de72c1e687d6c4f4a73955b9057e460e1ef17d151687fe11dc964d749abba7b4065823d051284bba00a9a0ac6dcc7e7264a5"}, &(0x7f000000a740)=0xaf) ptrace$setsig(0x4203, r3, 0x9, &(0x7f0000000500)={0x29, 0x40, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@empty, r6}, 0x14) 21:08:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='rdma.max\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r2, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") write$cgroup_int(r1, 0x0, 0x0) [ 234.947984] syz-executor3 (7961) used greatest stack depth: 15416 bytes left 21:08:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='rdma.max\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r2, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") write$cgroup_int(r1, 0x0, 0x0) 21:08:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000640)=[@text16={0x10, &(0x7f00000005c0)="0f01cff2dad60f08b8a1000f00d06766c7442400285a5e0b6766c7442402a27f00006766c744240600000000670f011424baf80c66b85a87208666efbafc0cb80098efba4000ed66b9800000c00f326635002000000f3026643e0f219e8fe900016fff"}], 0x1, 0x0, &(0x7f0000000480), 0x10000058) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)=ANY=[@ANYBLOB]) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000540)) 21:08:16 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)=0x80) read$eventfd(r0, &(0x7f0000000000), 0x8) 21:08:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x0, &(0x7f0000000000), 0x17a) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:08:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='rdma.max\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r2, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") write$cgroup_int(r1, 0x0, 0x0) 21:08:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) getgid() 21:08:17 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@loopback, 0x0, 0x1, 0x0, 0xd}, 0x20) 21:08:17 executing program 1: prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL_GET(0x22) 21:08:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x1c5000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0x6, 0xaee, 0x10000, 0x0, 0x0, [], [], [], 0xce4, 0x40}) close(r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4e40c2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r4, 0x7005) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) write$UHID_CREATE2(r4, &(0x7f00000004c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x62, 0xffff, 0x5de, 0x21dcaaee, 0x7, 0x2, "8ce9fec683f4450f1bb12b887ad7bc2d29596660f42ccb85a0f11a21e09107cd1ea5d7081b811073b78b430932098ce5358117423ff7a015692416901159bc7ab5da1f36cfb8ca957437324361fb655bdc05df27876d28d4e005ace7d6bfe46f51f7"}, 0x17a) ioprio_set$uid(0x3, 0x0, 0x401) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x9, 0x40, 0x1, 0x2, 0xc6d, 0xfffffffffffffff7, 0x400, {0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffffd, @loopback, 0x4}}, 0x9, 0x4, 0x100000001, 0x7, 0x1}}, &(0x7f0000000400)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f000000a680)={0x0, 0xa7, "60b6a8b35e742d1b46e7a22bdd40b6aac562023f1ab850bf3b9e013d43eee0ea7276e6a6ac4ecc3af102e1ad9e07e84a7d78e269a558c222ba2aeacbfa22f711efb5881a6ed6d96066eba44350d130535721fa824ec72a87bfca10636e709ebc78ee59e3639f7b65af1cf2fb1582230bff76c60f05de72c1e687d6c4f4a73955b9057e460e1ef17d151687fe11dc964d749abba7b4065823d051284bba00a9a0ac6dcc7e7264a5"}, &(0x7f000000a740)=0xaf) ptrace$setsig(0x4203, r3, 0x9, &(0x7f0000000500)={0x29, 0x40, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@empty, r6}, 0x14) 21:08:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x18, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x7592da05}, [@nested={0x4, 0x2a}]}, 0x18}}, 0x0) 21:08:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x0, &(0x7f0000000000), 0x17a) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:08:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045515, &(0x7f0000000240)={0x81}) 21:08:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000400)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@locktable={'locktable', 0x3d, 'dh\x00'}}]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @rand_addr=0x8}}}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x14, 