[ 65.396966][ T27] audit: type=1800 audit(1564970227.325:30): pid=9957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.117' (ECDSA) to the list of known hosts. 2019/08/05 01:57:17 fuzzer started syzkaller login: [ 77.942590][T10119] as (10119) used greatest stack depth: 23752 bytes left 2019/08/05 01:57:20 dialing manager at 10.128.0.26:46783 2019/08/05 01:57:20 syscalls: 2484 2019/08/05 01:57:20 code coverage: enabled 2019/08/05 01:57:20 comparison tracing: enabled 2019/08/05 01:57:20 extra coverage: extra coverage is not supported by the kernel 2019/08/05 01:57:20 setuid sandbox: enabled 2019/08/05 01:57:20 namespace sandbox: enabled 2019/08/05 01:57:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/05 01:57:20 fault injection: enabled 2019/08/05 01:57:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/05 01:57:20 net packet injection: enabled 2019/08/05 01:57:20 net device setup: enabled 01:58:42 executing program 0: [ 160.980377][T10126] IPVS: ftp: loaded support on port[0] = 21 01:58:43 executing program 1: [ 161.093908][T10126] chnl_net:caif_netlink_parms(): no params data found [ 161.164377][T10126] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.190563][T10126] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.198435][T10126] device bridge_slave_0 entered promiscuous mode 01:58:43 executing program 2: [ 161.218306][T10129] IPVS: ftp: loaded support on port[0] = 21 [ 161.224768][T10126] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.232656][T10126] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.244264][T10126] device bridge_slave_1 entered promiscuous mode [ 161.295580][T10126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.316528][T10126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.379196][T10126] team0: Port device team_slave_0 added [ 161.391166][T10132] IPVS: ftp: loaded support on port[0] = 21 [ 161.415240][T10126] team0: Port device team_slave_1 added 01:58:43 executing program 3: [ 161.443570][T10129] chnl_net:caif_netlink_parms(): no params data found [ 161.503119][T10126] device hsr_slave_0 entered promiscuous mode [ 161.560772][T10126] device hsr_slave_1 entered promiscuous mode 01:58:43 executing program 4: [ 161.618984][T10126] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.626096][T10126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.633484][T10126] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.640561][T10126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.672529][T10134] IPVS: ftp: loaded support on port[0] = 21 [ 161.786651][T10129] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.794197][T10129] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.802065][T10129] device bridge_slave_0 entered promiscuous mode [ 161.841164][T10129] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.848231][T10129] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.856157][T10129] device bridge_slave_1 entered promiscuous mode [ 161.869308][T10137] IPVS: ftp: loaded support on port[0] = 21 [ 161.877301][T10126] 8021q: adding VLAN 0 to HW filter on device bond0 01:58:43 executing program 5: [ 161.950873][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.959461][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.979624][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.988125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 162.004690][T10129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.015287][T10129] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.030777][T10126] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.048146][T10132] chnl_net:caif_netlink_parms(): no params data found [ 162.080004][T10141] IPVS: ftp: loaded support on port[0] = 21 [ 162.104681][T10129] team0: Port device team_slave_0 added [ 162.113365][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.122368][T10135] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.129418][T10135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.137160][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.145721][T10135] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.152791][T10135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.183806][T10129] team0: Port device team_slave_1 added [ 162.207675][T10132] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.214769][T10132] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.222570][T10132] device bridge_slave_0 entered promiscuous mode [ 162.237204][T10134] chnl_net:caif_netlink_parms(): no params data found [ 162.246015][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.263167][T10132] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.270226][T10132] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.278099][T10132] device bridge_slave_1 entered promiscuous mode [ 162.352012][T10129] device hsr_slave_0 entered promiscuous mode [ 162.390720][T10129] device hsr_slave_1 entered promiscuous mode [ 162.440537][T10129] debugfs: Directory 'hsr0' with parent '/' already present! [ 162.460041][T10143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.493319][T10132] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.507380][T10132] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.517117][T10143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.525675][T10143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.533932][T10143] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.562448][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.571349][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.615771][T10132] team0: Port device team_slave_0 added [ 162.624538][T10132] team0: Port device team_slave_1 added [ 162.642326][T10134] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.649417][T10134] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.657275][T10134] device bridge_slave_0 entered promiscuous mode [ 162.664949][T10134] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.672076][T10134] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.679558][T10134] device bridge_slave_1 entered promiscuous mode [ 162.698658][T10134] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.711687][T10137] chnl_net:caif_netlink_parms(): no params data found [ 162.772696][T10132] device hsr_slave_0 entered promiscuous mode [ 162.820876][T10132] device hsr_slave_1 entered promiscuous mode [ 162.860545][T10132] debugfs: Directory 'hsr0' with parent '/' already present! [ 162.869329][T10134] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.880792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.889017][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.943214][T10141] chnl_net:caif_netlink_parms(): no params data found [ 162.959997][T10143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.968372][T10143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.979567][T10126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.003425][T10134] team0: Port device team_slave_0 added [ 163.028556][T10134] team0: Port device team_slave_1 added [ 163.035854][T10137] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.043301][T10137] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.051029][T10137] device bridge_slave_0 entered promiscuous mode [ 163.058499][T10137] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.065629][T10137] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.073436][T10137] device bridge_slave_1 entered promiscuous mode [ 163.095272][T10137] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.153311][T10134] device hsr_slave_0 entered promiscuous mode [ 163.180756][T10134] device hsr_slave_1 entered promiscuous mode [ 163.220577][T10134] debugfs: Directory 'hsr0' with parent '/' already present! [ 163.232563][T10141] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.239623][T10141] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.247877][T10141] device bridge_slave_0 entered promiscuous mode [ 163.256096][T10137] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.290637][T10141] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.297727][T10141] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.305636][T10141] device bridge_slave_1 entered promiscuous mode [ 163.317601][T10137] team0: Port device team_slave_0 added [ 163.327863][T10126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.348170][T10137] team0: Port device team_slave_1 added [ 163.422277][T10137] device hsr_slave_0 entered promiscuous mode [ 163.440750][T10137] device hsr_slave_1 entered promiscuous mode [ 163.480576][T10137] debugfs: Directory 'hsr0' with parent '/' already present! [ 163.494078][T10141] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.525570][T10141] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.574071][T10141] team0: Port device team_slave_0 added [ 163.594979][T10141] team0: Port device team_slave_1 added [ 163.617000][T10132] 8021q: adding VLAN 0 to HW filter on device bond0 01:58:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0xe) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_ifreq(r1, 0x89bb, &(0x7f0000000000)={'veth1\x00', @ifru_addrs=@can={0x1d, r2}}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x10000, 0x0) ioctl$TIOCEXCL(r3, 0x540c) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000140)={0x2, 0x0, 0x7, 0x6, 0x4, 0x2}) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f00000000c0)={r4, 0x1}) [ 163.628104][T10129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.647647][T10132] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.663177][T10129] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.679384][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.694526][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.703375][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.711256][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:58:45 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x2, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x3) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x34e, &(0x7f0000000340), 0xc7, &(0x7f0000000380)=""/4096}}, {{&(0x7f0000001380)=@nfc, 0x0, &(0x7f0000001600), 0x35d, &(0x7f0000001640)=""/49}}], 0xb6, 0x0, 0x0) [ 163.734620][T10134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.744934][T10137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.760524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.769203][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.784837][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.791934][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.799624][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.808700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.817229][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.824293][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state 01:58:45 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x2, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x3) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x34e, &(0x7f0000000340), 0xc7, &(0x7f0000000380)=""/4096}}, {{&(0x7f0000001380)=@nfc, 0x0, &(0x7f0000001600), 0x35d, &(0x7f0000001640)=""/49}}], 0xb6, 0x0, 0x0) [ 163.832238][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.843658][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:58:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_nat_t_port={0x1, 0x18}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) accept4$bt_l2cap(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xe, 0x800) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000100), 0x4) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x17, 0x0, 0x0, 0x5, 0x0, 0x70bd27, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e23}, @sadb_x_sa2={0x2, 0x13, 0x4, 0x0, 0x0, 0x70bd28}]}, 0x28}}, 0x4040) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000200)=""/159) [ 163.903326][T10141] device hsr_slave_0 entered promiscuous mode [ 163.940873][T10141] device hsr_slave_1 entered promiscuous mode [ 163.970682][T10141] debugfs: Directory 'hsr0' with parent '/' already present! [ 