0x0, 0x408}, 0x14}}, 0x44000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) [ 236.134405] usb usb9: usbfs: process 8055 (syz-executor1) did not claim interface 0 before use [ 236.544611] gfs2: fsid=dh: Trying to join cluster "lock_nolock", "dh" [ 236.561923] gfs2: fsid=dh: Now mounting FS... [ 236.586527] gfs2: not a GFS2 filesystem [ 236.598058] gfs2: fsid=dh: can't read superblock [ 236.610185] gfs2: fsid=dh: can't read superblock: -22 21:08:18 executing program 1: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000180)=@in6={0xa, 0x4e24, 0x0, @local, 0x6}, 0x1c, &(0x7f0000000400)}, 0x10008000) sendto$inet6(r0, &(0x7f0000000b40)='d', 0x1, 0x0, 0x0, 0x0) 21:08:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x0, &(0x7f0000000000), 0x17a) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:08:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000640)=[@text16={0x10, &(0x7f00000005c0)="0f01cff2dad60f08b8a1000f00d06766c7442400285a5e0b6766c7442402a27f00006766c744240600000000670f011424baf80c66b85a87208666efbafc0cb80098efba4000ed66b9800000c00f326635002000000f3026643e0f219e8fe900016fff"}], 0x1, 0x0, &(0x7f0000000480), 0x10000058) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)=ANY=[@ANYBLOB]) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000540)) 21:08:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) getgid() [ 236.652089] syz-executor3 (8044) used greatest stack depth: 15224 bytes left 21:08:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x1c5000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0x6, 0xaee, 0x10000, 0x0, 0x0, [], [], [], 0xce4, 0x40}) close(r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4e40c2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r4, 0x7005) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) write$UHID_CREATE2(r4, &(0x7f00000004c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x62, 0xffff, 0x5de, 0x21dcaaee, 0x7, 0x2, "8ce9fec683f4450f1bb12b887ad7bc2d29596660f42ccb85a0f11a21e09107cd1ea5d7081b811073b78b430932098ce5358117423ff7a015692416901159bc7ab5da1f36cfb8ca957437324361fb655bdc05df27876d28d4e005ace7d6bfe46f51f7"}, 0x17a) ioprio_set$uid(0x3, 0x0, 0x401) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x9, 0x40, 0x1, 0x2, 0xc6d, 0xfffffffffffffff7, 0x400, {0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffffd, @loopback, 0x4}}, 0x9, 0x4, 0x100000001, 0x7, 0x1}}, &(0x7f0000000400)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f000000a680)={0x0, 0xa7, "60b6a8b35e742d1b46e7a22bdd40b6aac562023f1ab850bf3b9e013d43eee0ea7276e6a6ac4ecc3af102e1ad9e07e84a7d78e269a558c222ba2aeacbfa22f711efb5881a6ed6d96066eba44350d130535721fa824ec72a87bfca10636e709ebc78ee59e3639f7b65af1cf2fb1582230bff76c60f05de72c1e687d6c4f4a73955b9057e460e1ef17d151687fe11dc964d749abba7b4065823d051284bba00a9a0ac6dcc7e7264a5"}, &(0x7f000000a740)=0xaf) ptrace$setsig(0x4203, r3, 0x9, &(0x7f0000000500)={0x29, 0x40, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@empty, r6}, 0x14) 21:08:18 executing program 1: pipe(0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580), 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fc, &(0x7f0000000400)="8bbf1962f3514175e75b8035eed719d6bc50ce6fae825353ecfe335bfd22a6c3bc4862229501da779092e071d836851f28776c2781a7d5b89a1176af3bc4f3f01ccd81c21fddb7c0a65a2c061ccd9c55e78edbbc5f52da31d3b566b6ff133af33ef4319c5f27a0dfa873143b885768d9cbc7f7aefafad31256f5f0954886a42353ef7a72c99d778f7decc4081a5e6e5cf588dd7da03eeb8c3351dece8f47") getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x84000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000010) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000008c0)) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) 21:08:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) getgid() 21:08:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x0, &(0x7f0000000000), 0x17a) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:08:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) getgid() 21:08:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000400)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@locktable={'locktable', 0x3d, 'dh\x00'}}]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @rand_addr=0x8}}}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x14, 0x0, 0x408}, 0x14}}, 0x44000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) 21:08:19 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0xad) getsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000534000), &(0x7f0000000080)=0x4) 21:08:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000640)=[@text16={0x10, &(0x7f00000005c0)="0f01cff2dad60f08b8a1000f00d06766c7442400285a5e0b6766c7442402a27f00006766c744240600000000670f011424baf80c66b85a87208666efbafc0cb80098efba4000ed66b9800000c00f326635002000000f3026643e0f219e8fe900016fff"}], 0x1, 0x0, &(0x7f0000000480), 0x10000058) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)=ANY=[@ANYBLOB]) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000540)) 21:08:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) 21:08:19 executing program 1: pipe(0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580), 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fc, &(0x7f0000000400)="8bbf1962f3514175e75b8035eed719d6bc50ce6fae825353ecfe335bfd22a6c3bc4862229501da779092e071d836851f28776c2781a7d5b89a1176af3bc4f3f01ccd81c21fddb7c0a65a2c061ccd9c55e78edbbc5f52da31d3b566b6ff133af33ef4319c5f27a0dfa873143b885768d9cbc7f7aefafad31256f5f0954886a42353ef7a72c99d778f7decc4081a5e6e5cf588dd7da03eeb8c3351dece8f47") getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x84000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000010) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000008c0)) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) [ 237.835944] gfs2: fsid=dh: Trying to join cluster "lock_nolock", "dh" 21:08:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@get={0x1, &(0x7f00000000c0)=""/90, 0x1}) [ 237.882015] gfs2: fsid=dh: Now mounting FS... [ 237.901082] gfs2: not a GFS2 filesystem 21:08:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 237.942093] gfs2: fsid=dh: can't read superblock [ 237.952177] gfs2: fsid=dh: can't read superblock: -22 21:08:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f00000000c0)="2400000052001f0014f9f407000904000a00071008000100feffffff0800000000000000", 0x24) 21:08:19 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000000c0)={0x9, @capture={0x0, 0x0, {0x0, 0x42a7}}}) [ 238.154642] ptrace attach of "/root/syz-executor5"[6180] was attempted by "/root/syz-executor5"[8149] 21:08:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 21:08:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 21:08:19 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000000c0)={0x9, @capture={0x0, 0x0, {0x0, 0x42a7}}}) [ 238.402372] ptrace attach of "/root/syz-executor5"[6180] was attempted by "/root/syz-executor5"[8159] [ 238.465650] ptrace attach of "/root/syz-executor4"[6133] was attempted by "/root/syz-executor4"[8164] 21:08:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000400)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@locktable={'locktable', 0x3d, 'dh\x00'}}]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @rand_addr=0x8}}}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x14, 0x0, 0x408}, 0x14}}, 0x44000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) 21:08:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000640)=[@text16={0x10, &(0x7f00000005c0)="0f01cff2dad60f08b8a1000f00d06766c7442400285a5e0b6766c7442402a27f00006766c744240600000000670f011424baf80c66b85a87208666efbafc0cb80098efba4000ed66b9800000c00f326635002000000f3026643e0f219e8fe900016fff"}], 0x1, 0x0, &(0x7f0000000480), 0x10000058) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)=ANY=[@ANYBLOB]) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000540)) 21:08:20 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000000c0)={0x9, @capture={0x0, 0x0, {0x0, 0x42a7}}}) 21:08:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 238.773562] ptrace attach of "/root/syz-executor5"[6180] was attempted by "/root/syz-executor5"[8177] 21:08:20 executing program 1: pipe(0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580), 