163.978644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.986878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.995508][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.004634][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.011722][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.020578][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.028973][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.037761][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.044872][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.052618][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.061192][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.069418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.077303][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.090146][T10137] 8021q: adding VLAN 0 to HW filter on device team0 01:58:46 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xa2, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r0, r0, r0, r0, r0, r0, r0], 0x7) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2b, &(0x7f0000d4b000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r2, 0x1ff, 0x20, 0x100000001, 0x8c}, &(0x7f00000000c0)=0x18) [ 164.115850][T10134] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.127200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.137823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.147466][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.158967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.170291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.178042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.192262][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.201102][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.209465][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.218784][T10135] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.225867][T10135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.233628][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.248305][T10129] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 164.258862][T10129] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.283795][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.291838][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.299956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.308318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.318008][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.326689][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.333753][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.341475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.349616][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.357754][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.366097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.375278][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.382346][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.389968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.398456][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.406915][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.413976][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.422294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.430839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.438989][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.447695][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.456210][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.464478][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.472898][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.481668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.490480][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.498029][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.506281][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 01:58:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000001400)) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f00000001c0)={0x0, 0x6, 0x2013, 0x1}) syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) r4 = memfd_create(0x0, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000280)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000001480)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000001540)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x30200000}, 0xc, &(0x7f0000001500)={&(0x7f00000014c0)={0x28, r5, 0x300, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000001580)={0x4, 0xffffffffffffffc4, 0x8}, 0x8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000180)=0x44) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1}, 0x22) [ 164.525120][T10132] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.538827][T10132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.559183][T10137] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 164.571239][T10137] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.589047][T10129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.596774][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.611840][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.624912][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.628817][ C0] hrtimer: interrupt took 25426 ns [ 164.643204][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.651576][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.660209][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.669022][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.677702][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.686759][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.712767][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.721932][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.733152][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.742237][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.750377][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 01:58:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000180)) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b64698e3d2e2f66696c65315c00"]) [ 164.758795][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.767261][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.776755][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.787235][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.794891][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.824452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.833380][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.844616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.853983][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.883197][T10134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.893542][T10137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.917906][T10132] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.922377][T10188] overlayfs: unrecognized mount option "workdiŽ=./file1\" or missing value 01:58:46 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000b40)=[{{&(0x7f0000000100)=@rc={0x1f, {0x4, 0x4, 0x1ff, 0x10000, 0x7, 0x1}, 0xfffffffffffffffa}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000000)="cbd2e79ea4f9247f2b6df7f4d8ea165abd4f6304548ae76f95d9751b73ddb4e4c09b10abcc5896dd5fffae5458caca43770cd0147431db4405b925c3", 0x3c}, {&(0x7f0000000080)="fb28c7010a54a233226ce34ba504ea0084", 0x11}, {&(0x7f0000000180)="6bfe821b730316348f3fcb4dea759333eaaf9c8bda621c308cbd9753b18525a9e4122af6dcdf773a2c2bba3cb2882ca130d7abedc418e83c5ff8070777cba79288be35f712a1c247c4e47dbcaa8204", 0x4f}, {&(0x7f0000000200)="97fc9217c65256f53c6b883c4b8aad448820c3bf592474aed765bfbe2fb6e709dd963729c436f0ba56677bf7c61b0bd33ee8a4877fb8dba74b50fb1dcd91675b57a8517678cf9e4b895fb514a411735a1904c705a7232faffffa62fea95e02272f24e7288f9cc2", 0x67}], 0x4, &(0x7f00000002c0)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x48}}, {{&(0x7f0000000340)=@rc={0x1f, {0x7, 0xdc6, 0x0, 0x81, 0xa54, 0x7}, 0xffff}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7983a6207b4e0d1e39b80972a74432a0c56214fd29", 0x15}, {&(0x7f0000000400)="3837116c5d5f237e1037ea6cf5aa863c4f9f178ce2d7c28a4b1003c29730eb20f47ca3a04bb9dee502ed776afcb0be853ed850e352b4675c46db4d03761ffe193a0b091029b78b6f389d5f2b5034e4d1dd02bea73cc142506d4771e362cfc331982f2b16ca", 0x65}, {&(0x7f0000000480)="fc5a6fbb507c35e78dd00ace6e4f4caa0e666e832bae098c764bde17dfe1a165d9ab93b83ddfce754ff9eef301f75d3ce5d1e58cfef0192937", 0x39}, {&(0x7f00000004c0)="8237e25c57ab3a91997a79c5b5db2629f427ba6c88ed798c25660ee85a346f8b56f1d8212bec0981abb7336a74c93b0aa7198ce1550020f5908f2aff4df66154f3fc420bc01b06bd4a4714ef057eebf0db5907eaf713c072f363edb1185d3835e09e380a8adcbdd14c8cc8a6ef1fa6a745d27a965bc51cab0705555295e67d768c912b1b5416537acf68446051cfc1a85a717c436b13e9a032fdbb122772fbbcc69e5a6c47475f8ae2c58afc9b557f0c265e46ca3a8587d5be831f936d68dd20c46d4dffe7c0f9f6090c", 0xca}], 0x4}}, {{&(0x7f0000000600)=@isdn={0x22, 0xfffffffffffffff7, 0x0, 0x4, 0xd4}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000680)="dd3a2abe37c8c26d5d7fd927a585e2965615bdfc39", 0x15}, {&(0x7f0000000700)="8b06ba544d5378505a21d8889d5db258419c23a6ab9033bd6bf8c14f6183a34b124fed2a1775c2ef6871524071e22643d9f60a0ecc7f6c7be7264f3c1f8ec11d1ab18376b8d76bb4b63599", 0x4b}, {&(0x7f0000000780)="1852be66fc162cf10bba7e0467a9493b1e29661480771c684596db2975d1e12bae657394ea0bacf25492a0753565b15a84e187d8f103787669cde23dd7cda307daacf674487cbc688539607a83bfdfeb63ccf5ec4feb86f6c7113365ee3f1bf4ca30e5a201f83e1fce5b45894e342bc334adc2dc6c4adc570125f27d8045bf6e3385f5bf", 0x84}, {&(0x7f0000000840)="990fea839027f42ca852ff2f57c46deae6b46ba309a8a677ebe5e35ee7d81e07f5210019535929d771d4cb7d86366596de2342c1a64aa1cd1739cbf3c8c7fca4ba9ae934bcf09bb9358ddd6f0b53bee0a7eba378bb74f737ef53ae1a809e3ad526db3173941f5ccce82d045bb9d7ab74a62aff3325061eb26e88b0101ca9e1b29da95040b425b3cb3a02f51c409dde73839c464c177ee06fff1644525a3b3be4a456be22008f84b93b601df0ca85c22dd7df5e144b2d69d02623bfec2ef17de4cd778ac373cd01cdf0fe3b01e9708b887c848bf7abc297aee46a4fbcd04656d67e0a888327c8dcf133510265c5413a03c9fc8b2c921617", 0xf7}, {&(0x7f0000000940)="da5407afe7e1371c1ed0fa83d6985555b0fb825122a14baf636553f96b547e7714a889c840b155f99e0bd50663b89e5ee0a02485328a4e3c818afb19e42673c753d8a4e47d2fd164aa17802a6a343b8016ebb73515fb8b7b94e03dc9a57115c499e9fd103786d4e0f89c60ad2104cb6ae8d2d02b4d7f873cb96b9d5256248f558a8434e07d30573d8115f0224055c0ba13b7cb70f6352bee0371193dc3117d92439240e7486fa741083f0d67df63134b2894408553b0a694be3075400166e07e3913fbd952429953c68464884cf891443e7170a5aa5550822dbf5d15d085e543bca2", 0xe2}], 0x5, &(0x7f0000000ac0)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0x60}}], 0x3, 0x40) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="717597367bcf8ec3b300"]) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/dlm_plock\x00', 0x2, 0x0) setsockopt$rose(r1, 0x104, 0x2, &(0x7f0000000c40)=0x82f7, 0x4) [ 164.971661][T10141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.999713][T10134] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.051468][T10141] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.074104][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.085594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.106773][T10207] XFS (loop1): unknown mount option [qu—6{ώó]. [ 165.123265][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.132274][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.142008][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.149092][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.158366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.167598][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.192765][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.199869][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.224482][T10212] XFS (loop1): unknown mount option [qu—6{ώó]. [ 165.235172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.252795][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.261034][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.269913][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.285585][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.302515][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.319140][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.338244][T10135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.353861][T10141] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 165.367879][T10141] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.391136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.404259][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.416407][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.427741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.460532][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:58:47 