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fc, &(0x7f0000000400)="8bbf1962f3514175e75b8035eed719d6bc50ce6fae825353ecfe335bfd22a6c3bc4862229501da779092e071d836851f28776c2781a7d5b89a1176af3bc4f3f01ccd81c21fddb7c0a65a2c061ccd9c55e78edbbc5f52da31d3b566b6ff133af33ef4319c5f27a0dfa873143b885768d9cbc7f7aefafad31256f5f0954886a42353ef7a72c99d778f7decc4081a5e6e5cf588dd7da03eeb8c3351dece8f47") getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x84000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000010) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000008c0)) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) 21:08:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 21:08:20 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000000c0)={0x9, @capture={0x0, 0x0, {0x0, 0x42a7}}}) 21:08:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 238.926523] gfs2: fsid=dh: Trying to join cluster "lock_nolock", "dh" [ 238.967164] gfs2: fsid=dh: Now mounting FS... [ 238.976662] ptrace attach of "/root/syz-executor4"[6133] was attempted by "/root/syz-executor4"[8190] 21:08:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) [ 239.020081] gfs2: not a GFS2 filesystem [ 239.035053] gfs2: fsid=dh: can't read superblock [ 239.058701] gfs2: fsid=dh: can't read superblock: -22 [ 239.063555] ptrace attach of "/root/syz-executor5"[6180] was attempted by "/root/syz-executor5"[8193] 21:08:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 21:08:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x6, 0xe, &(0x7f0000000000)={{{@in, @in6=@local}}, {{@in=@dev}, 0x0, @in=@broadcast}}, 0xd7) [ 239.254962] ptrace attach of "/root/syz-executor4"[6133] was attempted by "/root/syz-executor4"[8206] 21:08:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='io.stat\x00') 21:08:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000400)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@locktable={'locktable', 0x3d, 'dh\x00'}}]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @rand_addr=0x8}}}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x14, 0x0, 0x408}, 0x14}}, 0x44000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) 21:08:21 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000040)=0x18) 21:08:21 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0xc00a) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) [ 239.740716] audit: type=1800 audit(1543007301.141:31): pid=8218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16615 res=0 21:08:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) [ 239.998820] gfs2: fsid=dh: Trying to join cluster "lock_nolock", "dh" [ 240.028951] gfs2: fsid=dh: Now mounting FS... 21:08:21 executing program 1: pipe(0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580), 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fc, &(0x7f0000000400)="8bbf1962f3514175e75b8035eed719d6bc50ce6fae825353ecfe335bfd22a6c3bc4862229501da779092e071d836851f28776c2781a7d5b89a1176af3bc4f3f01ccd81c21fddb7c0a65a2c061ccd9c55e78edbbc5f52da31d3b566b6ff133af33ef4319c5f27a0dfa873143b885768d9cbc7f7aefafad31256f5f0954886a42353ef7a72c99d778f7decc4081a5e6e5cf588dd7da03eeb8c3351dece8f47") getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x84000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000010) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000008c0)) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) 21:08:21 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0xc00a) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 21:08:21 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000040)=0x18) 21:08:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x31, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 240.068645] gfs2: not a GFS2 filesystem [ 240.094172] gfs2: fsid=dh: can't read superblock [ 240.111695] audit: type=1800 audit(1543007301.511:32): pid=8241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16633 res=0 [ 240.120614] gfs2: fsid=dh: can't read superblock: -22 21:08:21 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000040)=0x18) 21:08:21 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0xc00a) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 21:08:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x80044dfc, &(0x7f0000000000)) [ 240.325434] audit: type=1800 audit(1543007301.731:33): pid=8254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16630 res=0 21:08:21 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0xc00a) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) [ 240.451392] audit: type=1800 audit(1543007301.851:34): pid=8260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16630 res=0 21:08:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x15, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0xff, 0xc3, &(0x7f0000000080)=""/195}, 0x48) 21:08:22 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000040)=0x18) 21:08:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x80044dfc, &(0x7f0000000000)) 21:08:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x80044dfc, &(0x7f0000000000)) 21:08:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000002c0)={0xa, 0x2, 0x7, 0x0, 0x3, 0x1, 0x101, 0x5, 0x80, 0x6, 0x10001, 0x8, 0x0, 0x2, 0xd3a, 0x0, 0x7, 0x2, 0xffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="2e0bdc84e6515f2aa9c3126d4599144af1027b75403acc46a254e66d1dc5670d8519fb27394e3c5551b8f8791ca62c57f64ef9ce3e1ac27518f506eb8045c497505c230538051fbb9ff403f0f0c87ad77e0742e1027f46825e987510554bccc780ae50a77190d7c2023c53cc7bdf9986e7fd212be4679fff203680d4f3e17487b69abe20e85717c4ac872207a75ee6220daed59d2915a1ab4e401fe412949a255ec6d7d33ed9f7862c7becb0768f57f94e379ae60d66a08325001cf844071e569b7f6a8206e6555631db4445e4c3458ec7aef70cce84a9c6377b20e5fe47ad4057440b9a29262795292c58b2"], 0x1}}, 0x44801) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) sendmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f0000004c80)=@nl=@kern={0x10, 0x0, 0x0, 0x40}, 0x80, &(0x7f0000004f40)=[{&(0x7f0000004e80)="0c2081dffd2c717b8ecb012a731292d4cd9e20eff73a98ff9b19e96525b8187eda48c85fff90e0f89c30b13abadf8832ca5ffa9bb8c2b239b7e89629878a502fbd44fad4bb1076ec4367f70444b0a60a58c25acbe6c437a2a7a5873fd066eafbfe206664c7bafa299767701abfea566dc1aff71b44171eba66c84385330b6082b856c7", 0x83}], 0x1, 0x0, 0x0, 0x8000}, 0x35c}], 0x1, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x2) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000300), 0x8) 21:08:22 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x400c0930, 0x0) 21:08:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x80044dfc, &(0x7f0000000000)) 21:08:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6, 0x1, 0x0, 0x0, 0x0, 0x794a71a6}, &(0x7f0000000200)=0x98) socket$alg(0x26, 0x5, 0x0) sendto$inet6(r0, &(0x7f00000006c0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x2000000000001, @mcast2, 0x1ff}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00001afff8)={0x0, 0x2000000001}, 0x3d7) write(0xffffffffffffffff, &(0x7f00005f1fe3), 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) chown(&(0x7f0000000280)='./file0/f.le.\x00', r2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000680)='/dev/dmmidi#\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f00000005c0)) r4 = getpgrp(0xffffffffffffffff) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000640)) getpgid(r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x14000000) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x6, 0x40) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000140)) 21:08:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0xffff0000, 0x1a, 0x1707, {0x0, &(0x7f0000000280)}}, 0x20) 21:08:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:23 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(r1, &(0x7f0000001500)=[{&(0x7f0000000040)="89", 0x1}], 0x1) 21:08:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clone(0x80a102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 241.765462] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) [ 241.825923] FAT-fs (loop1): Filesystem has been set read-only 21:08:23 executing program 4: syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0xc4c85513, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, "1059493481b639195a8a2dd9ee3ff7e9c50e58fe75430138d7f00cfe322bea8af5c4de2e32bb0a6e99f963f4"}) 