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000000)=@sg0='ub%9_0x0\x00', &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="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") [ 165.475739][T10141] 8021q: adding VLAN 0 to HW filter on device batadv0 01:58:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x408c5333, &(0x7f0000000040)={0x0, 0x0, 'client0\x00', 0x0, "331a12d0af6451ae", "f632eb62d725d4e461fc542ccaffd1a784c42f463195e17a5cb0827f7e6bd528"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000140)=0x7) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000180)='client0\x00') 01:58:47 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2800, 0x0) sendto(r0, &(0x7f0000000040)="6c4752cff5dc2991ac3f", 0xa, 0x40004, &(0x7f0000000100)=@caif=@util={0x25, "898dd2677edba2ebaa76cfb86216a3d4"}, 0x80) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001240)=ANY=[@ANYBLOB="0000000000000000000099010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"]) [ 165.599769][T10238] UBIFS error (pid: 10238): cannot open "ub%9_0x0", error -22 [ 165.604210][T10238] UBIFS error (pid: 10238): cannot open "ub%9_0x0", error -22 01:58:47 executing program 5: getuid() mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4e0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x8) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r3, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000300)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)=0x80, 0x4) ioctl$FICLONE(r3, 0x40049409, r0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80040000}, 0xc, &(0x7f0000000140)={&(0x7f0000000a40)=@gettaction={0x1cc, 0x32, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x4}, @action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0xa03}}, {0x10, 0x5, @TCA_ACT_INDEX={0x8}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1}, @action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}, @action_gd=@TCA_ACT_TAB={0xb4, 0x1, [{0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x2, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x19, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1a, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8}}]}, @action_gd=@TCA_ACT_TAB={0x94, 0x1, [{0x14, 0x8, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0xbf}}, {0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x118}}, {0x14, 0x1f, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x18, 0x1e, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x3}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x10}, 0x800) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) shutdown(r2, 0xffffffffffffffff) prctl$PR_CAPBSET_DROP(0x18, 0xa) 01:58:47 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xe1, 0x0, 0x8, "d61e93b6d5208dcdefcf20c93e0f3e5c", "e2d9845d3ba681aca5e26d049f8761106ae18334e8cab5a4b847dcf389e5409db0ddeb161822337f884777c7b0866d488f86573b83800bf05a9bcb739c36381bfea4f43ffe8ef369f3c153f7740ce84cd97ed6a169515c8cc823decd879797636bb610c6082714f1be0a99ca708f358b9e7d894011f86a5534945d8eeea450ee9c63250e9c66cc56d91f1e6440dc22831cdce9af7dab636fa128c8bd101e4f4aaac000bfed3590e490a5885194b7ddd8182159892e0606f481eb88e7c2b4710a42c8691969840f41a08bec0c"}, 0xe1, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)=0x800000008) 01:58:47 executing program 0: epoll_create1(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000025c0)=0x204, 0x4) pipe2(0x0, 0x4800) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x100000000008, &(0x7f0000000100), 0x1d3) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2100, 0x20) fanotify_mark(r0, 0x20, 0x2, r1, &(0x7f00000000c0)='./file0\x00') recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xdc0000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) epoll_create1(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) 01:58:47 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x4, 0x82, [], 0x2, &(0x7f0000000100)=[{}, {}], &(0x7f0000000140)=""/130}, &(0x7f0000000280)=0x78) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') readv(r2, &(0x7f0000000000)=[{&(0x7f0000242000)=""/2560, 0xa00}], 0x1) 01:58:47 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8a5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) open(&(0x7f0000000040)='./file0\x00', 0x400, 0x20) 01:58:47 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x7ffb) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000180)="82a5ff5b06217d0a2983551d65e3e4b7f02045b36ee4ca4ff421342dbbb48412ded229974787d74edb17f615a86196d8a847ff41f56ee721e1cc10dcd0efc12fc45fa94bcf971c8567e52d84d4a12cc17f3ce0192dbf129bcac9c64329f62f7c8a0a7e8f72db35ce7bd1a58c4512f65e1f3085aa345315381b6d8e98db6cd3625c3fe6") ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000240)={0x20f2, 0x2, 0x80000001, 0x58, 0x0, 0x0, 0x9, 0xfffffffffffffffb, 0x3, 0x2, 0x3, 0x0, 0x7fffffff, 0x3, &(0x7f0000000040)=""/29, 0x9, 0x3, 0x80000001}) [ 165.747231][ T27] audit: type=1800 audit(1564970327.695:31): pid=10254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16545 res=0 01:58:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)='\b\x00'/11) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xee, 0x80000) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) sendto$inet(r2, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbb) r4 = open(&(0x7f0000000000)='./file0\x00', 0xc2000, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x0) 01:58:47 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x420000) sendto$ax25(r0, &(0x7f0000000080)="2dfce05b1adbb00f3d977723a48e2ca7e2360794a643de879815826703790f5a752ecbbbe751c4ed0367abc17d109de6cd868caf8b73a3aad19528976336248c16f4c84a31aedad809721eb998dcc700cb827c1a9572e02bd4f8fd939c2f6278cb0f7bda18d0c9896b797f436766d2f8eba68bbf60138ce014663861a24773541b9781b3fa7d0989e6d231bd03a50b2a46b86cb4e62fd130f423e43a413b15e3466fa2fbc099f6a5b9400ee0618a9187f3aa27301983b748dd3294921966ddaaa16a03d695dd26b4ffb7", 0xca, 0x4000000, &(0x7f0000000180)={{0x3, @default, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0x4, {{0xa, 0x4e21, 0x0, @local, 0xa27}}}, 0x88) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0000fdd93be6b36fce5d9d2ca98cbc"]) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sync_file_range(r1, 0x9, 0xfffffffffffffffe, 0x0) [ 165.839906][ T27] audit: type=1804 audit(1564970327.745:32): pid=10254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir851022933/syzkaller.KDgNfp/2/file0" dev="sda1" ino=16545 res=1 01:58:47 executing program 1: fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='y\x00', 0x2, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = getpid() syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x4, 0x202080) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000340)='&wlan0vboxnet0\x00') sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0xfffffffffffffffe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x9}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 165.916572][ T27] audit: type=1804 audit(1564970327.825:33): pid=10268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir851022933/syzkaller.KDgNfp/2/file0" dev="sda1" ino=16545 res=1 01:58:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @local}}, &(0x7f0000000080)=0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x121, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000000c0)) [ 166.047677][T10280] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 01:58:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @local}}, &(0x7f0000000080)=0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x121, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000000c0)) 01:58:48 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x440000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x100000000, 0xfffffffffffffff7}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000003c0)={0x0, 0x5, 0x7ff, 0x1, 0x2, 0x6}, &(0x7f0000000400)=0x14) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000004c0)={r3, 0x10001, 0x7ff, 0x200, 0x400, 0x1000, 0x3, 0x7, {r4, @in={{0x2, 0x4e22, @broadcast}}, 0x3, 0x4, 0x3, 0x8, 0x21}}, &(0x7f0000000440)=0xb0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x20}, &(0x7f0000000100)=0x8) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000580)={0xb1, 0xf, 0x1}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000280)={r6, 0xe8, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x8000, @remote, 0x7}, @in6={0xa, 0x4e24, 0x9, @empty, 0x2}, @in6={0xa, 0x4e24, 0x0, @mcast1, 0x5}, @in6={0xa, 0x4e21, 0xbd, @remote, 0xe7}, @in6={0xa, 0x4e20, 0x40, @mcast2, 0x3ff}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e23, 0x2, @mcast2, 0x2}, @in={0x2, 0x4e24, @multicast2}]}, &(0x7f00000002c0)=0x10) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r7, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 01:58:48 executing program 5: getuid() mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4e0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x8) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r3, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000300)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)=0x80, 0x4) ioctl$FICLONE(r3, 0x40049409, r0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80040000}, 0xc, &(0x7f0000000140)={&(0x7f0000000a40)=@gettaction={0x1cc, 0x32, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x4}, @action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0xa03}}, {0x10, 0x5, @TCA_ACT_INDEX={0x8}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1}, @action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}, @action_gd=@TCA_ACT_TAB={0xb4, 0x1, [{0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x2, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x19, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1a, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8}}]}, @action_gd=@TCA_ACT_TAB={0x94, 0x1, [{0x14, 0x8, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0xbf}}, {0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x118}}, {0x14, 0x1f, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x18, 0x1e, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x3}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x10}, 0x800) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) shutdown(r2, 0xffffffffffffffff) prctl$PR_CAPBSET_DROP(0x18, 0xa) 01:58:48 executing program 2: getuid() mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4e0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x8) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r3, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000300)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)=0x80, 0x4) ioctl$FICLONE(r3, 0x40049409, r0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80040000}, 0xc, &(0x7f0000000140)={&(0x7f0000000a40)=@gettaction={0x1cc, 0x32, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x4}, @action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0xa03}}, {0x10, 0x5, @TCA_ACT_INDEX={0x8}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1}, @action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}, @action_gd=@TCA_ACT_TAB={0xb4, 0x1, [{0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x2, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x19, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1a, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8}}]}, @action_gd=@TCA_ACT_TAB={0x94, 0x1, [{0x14, 0x8, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0xbf}}, {0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x118}}, {0x14, 0x1f, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x18, 0x1e, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x3}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x10}, 0x800) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) shutdown(r2, 0xffffffffffffffff) prctl$PR_CAPBSET_DROP(0x18, 0xa) 01:58:48 executing program 3: r0 = io_uring_setup(0x7d1, &(0x7f0000000000)={0x0, 0x0, 0x2}) splice(r0, &(0x7f0000000200), r0, &(0x7f0000000280), 0x9, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x44, "184e1d2522ad2fcb9a7c91b43faa5a3c75b3ac5191420589bc4bb816526e641ad9e6a754a0f9a300bdd4c9e9f0fd4cc7edcf0f9bd0dca98627abf27bd2f68ccd5e8ae84a"}, &(0x7f00000001c0)=0x68) ioctl(r1, 0x1000008912, &(0x7f0000000240)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x50000, 