21:08:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:08:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000002c0)={0xa, 0x2, 0x7, 0x0, 0x3, 0x1, 0x101, 0x5, 0x80, 0x6, 0x10001, 0x8, 0x0, 0x2, 0xd3a, 0x0, 0x7, 0x2, 0xffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="2e0bdc84e6515f2aa9c3126d4599144af1027b75403acc46a254e66d1dc5670d8519fb27394e3c5551b8f8791ca62c57f64ef9ce3e1ac27518f506eb8045c497505c230538051fbb9ff403f0f0c87ad77e0742e1027f46825e987510554bccc780ae50a77190d7c2023c53cc7bdf9986e7fd212be4679fff203680d4f3e17487b69abe20e85717c4ac872207a75ee6220daed59d2915a1ab4e401fe412949a255ec6d7d33ed9f7862c7becb0768f57f94e379ae60d66a08325001cf844071e569b7f6a8206e6555631db4445e4c3458ec7aef70cce84a9c6377b20e5fe47ad4057440b9a29262795292c58b2"], 0x1}}, 0x44801) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) sendmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f0000004c80)=@nl=@kern={0x10, 0x0, 0x0, 0x40}, 0x80, &(0x7f0000004f40)=[{&(0x7f0000004e80)="0c2081dffd2c717b8ecb012a731292d4cd9e20eff73a98ff9b19e96525b8187eda48c85fff90e0f89c30b13abadf8832ca5ffa9bb8c2b239b7e89629878a502fbd44fad4bb1076ec4367f70444b0a60a58c25acbe6c437a2a7a5873fd066eafbfe206664c7bafa299767701abfea566dc1aff71b44171eba66c84385330b6082b856c7", 0x83}], 0x1, 0x0, 0x0, 0x8000}, 0x35c}], 0x1, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x2) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000300), 0x8) 21:08:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) kexec_load(0xc0a10420, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d3e47000, 0x1000000}], 0x3e0000000000) 21:08:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0xe0ff) 21:08:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6, 0x1, 0x0, 0x0, 0x0, 0x794a71a6}, &(0x7f0000000200)=0x98) socket$alg(0x26, 0x5, 0x0) sendto$inet6(r0, &(0x7f00000006c0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x2000000000001, @mcast2, 0x1ff}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00001afff8)={0x0, 0x2000000001}, 0x3d7) write(0xffffffffffffffff, &(0x7f00005f1fe3), 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) chown(&(0x7f0000000280)='./file0/f.le.\x00', r2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000680)='/dev/dmmidi#\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f00000005c0)) r4 = getpgrp(0xffffffffffffffff) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000640)) getpgid(r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x14000000) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x6, 0x40) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000140)) [ 242.421463] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:08:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:08:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) 21:08:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:08:24 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='sysfs\x00', 0x10000, &(0x7f000000a000)) listxattr(&(0x7f0000000100)='./file0/../file0\x00', 0xfffffffffffffffe, 0x2) [ 242.937722] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) [ 243.008889] FAT-fs (loop1): Filesystem has been set read-only 21:08:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0xe0ff) 21:08:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0xe0ff) 21:08:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:08:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000240)="220000002000070700be0000090007010a00001e00003c0000ff040405000c008000", 0x22) 21:08:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000002c0)={0xa, 0x2, 0x7, 0x0, 0x3, 0x1, 0x101, 0x5, 0x80, 0x6, 0x10001, 0x8, 0x0, 0x2, 0xd3a, 0x0, 0x7, 0x2, 0xffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="2e0bdc84e6515f2aa9c3126d4599144af1027b75403acc46a254e66d1dc5670d8519fb27394e3c5551b8f8791ca62c57f64ef9ce3e1ac27518f506eb8045c497505c230538051fbb9ff403f0f0c87ad77e0742e1027f46825e987510554bccc780ae50a77190d7c2023c53cc7bdf9986e7fd212be4679fff203680d4f3e17487b69abe20e85717c4ac872207a75ee6220daed59d2915a1ab4e401fe412949a255ec6d7d33ed9f7862c7becb0768f57f94e379ae60d66a08325001cf844071e569b7f6a8206e6555631db4445e4c3458ec7aef70cce84a9c6377b20e5fe47ad4057440b9a29262795292c58b2"], 0x1}}, 0x44801) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) sendmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f0000004c80)=@nl=@kern={0x10, 0x0, 0x0, 0x40}, 0x80, &(0x7f0000004f40)=[{&(0x7f0000004e80)="0c2081dffd2c717b8ecb012a731292d4cd9e20eff73a98ff9b19e96525b8187eda48c85fff90e0f89c30b13abadf8832ca5ffa9bb8c2b239b7e89629878a502fbd44fad4bb1076ec4367f70444b0a60a58c25acbe6c437a2a7a5873fd066eafbfe206664c7bafa299767701abfea566dc1aff71b44171eba66c84385330b6082b856c7", 0x83}], 0x1, 0x0, 0x0, 0x8000}, 0x35c}], 0x1, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x2) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000300), 0x8) 21:08:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000040)='%d') socket$kcm(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xffffff6f) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)}, 0x10) 21:08:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000080)="766574000000000000000000bd6800") 21:08:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6, 0x1, 0x0, 0x0, 0x0, 0x794a71a6}, &(0x7f0000000200)=0x98) socket$alg(0x26, 0x5, 0x0) sendto$inet6(r0, &(0x7f00000006c0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x2000000000001, @mcast2, 0x1ff}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00001afff8)={0x0, 0x2000000001}, 0x3d7) write(0xffffffffffffffff, &(0x7f00005f1fe3), 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) chown(&(0x7f0000000280)='./file0/f.le.\x00', r2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000680)='/dev/dmmidi#\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f00000005c0)) r4 = getpgrp(0xffffffffffffffff) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000640)) getpgid(r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x14000000) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file0/f.le.\x00', 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x6, 0x40) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000140)) 21:08:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0xe0ff) 21:08:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0xe0ff) 21:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000002c0)={0xa, 0x2, 0x7, 0x0, 0x3, 0x1, 0x101, 0x5, 0x80, 0x6, 0x10001, 0x8, 0x0, 0x2, 0xd3a, 0x0, 0x7, 0x2, 0xffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="2e0bdc84e6515f2aa9c3126d4599144af1027b75403acc46a254e66d1dc5670d8519fb27394e3c5551b8f8791ca62c57f64ef9ce3e1ac27518f506eb8045c497505c230538051fbb9ff403f0f0c87ad77e0742e1027f46825e987510554bccc780ae50a77190d7c2023c53cc7bdf9986e7fd212be4679fff203680d4f3e17487b69abe20e85717c4ac872207a75ee6220daed59d2915a1ab4e401fe412949a255ec6d7d33ed9f7862c7becb0768f57f94e379ae60d66a08325001cf844071e569b7f6a8206e6555631db4445e4c3458ec7aef70cce84a9c6377b20e5fe47ad4057440b9a29262795292c58b2"], 0x1}}, 0x44801) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) sendmmsg(r1, &(0x7f0000004f80)=[{{&(0x7f0000004c80)=@nl=@kern={0x10, 0x0, 0x0, 0x40}, 0x80, &(0x7f0000004f40)=[{&(0x7f0000004e80)="0c2081dffd2c717b8ecb012a731292d4cd9e20eff73a98ff9b19e96525b8187eda48c85fff90e0f89c30b13abadf8832ca5ffa9bb8c2b239b7e89629878a502fbd44fad4bb1076ec4367f70444b0a60a58c25acbe6c437a2a7a5873fd066eafbfe206664c7bafa299767701abfea566dc1aff71b44171eba66c84385330b6082b856c7", 0x83}], 0x1, 0x0, 0x0, 0x8000}, 0x35c}], 0x1, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x2) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000300), 0x8) 21:08:25 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) rename(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000500)='./file0/file1/file0\x00') mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) quotactl(0x0, &(0x7f0000000240)='./file0/file1/file0/file0\x00', 0x0, &(0x7f0000000540)) 21:08:25 executing program 5: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) 21:08:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000040)='%d') socket$kcm(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xffffff6f) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280)}, 0x10) [ 244.157377] WARNING: CPU: 1 PID: 8438 at fs/overlayfs/dir.c:263 ovl_instantiate+0x369/0x400 [ 