0x0) write$FUSE_OPEN(r3, &(0x7f00000000c0)={0x20, 0xfffffffffffffffe, 0x5, {0x0, 0x1}}, 0x20) syz_open_dev$vbi(0x0, 0x1, 0x2) 01:58:48 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RFLUSH(r0, &(0x7f0000000280)={0x7, 0x6d, 0x1}, 0x7) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) syz_open_dev$usb(0x0, 0x10000, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) unshare(0x40000000) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) futex(&(0x7f0000000080)=0x2, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x1) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000180)={'syz_tun\x00', 0x1, 0x884}) semget(0xffffffffffffffff, 0x1, 0x0) 01:58:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x8b], [0xc1]}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) 01:58:48 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x201, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}, 0x1000}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x204001, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000040)={0x32, 0x1, 0x6, 0x4, 0x1000, 0x81}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x7, 0x0) [ 166.765476][T10317] IPVS: ftp: loaded support on port[0] = 21 [ 167.095233][T10319] IPVS: ftp: loaded support on port[0] = 21 01:58:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$kcm(0x10, 0x80000003, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000003200050ad25a80648c6356c10424fc00400000000a000a00053582c1b0acea8b09000380feff0200d1bd", 0x2e}], 0x1}, 0x0) 01:58:49 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x1) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)="1a83e7690f9073d31da8e945a3af89cba0b8b7d876e9bb690bb1083232745f08f984ffb9ea9ca04ed04e1910ca06ce5ce8cad79d0f38db465d38214c38f2ff80252961957ba4a6765f7eb2493dac47c7fbc093b8c4d3a78eb6bc76bfeff041", 0x5f}, {&(0x7f0000000280)="5f13c7894de0cdd5dbffd54c1fde30459d84d085b2bee7f9d23fc68aaa471eb04093f4f0c094e2e532949bc36be037b6fd97d9cd5f83f39f2c0119269e9f5afbf156afe056cf3b80202b297abc23f3a8ce7587faa2fc55e919a57f50e0cd928874499f092ea3fbe82095e00870c03a1178decf1dc8877fc69552724c5676ebd46b4dba94dcbe6521d585451a6edf7c37a434a5779436c95854989af0d3af1e4562b1761a3cb41149838406", 0xab}, {&(0x7f0000000340)="3f4657df66a32da3359573f8c07ec75a942a233057ba50223b039cafbef1d47394da9865f24b3ee8c2256ab0927e014c6671b0a9cfcc3c8151887edab9edd92e51551d857ab6e5e28b43c422ec386ce1bea179d3c6a534311f3eb021e71f0ac47e3e89", 0x63}, {&(0x7f00000003c0)="a3b3bd77764502ace2fc04e44455e48460a9b14aa72acb407b39184a5edc576eea45e334106db42b53f200910ea8c3317d28600aac88bfd4385280824f92a13358ecf7b21f2f636bb1d12d21281ed4296c258a124670666571f8", 0x5a}, {&(0x7f0000000440)="c8bb2254acce392c12c645095778af3370ab4fb34c5071a48d273c6245e92dcc9838ba72bfb2e6bf932c177d6738ea3169ea033db22273f8495e8cd24ce5d06d473b8be97ef27021f74e82dc084408930ea574139ac2593c0467e5a4afc27a39f78f05828c293abc079129ca624633567896f1f00a2766f6105292c16ea5a5c9124da71685395411e5c3aa4df4b138bf2d15ed89028a758968d176030d997579f0bc820e40e32870e296472803497df7732e49a97302d688414cd108cac7dc82538ebfcabde1d2", 0xc7}, {&(0x7f0000000100)="cbc0a0627adfda80fee449c3967e4e19fcf34fb29449d37b6abf33e4d6", 0x1d}], 0x6, &(0x7f00000005c0)=[{0x38, 0x116, 0x7, "c1d3b1f57c8349e116cba5f9a387e8541f5d520dfb11ac8fa89c73bbb97cb6379201cdc7d631"}], 0x38}, 0x4000005) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f00000000c0)={0x2, 0xffff}) r1 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b00cbed8298e08700000000120f0000004000bc4cc92f0580cb5623072a006d1c958c00000000000000", 0x2e}], 0x1}, 0x0) 01:58:49 executing program 1: syz_open_dev$ndb(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000001940)=""/126) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x12044008}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x400, 0x70bd25, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}}, 0x4) 01:58:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) accept$alg(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000980)='net/if_inet6\x00') preadv(r1, &(0x7f0000000840)=[{&(0x7f0000000240)=""/79, 0x4f}, {0x0}, {&(0x7f0000000380)=""/116, 0x74}, {0x0}, {&(0x7f0000000500)=""/118, 0x76}, {0x0}, {&(0x7f0000000600)=""/65, 0x41}], 0x7, 0x10400003) 01:58:49 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getsockopt$inet6_tcp_int(r1, 0x6, 0x24, 0x0, &(0x7f00000004c0)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10080, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000280)=0x7ff80000000) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r3, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1eaa7480}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000080)={0x6, 0x2, 0x9a, 0x8, 0xd, 0x514, 0x6df1, 0x6, 0x401}) socketpair(0x4, 0xa, 0x80, &(0x7f00000002c0)) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) connect(r2, &(0x7f0000000300)=@generic={0x1f, "79cf33b58ecc7918d7495ac988bc42d749525f25dbbff934c77e4ad4f11e1b8030c10c4684cbbf0ff72aca78ba0f31450b0172b84f1e1c3221d79d18d1207e6fabbaaa2c483a0c15d51f63c1f6d302193b025213e3dd63f6ec4ee8590eb55538b89bf2f715380880f7daf673da8d01ef0c6e7ddefb5c7360a0bbf5d60920"}, 0x80) 01:58:49 executing program 4: timerfd_create(0xf, 0x8000) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x500, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @initdev}, &(0x7f00000000c0)=0xc) sendto$packet(r0, &(0x7f0000000040)="0898fc1247c4e5057cf82b0a0ac8629d1c181025cd52d9c8d3a7c0b2da08cb4697", 0x21, 0x4000880, &(0x7f0000000100)={0x11, 0x3, r1, 0x1, 0x5, 0x6, @local}, 0x14) [ 167.247732][T10341] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 01:58:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f0000000100)=0x1) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x10098) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='veth1\x00') [ 167.305957][T10352] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 01:58:49 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)={0x80000000}) fadvise64(r0, 0xfffffffffffffffb, 0x7, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0xffffffffffff982a) r1 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="9f91528ca5c8655dc58c651b8e57724c0dc0b78d3b3dd089228e8f873390580de18d9585e2d9f1af9108bee57cfe2cf7fa0ac68c95cc774c969967309f1d9046c93d1e1cadd20b6be8aa396a01d0557d091929cc08eb1c7b3e02c8e175e2c3eb1946e8524cc1c86976baeaf921aa39324cca831c4a67a61063ab18757702f1d999b9651533d2b821151ff3debf840f4b43ca171790b377f221b3b7fa884720ef3f3db75e747f7efd168920fccb21ec36d7ba2a5e3d93889ee24f49697bfcaf22bc09c73546701f67f6127cded3ae1d7ebd983795436e422e33320248358c3f771a139eab0bdf", 0xe6, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)='@#^systemppp1:proc{D%\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x4) 01:58:49 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x3973b4bbc7e778f8, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r1, &(0x7f0000000bc0)=""/4096, 0x1000, 0x2, &(0x7f0000000180)={r2, r3+30000000}) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000000)={0x4c, "12e90ee83a70100660b8638dff929c3b18779a3f5965d4591a0c506a2ee46712050100bf42171abde6632c6dfb936157abae50be5b8f832ec8f38b6cc3e7adffc00221ff09469aeb67fbef2a28ba637bfe90012642dfb407573f2d8a5b28cebcd91865410e8c3a091825d14290be97fe6e4ae698d09837bda6d1aa0da44a437f"}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) ptrace$setsig(0x4203, r5, 0x3ff, &(0x7f0000000200)={0xd, 0x1, 0x100000000}) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x8300) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) write$apparmor_current(r4, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/310], 0x9e) 01:58:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000580)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0xaa4371b065731708, 0x0) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000004c0)={0xffffffffffffffff, r2, 0x0, 0x8f, &(0x7f0000000400)="2989508887234db59172231e3cee4b1a2f12e983709d388356e86bb375719961b531fe61c5701157c43f675fda9f0432ed4376f9dc456e55eb68479f071aece02344288eb15e19aae0857d6283be719f8e552520a84e9d4ffc6e4d72d9c039f03b92e32391612deb7f99ac1464efea54f6c02c2eb5823581def1a1c3037eb63060bbfa2f79b6f7e4026ce182c6c023", 0x9, 0x9, 0x17db906d, 0x7, 0x0, 0x1, 0x8, 'syz0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x200) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) perf_event_open(&(0x7f0000000940)={0x5, 0x70, 0x4, 0x0, 0xffffffff, 0xb5a, 0x0, 0x400, 0xa00, 0xd, 0x4, 0x3, 0xe9, 0x40, 0x6, 0x9, 0x653a, 0xfffffffffffffff8, 0x6, 0x10001, 0x2, 0x3ff, 0x0, 0xfffffffffffffe00, 0x20, 0x3, 0xa8aa, 0x1ff, 0x2, 0xd9a, 0x7fff, 0xffff, 0x5, 0x2b70aa7d, 0x100000000, 0x7fff, 0x0, 0x7, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000900)}, 0x200, 0x2, 0x8, 0x9, 0x2, 0x8000, 0x2}, r6, 0x6, r0, 0xb) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000005c0)={0x0, @multicast1, @loopback}, &(0x7f0000000600)=0xc) accept4$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000008c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1010902}, 0xc, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[@ANYBLOB="90010000", @ANYRES16=r5, @ANYBLOB="020800000000fd00"/18, @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000008000100", @ANYRES32=r8, @ANYBLOB="3001020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff7f00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400fbffffff08000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636ff56e7400000000000200000000000000000800080000000e020000301123f61a54067fca333f758bd1fbae9cd5eb5965fb34aabac56930b71f9821d185af223993514112eb33f3a969fd396b177f7b0be46b3b6afa8db757f6235916a4a417d231219735e58efb591692fb030e6b524b533e3826b3b9aaf336aee7fe7133423390e6f13e1895921480697d4c10423db83783b5f27d3b59"], 0x190}, 0x1, 0x0, 0x0, 0x20008010}, 0x8000) 01:58:49 executing program 4: r0 = socket(0xa, 0x1, 0x9) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000029f68653648b62816befbea6ccb1c317b8bfbdf9f80adf04b5952696e2804c714923363c4bb29dbcea660e92c52978df9f4be015644ca7ac16a1b488ac8e5a1da40344dae0b4bd12b36d5e03eb785c2700481b6add8e93b303ffd8c9f12add36a2dc772a1f2eb4ce4035a281d12bc6f6f9ee91e689f1aa591acc3c6ae84c1b8a47c100"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000040)) [ 167.611277][T10371] AppArmor: change_hat: Invalid input '#x0000000000100002^' 01:58:49 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_dev$ndb(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), 0x0) r2 = gettid() perf_event_open(&(0x7f0000001880)={0x4, 0x70, 0x44, 0x100000000, 0x412, 0x5, 0x0, 0x1, 0x800, 0x9, 0x6, 0x100000001, 0x8ab1, 0x4, 0x1, 0x1, 0x7fffffff, 0xff, 0xad, 0xd12, 0x5, 0x5, 0x8, 0xfffffffffffffffa, 0x5, 0xffffffff, 0x80, 0x3, 0x7fff, 0x1f, 0x7, 0x4, 0x9, 0x5, 0x3, 0x3ff, 0xfff, 0x4, 0x0, 0xda6, 0x4, @perf_bp={&(0x7f0000000480), 0x5}, 0x0, 0x7e05da31, 0x884, 0x9, 0xfffffffffffffff7, 0x4, 0x3ff}, r2, 0x3, r1, 0x3) readv(r1, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/232, 0xe8}, {&(0x7f0000000000)=""/52, 0x34}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/169, 0xa9}, {&(0x7f0000000700)=""/255, 0xff}], 0x5) process_vm_writev(r2, &(0x7f0000000800)=[{&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/251, 0xfb}, {&(0x7f0000000500)=""/209, 0xd1}, {0x0}, {&(0x7f0000000600)=""/134, 0x86}, {&(0x7f00000006c0)=""/28, 0x1c}], 0x6, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0) flock(r0, 0x1) socket$inet(0xa, 0x801, 0x4000000084) 01:58:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000400)='/dev/vbi#\x00', 0x2, 0x2) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x8df}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={r3, 0x80000000}, 0x8) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x4, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$P9_RWALK(r2, &(0x7f0000000380)={0x64, 0x6f, 0x2, {0x7, [{0xa0, 0x1, 0x7}, {0x0, 0x3}, {0x18, 0x2, 0x4}, {0x2, 0x2, 0x4}, {0x10, 0x0, 0x2}, {0xc, 0x4, 0x2}, {0x40, 0x2, 0x4}]}}, 0x64) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, r5, r6) r7 = socket$kcm(0x29, 0x5, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000000)=0x6, 0x4) 01:58:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r3 = getegid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f0000000440)=[r1, r2, r3, r4]) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x1, @dev={[], 0xd}, 'batadv0\x00'}}, 0x1e) r5 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x200000, 