244.166112] Kernel panic - not syncing: panic_on_warn set ... [ 244.172035] CPU: 1 PID: 8438 Comm: syz-executor0 Not tainted 4.20.0-rc3+ #346 [ 244.179333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.188715] Call Trace: [ 244.191342] dump_stack+0x244/0x39d [ 244.194994] ? dump_stack_print_info.cold.1+0x20/0x20 [ 244.200205] panic+0x2ad/0x55c [ 244.203409] ? add_taint.cold.5+0x16/0x16 [ 244.207569] ? __warn.cold.8+0x5/0x45 [ 244.211383] ? ovl_instantiate+0x369/0x400 [ 244.215637] __warn.cold.8+0x20/0x45 [ 244.219356] ? rcu_softirq_qs+0x20/0x20 [ 244.223353] ? ovl_instantiate+0x369/0x400 [ 244.223807] kobject: '2' (00000000108588f8): kobject_uevent_env [ 244.227602] report_bug+0x254/0x2d0 [ 244.227698] do_error_trap+0x11b/0x200 [ 244.227718] do_invalid_op+0x36/0x40 [ 244.245137] ? ovl_instantiate+0x369/0x400 [ 244.249384] invalid_op+0x14/0x20 [ 244.252847] RIP: 0010:ovl_instantiate+0x369/0x400 [ 244.257693] Code: c3 89 c6 e8 b9 f2 ef fe 85 db 0f 85 9e 00 00 00 e8 9c f1 ef fe 4c 89 e7 45 31 f6 e8 61 5f 46 ff e9 ec fe ff ff e8 87 f1 ef fe <0f> 0b e9 e0 fe ff ff e8 7b f1 ef fe 0f 0b e9 63 ff ff ff e8 8f 40 [ 244.264187] kobject: '2' (00000000108588f8): fill_kobj_path: path = '/devices/virtual/net/2' [ 244.276602] RSP: 0018:ffff8881cc75f9a0 EFLAGS: 00010212 [ 244.276614] RAX: 0000000000040000 RBX: ffff8881cc75fa38 RCX: ffffc90005de6000 [ 244.276622] RDX: 00000000000081a2 RSI: ffffffff828f9969 RDI: 0000000000000007 [ 244.276630] RBP: ffff8881cc75fa60 R08: ffff888185594340 R09: ffffed10398ebee7 [ 244.276637] R10: ffffed10398ebee7 R11: 0000000000000003 R12: ffff88817850c300 [ 244.276644] R13: ffff8881cc75f9d8 R14: ffffffffffffff8c R15: 0000000000000000 [ 244.276673] ? ovl_instantiate+0x369/0x400 [ 244.276693] ? ovl_set_opaque_xerr+0x80/0x80 [ 244.276716] ovl_create_or_link+0xad6/0x1560 [ 244.276738] ? ovl_unlink+0x20/0x20 [ 244.276756] ? ovl_create_object+0x22f/0x3a0 [ 244.276789] ? lock_downgrade+0x900/0x900 [ 244.276820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.276846] ? kasan_check_read+0x11/0x20 [ 244.276860] ? do_raw_spin_unlock+0xa7/0x330 [ 244.276874] ? do_raw_spin_trylock+0x270/0x270 [ 244.276906] ? ovl_fill_inode+0x32a/0x6f0 [ 244.276927] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 244.276944] ovl_create_object+0x2e9/0x3a0 [ 244.292227] kobject: 'loop2' (000000007af103c0): kobject_uevent_env [ 244.298183] ? ovl_create_or_link+0x1560/0x1560 [ 244.298205] ? security_inode_permission+0xd2/0x100 [ 244.298225] ovl_mkdir+0x2b/0x30 [ 244.309330] kobject: 'loop2' (000000007af103c0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 244.312781] vfs_mkdir+0x42e/0x6b0 [ 244.312800] do_mkdirat+0x27a/0x310 [ 244.312817] ? __ia32_sys_mknod+0xb0/0xb0 [ 244.312833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.312850] ? trace_hardirqs_off_caller+0x310/0x310 [ 244.312867] __x64_sys_mkdir+0x5c/0x80 [ 244.312888] do_syscall_64+0x1b9/0x820 [ 244.328614] kobject: 'queues' (000000009d028cc8): kobject_add_internal: parent: '2', set: '' [ 244.331654] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 244.331677] ? syscall_return_slowpath+0x5e0/0x5e0 [ 244.331692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.331709] ? trace_hardirqs_on_caller+0x310/0x310 [ 244.331725] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 244.331747] ? prepare_exit_to_usermode+0x291/0x3b0 [ 244.331768] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.337068] kobject: 'queues' (000000009d028cc8): kobject_uevent_env [ 244.340587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.340601] RIP: 0033:0x457569 [ 244.340618] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.340627] RSP: 002b:00007fe2efdcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 244.340642] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457569 [ 244.340651] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 244.340660] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 244.340673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2efdcb6d4 [ 244.558208] R13: 00000000004bcf1f R14: 00000000004d4738 R15: 00000000ffffffff [ 244.566551] Kernel Offset: disabled [ 244.570256] Rebooting in 86400 seconds..