0x1) getsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000180)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f0000000080)='./file0\x00', 0x0) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = getgid() getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) setgroups(0x7, &(0x7f0000000480)=[r6, 0x0, r7, r8, r9, r10, 0x0]) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 01:58:49 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000)="d6144347422a25fa3c3d4be00f2a5c7afd7bd5c4485cbd72a1deaf286b98d7c63f731417f6e322666ee113dc54f8a447f7e814030fa33951af58bc388181215991b590f00bc3368da146693ed4b3631a4b8a352e5238e1ac5537b2d7928ca1864c979016f2a407eddae8da7654"}, 0x10) fcntl$setstatus(r0, 0x4, 0x4000800) read$alg(r0, &(0x7f0000000100)=""/108, 0x6c) openat$cgroup_type(r0, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) bind$nfc_llcp(r0, &(0x7f0000000180)={0x27, 0x0, 0x0, 0x2, 0x7, 0x7, "93122394c68e18953398143479117db78ed56f69c998682895f1a2ad69c4536706902f07cfe65b019d66feb2e53181fb13d0d4607d9850a5a2a3d9163b6f83", 0xe}, 0x60) 01:58:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000580)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0xaa4371b065731708, 0x0) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000004c0)={0xffffffffffffffff, r2, 0x0, 0x8f, &(0x7f0000000400)="2989508887234db59172231e3cee4b1a2f12e983709d388356e86bb375719961b531fe61c5701157c43f675fda9f0432ed4376f9dc456e55eb68479f071aece02344288eb15e19aae0857d6283be719f8e552520a84e9d4ffc6e4d72d9c039f03b92e32391612deb7f99ac1464efea54f6c02c2eb5823581def1a1c3037eb63060bbfa2f79b6f7e4026ce182c6c023", 0x9, 0x9, 0x17db906d, 0x7, 0x0, 0x1, 0x8, 'syz0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x200) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) perf_event_open(&(0x7f0000000940)={0x5, 0x70, 0x4, 0x0, 0xffffffff, 0xb5a, 0x0, 0x400, 0xa00, 0xd, 0x4, 0x3, 0xe9, 0x40, 0x6, 0x9, 0x653a, 0xfffffffffffffff8, 0x6, 0x10001, 0x2, 0x3ff, 0x0, 0xfffffffffffffe00, 0x20, 0x3, 0xa8aa, 0x1ff, 0x2, 0xd9a, 0x7fff, 0xffff, 0x5, 0x2b70aa7d, 0x100000000, 0x7fff, 0x0, 0x7, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000900)}, 0x200, 0x2, 0x8, 0x9, 0x2, 0x8000, 0x2}, r6, 0x6, r0, 0xb) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000005c0)={0x0, @multicast1, @loopback}, &(0x7f0000000600)=0xc) accept4$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000008c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1010902}, 0xc, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[@ANYBLOB="90010000", @ANYRES16=r5, @ANYBLOB="020800000000fd00"/18, @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000008000100", @ANYRES32=r8, @ANYBLOB="3001020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff7f00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400fbffffff08000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636ff56e7400000000000200000000000000000800080000000e020000301123f61a54067fca333f758bd1fbae9cd5eb5965fb34aabac56930b71f9821d185af223993514112eb33f3a969fd396b177f7b0be46b3b6afa8db757f6235916a4a417d231219735e58efb591692fb030e6b524b533e3826b3b9aaf336aee7fe7133423390e6f13e1895921480697d4c10423db83783b5f27d3b59"], 0x190}, 0x1, 0x0, 0x0, 0x20008010}, 0x8000) 01:58:49 executing program 4: accept$alg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) [ 168.069179][T10396] netlink: zone id is out of range 01:58:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="26640f48d16626660f388103660fc73366b8c70000000f23d80f21f86635000000900f23f8262e0f08f00fab9569fff4650fc734ba200066ed67dc5ca002", 0x3e}], 0x1, 0x0, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000000c0)=0x7fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2e5, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000180)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x306, @broadcast}, 0x20, {0x2, 0x4e21, @multicast1}, 'ipddp0\x00'}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000100)=0x6) 01:58:50 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x913bf9c5c87c6eff) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000240)) r3 = creat(&(0x7f0000000200)='./file0\x00', 0x40) write$nbd(r3, &(0x7f0000000280)={0x67446698, 0x0, 0x0, 0x2, 0x1, "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"}, 0x10e) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)) write$P9_RLERRORu(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff"], 0x7) prctl$PR_GET_TSC(0x19, &(0x7f0000000440)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 168.109720][T10399] vivid-001: kernel_thread() failed [ 168.115389][T10406] netlink: zone id is out of range 01:58:50 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000580)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0xaa4371b065731708, 0x0) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000004c0)={0xffffffffffffffff, r2, 0x0, 0x8f, &(0x7f0000000400)="2989508887234db59172231e3cee4b1a2f12e983709d388356e86bb375719961b531fe61c5701157c43f675fda9f0432ed4376f9dc456e55eb68479f071aece02344288eb15e19aae0857d6283be719f8e552520a84e9d4ffc6e4d72d9c039f03b92e32391612deb7f99ac1464efea54f6c02c2eb5823581def1a1c3037eb63060bbfa2f79b6f7e4026ce182c6c023", 0x9, 0x9, 0x17db906d, 0x7, 0x0, 0x1, 0x8, 'syz0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x200) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) perf_event_open(&(0x7f0000000940)={0x5, 0x70, 0x4, 0x0, 0xffffffff, 0xb5a, 0x0, 0x400, 0xa00, 0xd, 0x4, 0x3, 0xe9, 0x40, 0x6, 0x9, 0x653a, 0xfffffffffffffff8, 0x6, 0x10001, 0x2, 0x3ff, 0x0, 0xfffffffffffffe00, 0x20, 0x3, 0xa8aa, 0x1ff, 0x2, 0xd9a, 0x7fff, 0xffff, 0x5, 0x2b70aa7d, 0x100000000, 0x7fff, 0x0, 0x7, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000900)}, 0x200, 0x2, 0x8, 0x9, 0x2, 0x8000, 0x2}, r6, 0x6, r0, 0xb) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000005c0)={0x0, @multicast1, @loopback}, &(0x7f0000000600)=0xc) accept4$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000008c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1010902}, 0xc, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[@ANYBLOB="90010000", @ANYRES16=r5, @ANYBLOB="020800000000fd00"/18, @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000008000100", @ANYRES32=r8, @ANYBLOB="3001020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff7f00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400fbffffff08000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636ff56e7400000000000200000000000000000800080000000e020000301123f61a54067fca333f758bd1fbae9cd5eb5965fb34aabac56930b71f9821d185af223993514112eb33f3a969fd396b177f7b0be46b3b6afa8db757f6235916a4a417d231219735e58efb591692fb030e6b524b533e3826b3b9aaf336aee7fe7133423390e6f13e1895921480697d4c10423db83783b5f27d3b59"], 0x190}, 0x1, 0x0, 0x0, 0x20008010}, 0x8000) 01:58:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40400, 0x0) r1 = fcntl$getown(r0, 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) setpgid(r1, r2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000040)=""/80) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r4 = gettid() ptrace(0x4208, r4) r5 = geteuid() setreuid(0x0, r5) 01:58:50 executing program 4: r0 = shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) shmdt(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101900, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0xb03, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) write$cgroup_int(r1, &(0x7f00000002c0)=0x1, 0x12) [ 168.224523][T10414] QAT: Invalid ioctl [ 168.244470][T10414] 9pnet: Insufficient options for proto=fd [ 168.313540][T10414] QAT: Invalid ioctl 01:58:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x3e, 0x0, 0x229}}], 0x400000000000105, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000100)) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000140), &(0x7f0000000180)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r3 = getegid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000280)=[0xee00]) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000480)=[r1, r2, r3, r4, r5, r6]) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x9}, &(0x7f0000000300)=0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000004c0)) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) [ 168.431950][T10423] kvm: emulating exchange as write 01:58:50 executing program 0: socket(0x2000000000000021, 0x2, 0xffffffffffffe) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)={0xe, 0x4, 0x1, 0x7, 0x1000, "128ea0e75705897ad77b5c8b93fcaf48c8db8bef6bc8a42cc44fcf5a3238c43180544e1a993def230b3638a232c37b8ce2fb868a4cea43633ce3e170b1835f795fef410ea5c62c6bef0103add94c71571ccd666143075a55a0208c8f7b6f1a5ee847807a8556a6a221ca5b2a3b783f7cc55c4fbbd013825d0feee619474f5ea0a05eeea06c0b59c5ea2146c33466aed4eec2a567c4e3d32ee5ce2ac0a3f9ffa1820ed56584d8112fab3f83dc44f6e05d6b9fc34ff6f28a06ceba4290ec9195df1384c30b5217fb84b2cf8383c0f81c9a06fe37c4455523ea364eb8eafb0076695905d415e5b33193f460556d8a95661d6ed5a9c465a196c133e7c3d56c59f94da409d3d798ace4efc868fcf0bc3b21faf4faa3a4f7fa3edb2a2f38940c151d09da7e6b7cfa2efe31ce0bb80d2ee69bdf7c0b897d6dd21f9b7942e80f35be6402d8798b9c7df0f2313e25bd58c49e419a0b79b661e3adc922161a330fbc65120cb787e07a34dcbe30d1dc0a680ffe83da002ab8a50d97793a68b0e3f05ed48d74f5d7d90749a583eb27a8560fae39f20b0a65b155a7fd3b6195d17d48609b6461b91f44a07a95b834ab7d1ecf6347d215dcf192b953d7dcbf58b4a35e04ef9cbe3d7bb52ca40cc86cd712e22e2d965ef0b479ee7c523424b9d488b500d885318a07b52628a05e01e994ff17bb76c2f5834fb21b2f481902fcb730e95676dee06eb38e1f759f2a52c55ae69167a69ab50b61eb28dd0bc1348a47c703e4e9a181fd14f0d939e8d32e2d34db88052409980e99a921f38893e7213b5a852317d157f5b37d28ce56bb6427ae2543a931bc23fac1991b545f064a791a518d00d5789b5329ac610e666d28a09d72a6c70b6caddae743774c42d809837fa0373da0d42f032e4f4552e3fcbb8570a05315b3d9606f6f7b6125f18d08bfcf091808920db252fb4b73561cd3682b62997e5794d1f3802f1f8188a7d4ea5854380d9a3e7ea6bb5c5c6b1710f979fd8ab3dfdfd6436b621a8d36853f2669d85abd2c2a7e8c37ff4ea3195a88abfa0fda1b4ce9668659204dac1ceb0c738de6b7bebfbbb4756478922418a0085a48ae3b3a0d2d4d563b4c0e77dd15682931207f9c767df83b7ac98f25f77bf50645e659ca4bc4dd063b88fc4bb41f8e0cbd647cecc583069a72f2136ebe07a7b927db8291c710b97deec5cb5d428e6fec7c970e72fbaf022b0ac7039571b30143f613e217424a3bf772904ecc505809a44852d0d606b3dc2875875952bf727b410ad78e38ae66233bb3ac0fb7ccb224029734c859b088d418dc39e9fa18de16e4be46e58d61dda7d4a8becbb1ac5704e6f57e4596a83bbca7ddaa080f9ab5646605bc355ea01c98c258a6e6150279af8a33e2ae6ea43db363b86039f394802ac2129080b1ccda637097426400f8c057c40d8fe05764ac85cae7133f914d9780c5a83964d68d2303878b406924de6b77e41aa162df98111ce91479c7c3a381213095083362caa314572c2f427da149b019c01a6f0fcb244a0f90433d2374557d90f6516493a83c46fb1ec2a52e9d0721a9b6de0c6be73eee9aeca253ead2e1b9c2b2d67ea0d9a14ab8366cb22c727c7536ce3ddbe5fc2cecbdf586802805392b38d27c2d58db2abc75360f307a46470662624632145cc5377b31662a3885236d892a465a0c02e245f7129dd2044f77e5615dd898728d37554328d16b2dc013c42c8793f1ec5eb4a76a82c5ed7f5bdc8e6ee9845c6d9c40f0c8c586f62b67e5756b10a4830183581714d327dc9a19860d3382e29999b95fe816c2928dd8571594c0ef6f285faef97e784b1633c119f46c6a1efc717170cca1a943e89dd53cef65f1e1a45442be6e55874c2e06fe48e2a88b09f0c65f8c492f4c567bd25bd829f5aa289a35bbf931aaa32fddef590e80c90b77ad10244f5db1aa74b0e6bdcea5626a58f219199835952ae6fa1930003b0beae33273f41ed1dcc581c591a9a76783bb1d270827a9d9322745f2d235479446e99d4e69f3dce1c52f684a7def82ee012d3de4d7fa2415432640fcc46cc6f40fea2138b855bc040d4fbe153244b851bbdb7440f0dbbdc92fc7d3779ebb85c9b70d7f5769f79f3bdc1cf2db18adf2d61d994577bd0bd3bf7ca474d53ec3de8ce70d9fd8fd348a5770f34ebc22f5792f6acb79676ffb76603491d58e443a2f5bfc893f3506d19a6ba05c225326cd777e5b7126535b118e088ef9502afda04fec7a99d49013f97f72d20de885229a7e73a5bb1b8aa1923af0bac78fbb7bcb1c30ed023a09f299687efc92b76f6f3df08e457144db849d4752e43deaddd5c52846897c0bbbd1b12bb41fa9a3aebebdb2226ba1f316943e98322809f4c44332f3578143d58c36d34bf4e8c26b8315468bc5243c3b01e2122f22dde3f10d781af7a498b70c4a4fbf3813af2fc994e7974e80b6c2c09fd992f607bd43bb7041a5c12e8789195025ec07aa86244e539fa3f5b1018a8aadb045225bb0132b23555ff4f83980df778c19d00b3bae0a9f0dc3e64b151154f9e5ff16cf4f829021c1726d5f90c8a412dafc33cba35c6240bb044df388831d3021648542d5222210d382a905ec44f583c1f7527fd0548046556585c4578a3d579296519687a535c5203b208ba6289db5235bf223077d5a1d93d2e0b0f0dd726368a193e7f648a9ea3089315cf8636eb54df56ae8fb282588b311b58e386b2160fd9020813c6bd8a9ac06a05bad7591b9762187c87f7f84c6201b5ce802aade0b482f05f69718a05bdc24c754d09bea4b25316fe1cc5193d8cb47bf590ef0a92563e8f4cd3d962ae3c5e7d25a6b9af43394f763d3cc3e094c1ae80d45e9a5b12177cfc639d1cc162089e6373b9b9fd8f4a08c27e78a195da813d84df5257665b671b02e13327baacf0bd4b8f635364a0d4fa104231f0d97c3657ac3293b050894ee98c6629377d300fc41ce050107db8728c09f625ec8fd3abec559c79f31bcb28e94b7cf234529be0a33f16dd2f6633b8b1ceec289d56257ba9a6a8a5720900cb199bc26b4dc0b9e57c22edd3a30127834030c3344199ccfb8a7078dcd1fb7c9c7dbfdf8e24c52232802fd2f270cfb34597c03f28e24f0fb442b7a4616c9ff334cb012418f0e3a00923c4c4aeb3cb4d1a5b1ad02894f871098cdb20cc614776ee96d84541eb72f689ef48d48d61aab7ad78f9d1477e044e8a0770a3dfb5eb089712c2a8cdcc0024d7f0e408f88bf32e8f5c3c3affc3d502c6714ac5c78d6a0bb06d0ae04ca7b27d6c30b7ce5ad32c1b575a9c3de43fb0f92665a546fb8f6d6249f45a8c167db7ed96926a84bb354552e81f5424d87e2cb72a4f1f3d08f8cb48bcc4a1c50758aeb5399b2be92477ea948cc5ea0f27d2ee43682f07f077f26f0483ba2ec3d441af623c928f9fa53fc336a09e5646083161cc7a3a5b6b660586034ddb945e25566296f5161adf4d1c3a278c11a5ace4c6393a889adc754b964648dcaab138a98c4e9113664b7206eb37f228e3ed31abeea2bced373ed3c285d9f1c733899a44a323ab799ca2aab7034cac4635356807c443fe37a5382c5b4f77aa80bf710d97f508af1ef41d2b7b38d1826abf9f4aa0c61872369dcf6423967ca7b17faba5bc79d982d502e687cf76222c6ec75b17b565e54f21e82658bd55657249d6a7701756dded57a38b4c009ad2a6a1b03187400702899c2776b91f06476cdfe472f141a9e035459dc2d8e6f68805517f331a66ad333fe2ce7a8e409ac351af9fa72d26e28fdf00b3be6b53ec9343fe940c50b4bdcde5b9d8d5134005b902103cf48f8d75617190872abb8bd3bdf88f47c1ba4aa53a0e735ab294c268d76300d78e97d1476219ddc7a1b9a4b1ca0f0aab96d9d60fa1ba4aba1ef0f40fec030bb4b6587f6ca8983900150276c3ad6d420806bddbde602f25fa157f8ca28fe929f614b38cccf6868e57782a9d2af2bd4250eea9ffe704bce1d6987e980b2c164d7be3a84b84661195fb526e27fed396f2cc5fd43ab4ead30fa023b2f916ed00b3471cad03285c7f2e6abcb3ba581d12eb43a7eefe1b9567f4c8476b01eba379c96468ff53503bda8a70206f451224c6b91c2f62c516aca6a690638a6650f238625c6f8fc2291aaf609a9cc5516ca62aac4bdd9b5cd7eba634b5fab9fab14eed38491012ce7cab6488246d90488558a1116451dcfdaa2c9bc0bfb423a4472c7acd310cd912e96a63a9af33d71cbcfd5428fad6b67abf9ada48d5b829ac13c64db9296f7b2b7561ee5cca49b420b7369c91620abe89e13912c2947b7b080cd6eb38d6662c143e75654530c9528bb6da1bfacfa2f989b6077f116adcc3b0e363df67f38998263e8828132d58af59cffd44fa3aad8f96ee415348d4cf14e3f1e0aaca7c6694776e50647fa25aeac635c32345e8af146157268414568717f322029dd26c414fe3f6bab45c01f3b293e36e1e3958bf09b56bd2626849e45405c1b9e64664b1ebdc9e9971a98d282300887d610fcd7424e5a7684c8796e34a2ac6eefff143cbe4e23ac53349b001fb44cd67e09d69d06029d0f6378bfedd8c968ff238858465a376dddf72398388ab1a3c4c7dfa004b737646294d32143d7471e00eacf3d027fd98fa9eab8df7410c064f57b4e1b57a2438e96b2bc731dd89b9e9b956c995e19823eb62c9a9ed4ff75ec60566330a90b0d14e4ce8cff7d59bbb6329eae389678440ebdfd536c31471858ae26e7b0edd5f97d7f8c2d2222e4cbf45c30909b0832cfc3f868a536dd745e8915f32b2c13a3272e78d765e8511d79d461eed295aac3be167eda4eb9c712442f5df44eeb1064126f8a39c9af4808bcdbff9bb8a2d010a9e2b8d786dcab80c42d958bca2a638ec90c7719911dd401149ed9920a81c6a874d322686a7444aada237e9ca33a932b9f08792ca0b912b13e6f8472155066923c055bb70a7bc5e229ecb56ab44b4f72aba137476029d0dfefc1c64beda59801d9c90f589e7ced99ee1180aaaf8c16b84d574a0c35188a13bcd452c800e01d84890d45de35034c2261f128adabb1b62ef32508723896e00f43e7b30c2974fd3a39a4bb1e697f3dee248b8c742d5ca3fd233dbc628bafeecb0854bd8ab97da79f8d509c6559d1be64ef3f5d2646b046f0d1e3552491eded8df52cf8c980918fd5e70e84cc2b727e7ad8e675219bcdc5435f1e8d70f0fb8603207a6c5374878493c7faf10c6c9e3a3da5bbb04f3e637ac97f8df7ed64d3cdf9bfe33841339094ab04ae12be14b6cb806470d10ef194720dbee63c63aed3e5c4dcfa4d5bc3684e916a0bb4bfecc0f43bef75506707a14002e9fa2c823ca9c1053e448a1ad1ff690c3b953852e032ac00e77698d748c5e8e75c504dd7d10db090455c007fbfeb4a65dbfaab7fa835373f6092535c9f9ee61f219970bd9d23db168a6014b106f20bee9bd11c2c0a702092b308af92ad2e2b359f9c398e3fac57840c25755bb130dc7c8dcc27744100c0af2ffdd00ba51020eb2e240359d876aa5a038bd4c9bfa5cac92f8710f0c366ed637a55825bf92a9c9ce9cbdd10cca8cb3a300b84245932450a521c1be1dc21439e5bcfa15304625c7e1147871e2f8e82053202ec40ea46954a8d77f69d2341472c83d5d6636e4634bbd97d8677a765d44555c65fa4a39c5831233cc18a1d76e52af33aef9c46d3cc6101f5457d6f35c9b116ee100809d8b2e9e4a2d1b25ee7298533d4cf5544358e3318b3aeca6fb533c09fc109a2580f6e5dbb7eb9b74b16b78bb4c4f9a4ba5217e96e55264b38"}, 0x100c) 01:58:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1f, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffff8404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 01:58:50 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @empty}}, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x3, 0x20}, &(0x7f0000000180)=0xc) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$NBD_CLEAR_QUE(r2, 0xab05) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r1, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x58, 0x0, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x200000b8, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 01:58:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="f8000000160077f88c38c29254a50000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000001f00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003\x00'/176], 0xf8}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@flushsa={0x14, 0x1c, 0x507}, 0x14}, 0x5}, 0x0) 01:58:50 executing program 0: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec534e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d464caeedf840d001fe92b08c3f7b", 0xce) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000040)={0x34}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0xc2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 01:58:50 executing program 2: mq_open(&(0x7f0000000540)='lo\'{ppp1\x00', 0x40, 0x0, &(0x7f0000000580)={0xfffffffffffffffd, 0x8001, 0x9, 0x0, 0x80000001, 0x81, 0xbc4, 0x1}) 01:58:51 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000300)=0x40, 0x4) bind$xdp(r2, &(0x7f00000000c0)={0x2c, 0x0, r1}, 0x10) 01:58:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000021000500d25a80648c63940d0200fc00100002400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) 01:58:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x638, 0x8085) ppoll(&(0x7f0000000340)=[{r0, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x100000000) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0xb2, 0x2001}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x4}, 0x0) clock_nanosleep(0x5, 0x1, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) unshare(0x20000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x7, 0x0, 0x6, 0x0, 0x9, 0xae6c}) ustat(0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) getgid() setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @null}, [@rose, @rose, @remote, @default, @rose, @rose, @netrom, @bcast]}, &(0x7f0000000180)=0x48) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) 01:58:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000580)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0xaa4371b065731708, 0x0) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000004c0)={0xffffffffffffffff, r2, 0x0, 0x8f, &(0x7f0000000400)="2989508887234db59172231e3cee4b1a2f12e983709d388356e86bb375719961b531fe61c5701157c43f675fda9f0432ed4376f9dc456e55eb68479f071aece02344288eb15e19aae0857d6283be719f8e552520a84e9d4ffc6e4d72d9c039f03b92e32391612deb7f99ac1464efea54f6c02c2eb5823581def1a1c3037eb63060bbfa2f79b6f7e4026ce182c6c023", 0x9, 0x9, 0x17db906d, 0x7, 0x0, 0x1, 0x8, 'syz0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x200) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) perf_event_open(&(0x7f0000000940)={0x5, 0x70, 0x4, 0x0, 0xffffffff, 0xb5a, 0x0, 0x400, 0xa00, 0xd, 0x4, 0x3, 0xe9, 0x40, 0x6, 0x9, 0x653a, 0xfffffffffffffff8, 0x6, 0x10001, 0x2, 0x3ff, 0x0, 0xfffffffffffffe00, 0x20, 0x3, 0xa8aa, 0x1ff, 0x2, 0xd9a, 0x7fff, 0xffff, 0x5, 0x2b70aa7d, 0x100000000, 0x7fff, 0x0, 0x7, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000900)}, 0x200, 0x2, 0x8, 0x9, 0x2, 0x8000, 0x2}, r6, 0x6, r0, 0xb) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000005c0)={0x0, @multicast1, @loopback}, &(0x7f0000000600)=0xc) accept4$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000008c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1010902}, 0xc, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[@ANYBLOB="90010000", @ANYRES16=r5, @ANYBLOB="020800000000fd00"/18, @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000008000100", @ANYRES32=r8, @ANYBLOB="3001020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff7f00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400fbffffff08000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636ff56e7400000000000200000000000000000800080000000e020000301123f61a54067fca333f758bd1fbae9cd5eb5965fb34aabac56930b71f9821d185af223993514112eb33f3a969fd396b177f7b0be46b3b6afa8db757f6235916a4a417d231219735e58efb591692fb030e6b524b533e3826b3b9aaf336aee7fe7133423390e6f13e1895921480697d4c10423db83783b5f27d3b59"], 0x190}, 0x1, 0x0, 0x0, 0x20008010}, 0x8000) 01:58:51 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd6008de0600072b0000000000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000608633df000000000000000000000000000000000000000100000000000000000000000000000001fca967e17f791010ef97509d33785b3ebcedd54da307c119afda030af88dfed0f83e15fe4c3489902fc9c54f8f6b98af323df5ec369ef74f382fed8f9616e7c0b6754ddd82a3c562877b13794108460e1f23ca4f4a025f"], 0x0) 01:58:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="24f5f5f1769e620aa734fa0095e0612687463915e3880201000080ffffffff874e2f98b579a7186270146d0e020692ffa8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@journal_async_commit='journal_async_commit'}]}) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2080, 0x0) connect$rds(r0, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) 01:58:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000001400095cabf105d19f010000000000850000008745536abae66a13a1fa78eddffa57eed7ce4edaaf479a32f42973fe413b6eda0595249ec7f0117278a20dbfb8a71b90dc17bd2589743359b9b6530d3bd7dfab1df96239c7d38b145ba75234c0b08a51186548a48e8f6b64693bf46fd52bbc1cad68110e4d699d6f9e46585fe644808b5d910cd63be761df9c44c67ade55a4beae2c", @ANYRES32=0x0, @ANYBLOB="14000200fe8000efffffff0000000000200000aa"], 0x2c}}, 0x0) setresuid(0x0, 0xfffe, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x3, 0x80700) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x4, 0x0, 0x62b97463e3452f39, 0x4}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)={0x1ff, r4}) sched_rr_get_interval(r2, &(0x7f0000000100)) syslog(0x0, 0x0, 0x0) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x40, 0x800) ioctl$VIDIOC_G_SLICED_VBI_CAP(r5, 0xc0745645, &(0x7f0000000040)={0x400, [0xffffffffffffffc0, 0x2, 0x100000000, 0x8, 0x700, 0x9, 0x5d6eda27, 0x10000, 0x6, 0x4, 0x4, 0x5, 0x94, 0x2a, 0x7, 0xa5, 0x0, 0x1, 0x9, 0x81, 0x1ff, 0x4dfb, 0x9, 0x5, 0x800, 0x7, 0x6, 0x9, 0x400, 0x100000000, 0x7, 0x7ff, 0x2, 0x6, 0x2, 0x101, 0x7, 0xff, 0x7ff, 0x7, 0x7, 0x7f, 0xfffffffffffffffa, 0x6, 0x9, 0x400, 0x3, 0x100], 0xe}) [ 169.203153][T10469] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 01:58:51 executing program 4: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', 0x0, 0xffffff15, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) [ 169.251339][T10478] EXT4-fs (loop0): Mount option "journal_async_commit" incompatible with ext3 [ 169.276985][T10469] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 01:58:51 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$net_dm(0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 01:58:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x0) [ 169.428117][T10489] rdma_op 000000002baf56c6 conn xmit_rdma 00000000cfceb6f5 [ 169.518055][T10499] rdma_op 000000002f74d678 conn xmit_rdma 00000000cfceb6f5 01:58:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) mknodat(r0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000001c0)={0x4a, "eeff4ac2a87b8d1b63cfbdcb3f998ab68b5db06d7b2b1421c43fe601385e6065f745b31ede5f96725e284bb200411db9d5c3e38a3e752e87a30e1534ab52fc59cf7d1f90e64b85cea3d625d9e29bc22016590946259780fca11097fbb80f065b0e5dfd207ec64e3adfeb06aca40dda1b7caf266adfc790210ba8688afd30aaec"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x4000, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 01:58:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) lstat(0x0, 0x0) r1 = dup2(r0, r0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc, &(0x7f0000000200)=""/4096, &(0x7f0000000040)=0x10cd) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000100)=0x7521, 0x4) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) 01:58:51 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$net_dm(0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 01:58:51 executing program 4: r0 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffffa) keyctl$clear(0x7, r0) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x1ffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0x54a3, 0x0) 01:58:51 executing program 1: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000002c0)) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x8400, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e66735f6578706f72743d6f6e2c736d61636b6673666c6f6f723d2c66736d616769633d3078303030303030303030303030303030312c646566636f6e746578743d73797361646d5f752c7375626a5f747970653d586f20ca1187a0e3894c1b62211a9081ee"]) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) sendmmsg(r1, &(0x7f0000001540), 0x553, 0x0) 01:58:51 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000300)={r1}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r2, 0x8004550f, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x4000, 0x7ff0bdbe}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xfffffffffffffe60) r4 = syz_open_procfs(r3, &(0x7f0000000140)='setgroups\x00') sendto$llc(r4, &(0x7f0000000180)="2870f6196516b075fdd1d4e2c62d89b1f9758cce9c6b3644b28467d3ac63be5d7cdf1b6a938485077b71ec6ac1cebd7ca5dafd16c2cc7aa244263ddf464cb5bbc5e90951109262fe443868b523e87f4d8441eeb52a308ab05db0a8a19ccf4695e5a5145096aeadebece4f784315a905fb17e92919df2ddc7ad2a9249fa587822fa7eea4b42a830c6b5e258adedd76db0917d7bbd4f2e6e561c49d075239a872ac64b4c61f5c4bff08233a8860fc54b57df351223dd62257a05e48ec2c171b4bf0ef003cd674d", 0xc6, 0x800, &(0x7f0000000100)={0x1a, 0x0, 0x400, 0x1000, 0x7, 0x4, @broadcast}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000340)={r4}) [ 169.779265][ T27] audit: type=1804 audit(1564970331.725:34): pid=10518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir851022933/syzkaller.KDgNfp/9/bus" dev="sda1" ino=16573 res=1 [ 169.822473][T10523] rdma_op 000000008195df00 conn xmit_rdma 00000000cfceb6f5 01:58:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x8, 0x80004, 0xff) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./bus\x00', r2}, 0x10) sendfile(r1, r2, 0x0, 0x8000fffffffe) 01:58:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) getpeername(r2, &(0x7f0000000180)=@can={0x1d, 0x0}, &(0x7f0000000100)=0x80) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x40, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200020}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=@newqdisc={0x84, 0x24, 0x0, 0x70bd2a, 0x25dfdbfd, {0x0, r3, {0xfff2, 0xa}, {0x0, 0xf}, {0xf, 0xfff1}}, [@qdisc_kind_options=@q_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0x3c, 0x2, [@TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_INDICES={0x8, 0x1, 0xa}, @TCA_DSMARK_DEFAULT_INDEX={0x8, 0x2, 0x101}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_INDICES={0x8, 0x1, 0x8}, @TCA_DSMARK_DEFAULT_INDEX={0x8}, @TCA_DSMARK_DEFAULT_INDEX={0x8, 0x2, 0x100}, @TCA_DSMARK_DEFAULT_INDEX={0x8, 0x2, 0x2}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xa79}]}, 0x84}, 0x1, 0x0, 0x0, 0x20048800}, 0x20000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x21) 01:58:51 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$net_dm(0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) [ 169.912566][ T27] audit: type=1800 audit(1564970331.755:35): pid=10518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16573 res=0 01:58:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) lstat(0x0, 0x0) r1 = dup2(r0, r0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc, &(0x7f0000000200)=""/4096, &(0x7f0000000040)=0x10cd) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000100)=0x7521, 0x4) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) 01:58:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x1, 0x0, @pic={0x0, 0x0, 0xb9}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r2, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000000)={0xc}) [ 170.058888][ T27] audit: type=1804 audit(1564970331.765:36): pid=10528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir851022933/syzkaller.KDgNfp/9/bus" dev="sda1" ino=16573 res=1 [ 170.164169][T10553] rdma_op 0000000034b64c88 conn xmit_rdma 00000000cfceb6f5 01:58:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sockstat6\x00') ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x198) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl(r1, 0x20000000, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') 01:58:52 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_FPEMU(0xa, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000240)={0x0, 0x40, 0x0, [], &(0x7f0000000200)={0xbf0b7f, 0xb0, [], @string=&(0x7f00000001c0)=0x6}}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/19, 0x13}], 0x1) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e000000130081c5e4050cecdb4cb9040a485e431c00000000ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1}, 0x0) [ 170.229477][ T27] audit: type=1800 audit(1564970331.765:37): pid=10528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16573 res=0 01:58:52 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$net_dm(0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 01:58:52 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000100)='net/udplite\x00') ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x29) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc038563c, &(0x7f0000000000)) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) 01:58:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x2000008000000004) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x8, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000040)=""/61) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="30206d4dcc0ed3ab7a71ca2bf9f99ea92e08838a470997f2c933318b470c5f4212e4d4e9e8c7bd2b3e47e6b80f00e02225f5e89ac7feccaaa74cc77d6d47dc145f157d01667513e2a453238d710194f5e6d83e12bf10b50167a9a25a96860c070edf2c0c44d6c0b6f5fbefc4c21b343381abff6415bc1a9cef266efb623243fc6ef995c2a8724a7fe9f55559bb0e9635f864fb9175006696c539d0af0987d99b349840ffc7aeb60f5382b5efa75c561af579d6c44c88d14de7d1adec8d8cffb8e53a75e87957c018fd3b2d6a"}, {&(0x7f0000000180)="64be163436c808774c3c438298ae31f5e7a515d16cc3a8d54a0bfcd9e52db833847e84b1b85165f1a1022dbda634b3100c5f819c55b4932df1a37e"}], 0x1) [ 170.405348][ T27] audit: type=1804 audit(1564970332.045:38): pid=10543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir851022933/syzkaller.KDgNfp/10/bus" dev="sda1" ino=16580 res=1 [ 170.612449][ T27] audit: type=1804 audit(1564970332.195:39): pid=10543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir851022933/syzkaller.KDgNfp/10/bus" dev="sda1" ino=16580 res=1 [ 170.644504][T10582] rdma_op 000000001ee0430d conn xmit_rdma 00000000cfceb6f5 01:58:52 executing program 1: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000002c0)) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x8400, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e66735f6578706f72743d6f6e2c736d61636b6673666c6f6f723d2c66736d616769633d3078303030303030303030303030303030312c646566636f6e746578743d73797361646d5f752c7375626a5f747970653d586f20ca1187a0e3894c1b62211a9081ee"]) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) sendmmsg(r1, &(0x7f0000001540), 0x553, 0x0) 01:58:52 executing program 3: getrusage(0xffffffffffffffff, &(0x7f0000000340)) 01:58:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x1, 0x0, @pic={0x0, 0x0, 0xb9}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r2, &(0x7f0000008a80), 0xdf6222d6836dde26, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000000)={0xc}) 01:58:52 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101001, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/bus/../file0\x00', &(0x7f0000000100)='9p\x00', 0x40000, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) r2 = creat(&(0x7f0000001280)='./file0/bus\x00', 0x0) unshare(0x40600) fchmod(r2, 0x0) 01:58:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz1\xeb', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000002c0)="824455f55d0af2a53594ee4be08f8b87e239e84c1374ae48559fe5642f52c0d878c48e6be7", 0x25, 0xfffffffffffffff8) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000640)={'bridge_slave_0\x00', 0x6, 0x623}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x0, 0x0, 0x3c3) 01:58:52 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000080)={0x5, @capture={0x1000, 0x1, {0x5, 0x1c}, 0x4, 0x7}}) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0585611, &(0x7f0000000040)={0x80000000000, 0x2, 0x0, "ec1e983cbce963c281174bd21ee3c64a6e4841333c64b596f28892e8324e92c5"}) 01:58:52 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'\x00', 0x43}) 01:58:52 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-control\x00', 0x1fffd, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x9, "eda9a7d83bc215b20d"}, &(0x7f0000000280)=0x11) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e20, @loopback}}, 0x687, 0x80}, 0x90) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x10d, 0x800000000e, 0x0, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101e00, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r4, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @broadcast}, @ib={0x1b, 0x0, 0x101, {"8dc75d0083b08ac426088831ba43fc15"}, 0x101, 0x6, 0xc}}}, 0x118) write$P9_RLOPEN(r3, &(0x7f0000000200)={0x18, 0xd, 0x2, {{0x80, 0x0, 0x7}, 0x100000000000}}, 0x18) 01:58:53 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x8000000000002040, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000240)={0x10001, &(0x7f00000001c0)="b70c075cdd09d0f31de10b1e487c3adf7c8a49975ede7ab3362c5eface00de21fda353836e17d4214f8c2352d68b7d9737ba61d771cd64fc6e3d1d6779796cb1fee75b90ff9f5a7ddd609b3f2e56d64b1fa7b0494af06f7a81aae638b5a90bc1924aa17106"}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000480)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e20, 0xfff, @rand_addr="8bd9805f7f0d0a08ddb7c757d9471537", 0x80}, @in={0x2, 0x4e22, @rand_addr=0x81}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x3, @local}, @in6={0xa, 0x4e22, 0x4, @loopback, 0xfff}, @in6={0xa, 0x4e21, 0xffffffffffffff5d, @loopback, 0x727}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x3, @loopback, 0x3}], 0xcc) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f00000003c0)='^^:$selfsystemsecurity!cpuset},.ppp0eth1\'usernodev\x00', r2) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) getpeername$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10) r4 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x408c02) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f0000000040)) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000080)={0x40, 0x2, 0x5, 0x2, 0x9002}) r5 = request_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)='\x00', 0xfffffffffffffffd) keyctl$assume_authority(0x10, r5) 01:58:53 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x6400, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000240)) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000200)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x2, 0x0, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x8, @empty, 0x22ce}], 0x1c) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) 01:58:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz1\xeb', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000002c0)="824455f55d0af2a53594ee4be08f8b87e239e84c1374ae48559fe5642f52c0d878c48e6be7", 0x25, 0xfffffffffffffff8) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000640)={'bridge_slave_0\x00', 0x6, 0x623}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x0, 0x0, 0x3c3) 01:58:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz1\xeb', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000002c0)="824455f55d0af2a53594ee4be08f8b87e239e84c1374ae48559fe5642f52c0d878c48e6be7", 0x25, 0xfffffffffffffff8) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000640)={'bridge_slave_0\x00', 0x6, 0x623}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x0, 0x0, 0x3c3) 01:58:53 executing program 1: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='children\x00') setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='vlan0\x00', 0x10) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x7, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0xc018aec0, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x1}) 01:58:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1d, 0x0, &(0x7f0000000080)=0xfffffffffffffe7f) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4400, 0x0) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000040)={0x3, 0x1}) 01:58:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) openat$kvm(0xffffffffffffff9c, 0x0, 0x200, 0x0) 01:58:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x400000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x9) ppoll(&(0x7f0000000140), 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0, 0x3e6) r3 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfa\x81\x00\x00\x00\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7.\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x6) fcntl$setlease(r2, 0x400, 0x2) r5 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="2b0000000600000031da9485021fda4700200000000000000000020100"/43], 0x2b) r6 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x81, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000040)=0x5, 0x4) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r2, &(0x7f0000005200)=""/4096) r7 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r7, 0x0, 0x2}) 01:58:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps_rollup\x00') close(r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x1, 0x8001, 0xb4d, 'queue0\x00', 0x2}) ioctl$KDMKTONE(r0, 0x4b30, 0x7) r1 = gettid() syz_open_procfs(r1, &(0x7f00000000c0)='net/igmp\x00') 01:58:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) accept4(r0, 0x0, 0x0, 0x0) 01:58:54 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x68000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x8, "6c5e7f9197df91d0"}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x5}, &(0x7f0000000200)=0x8) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000000)="00100000", 0x4) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x41) sendto$inet6(r2, &(0x7f0000000040)="ce03110075000100ff683d797b37962c93901efc67195c22cc6dc37916237d8599b512eceb92bd30960466bf00000000070000e19b40b4288ba4e852", 0x3c, 0xfffffffffffffffe, 0x0, 0x3b4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={r1, 0x8}, &(0x7f0000000280)=0x8) 01:58:54 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000200)=0x2) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0xffea, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000400)={0x6b4, {{0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x196d}}, 0x1, 0x2, [{{0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}}, {{0xa, 0x4e24, 0x0, @loopback, 0x8}}]}, 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 01:58:54 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x40004) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000000)={0x6, 0x0, 0x301f, 0x2, 0x67, {0xa3a7, 0x100}}) 01:58:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x400000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x9) ppoll(&(0x7f0000000140), 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0, 0x3e6) r3 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfa\x81\x00\x00\x00\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7.\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x6) fcntl$setlease(r2, 0x400, 0x2) r5 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="2b0000000600000031da9485021fda4700200000000000000000020100"/43], 0x2b) r6 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x81, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000040)=0x5, 0x4) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r2, &(0x7f0000005200)=""/4096) r7 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r7, 0x0, 0x2}) 01:58:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x400000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x9) ppoll(&(0x7f0000000140), 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0, 0x3e6) r3 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfa\x81\x00\x00\x00\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7.\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r4 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x6) fcntl$setlease(r2, 0x400, 0x2) r5 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="2b0000000600000031da9485021fda4700200000000000000000020100"/43], 0x2b) r6 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x81, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000040)=0x5, 0x4) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r2, &(0x7f0000005200)=""/4096) r7 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r7, 0x0, 0x2}) 01:58:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) openat$kvm(0xffffffffffffff9c, 0x0, 0x200, 0x0) 01:58:54 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2f2000000000000000deef07faf59898f108ae96dc65bca87fb9f914c80149abc5f3fd0d1bffcbf8ecb5e652a4ec1a36549e1e5b21851d62d902636da19154983a73d493e92bd423f6b545ec8f8a620991e20c6f81ed07bc5241843fe3fa676259abff9b6e81289264386593c883615c3610fadf51f348c4f60c3b1e6260ecc380f7a9839654f753d1f785b1cebf293f7fac8fd6881f7bd3a177c72680393873aa1dce85def612b1eb7ee83198e9bd33337ec868bb1f0bd338fb3823831e65096f67fbde2bbe19bc128d9c1c926a3ae6340baa23e0d9ea484fbe7efd996bd1b1e7ad49c57b66fdc3c20400000007040103040101c20400000006000100c910fae1383d94f17370f1f1d36805c8645800"], 0x110) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r1, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0x9) 01:58:54 executing program 2: setxattr$system_posix_acl(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{}]}, 0x2c, 0x2) [ 172.344684][T10669] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 01:58:54 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/grou\x99X\xfe\x18a\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdfOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) 01:58:54 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) syncfs(r0) r1 = memfd_create(&(0x7f0000000000)='::trusted8\x00', 0x0) lseek(r1, 0x0, 0x3) 01:58:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='lo\x00\x00\x00\x00\xdf\xff\xff\xff\x00', 0xc99691c97198e2fd) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffa, 0x4) sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0xfffffd20, 0x0, 0x0, 0xffffffec) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x1, 0x1}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x7, 0x20}, &(0x7f0000000240)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl(r4, 0x1001000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x0, 0x0, 0xfffffffffffffe3d) [ 172.568036][T10669] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 01:58:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmmsg(r0, &(0x7f0000003b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40012020, 0x0) bind$can_raw(r0, &(0x7f0000003c80), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000100)=0x5) sendmsg$can_raw(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "552f30fc1e5e162e"}, 0x10}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000)=0x6, 0x4) r3 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f0000000200)=0x1) [ 172.653854][T10704] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 172.661257][T10669] syz-executor.4 (10669) used greatest stack depth: 22056 bytes left 01:58:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) openat$kvm(0xffffffffffffff9c, 0x0, 0x200, 0x0) 01:58:54 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@generic, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)=""/220, 0xdc}, {&(0x7f0000000340)=""/201, 0xc9}, {&(0x7f0000000440)=""/142, 0x8e}, {&(0x7f0000000500)=""/163, 0xa3}, {&(0x7f00000005c0)=""/86, 0x56}], 0x5, &(0x7f00000006c0)=""/117, 0x75}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="8500000008000000d5000000000000009500000000000000b22f86a4fa0145cf146a053776cb2aba05055e71d0c5446c404b782d1afc94c471ff794636f2b13b3181b8a19c22a355149fea27d15898bbc9ff13ebebf174ea15221ecbd607ad37b6ab9305be58caf56db15ccd18dcfaf4"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000200)="7608121b51593b45b72c2c3385ff", 0x0}, 0x28) 01:58:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003fc0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003d80)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/171, 0xab}, {&(0x7f00000001c0)=""/76, 0x4c}, {&(0x7f0000000240)=""/155, 0x9b}, {&(0x7f0000000300)=""/243, 0xf3}, {&(0x7f0000000480)=""/192, 0xc0}, {&(0x7f0000000540)=""/65, 0x41}], 0x6, &(0x7f0000000640)=""/4096, 0x1000}, 0xffff}, {{&(0x7f0000001640)=@ax25={{0x3, @bcast}, [@rose, @rose, @default, @netrom, @rose, @rose, @rose, @rose]}, 0x80, &(0x7f0000000000)=[{&(0x7f00000016c0)=""/162, 0xa2}], 0x1, &(0x7f0000001780)=""/153, 0x99}, 0x7d462115}, {{&(0x7f0000001840)=@nfc, 0x80, &(0x7f0000002a80)=[{&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/33, 0x21}, {&(0x7f00000028c0)=""/63, 0x3f}, {&(0x7f0000002900)=""/106, 0x6a}, {&(0x7f0000002980)=""/228, 0xe4}], 0x5, &(0x7f0000002b00)=""/4096, 0x1000}}, {{&(0x7f0000003b00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003b80)=""/250, 0xfa}], 0x1, &(0x7f0000003cc0)=""/150, 0x96}, 0xfffffffffffffffc}], 0x4, 0x121, &(0x7f0000003e80)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000003ec0)=0x5, 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) r3 = semget$private(0x0, 0x3, 0x42) semctl$SEM_STAT(r3, 0x5, 0x12, &(0x7f0000003f00)=""/41) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 01:58:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000848}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r1, 0xb04, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffdd}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}]}, 0x44}}, 0x4000) r2 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x9, 0x202) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x80dc5521, &(0x7f0000000bc0)) 01:58:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) openat$kvm(0xffffffffffffff9c, 0x0, 0x200, 0x0) 01:58:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x81, 0x15, 0x38}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f00000003c0)="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"/1538, 0xfffffffffffffed2) sendfile(r1, r2, 0x0, 0x10000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_elf64(r2, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xf8b8, 0x8001, 0x80, 0x7, 0x2, 0x3e, 0x7, 0x131, 0x40, 0x364, 0x5ca6, 0x2, 0x38, 0x2, 0x800, 0x3, 0x8}, [{0x1, 0x3, 0x1, 0x7fff, 0x0, 0x5, 0x5ee, 0x3}, {0x1, 0xbadc, 0x7, 0x1, 0x8, 0x3ff, 0x4, 0x2}], "059386989abf8fdbf4d2a002a27d7bcd036cf87c1bd6fe29c6d2296eba5e"}, 0xce) 01:58:55 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) r1 = accept4(0xffffffffffffffff, &(0x7f0000000a00)=@isdn, &(0x7f0000000980)=0x80, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ec0)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4}}, &(0x7f0000000fc0)=0xc2e1) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xff, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="42190df362005c46647aff3998d87a152f59d11404d3d7f78c438e8c808efc60eec5", 0x22, 0x4}], 0x20c0c00, &(0x7f0000000480)={[{@dmask={'dmask', 0x3d, 0xff}}, {@nls={'nls', 0x3d, 'maccroatian'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_no='show_sys_files=no'}, {@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}], [{@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fowner_lt={'fowner<', r2}}, {@pcr={'pcr', 0x3d, 0x25}}]}) io_setup(0x5, &(0x7f0000000000)=0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm-monitor\x00', 0x4e0480, 0x0) write$FUSE_STATFS(r4, &(0x7f0000000700)={0x60, 0xfffffffffffffff5, 0x3, {{0x100000000, 0x0, 0x5, 0x73c00, 0x1, 0x3, 0x7c, 0x6}}}, 0x60) r5 = socket$isdn_base(0x22, 0x3, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) io_submit(r3, 0x2, &(0x7f00000009c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0xffffffffffffff8d}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, r6}]) getgroups(0x1, &(0x7f00000005c0)=[0xffffffffffffffff]) write$FUSE_CREATE_OPEN(r6, &(0x7f0000000600)={0xa0, 0xffffffffffffffda, 0x8, {{0x4, 0x9, 0x2, 0x4, 0x1000, 0x7f, {0x4, 0xef06, 0x1, 0x1, 0x200, 0x9, 0x7, 0x7c9, 0x2, 0xda7, 0x7, r0, r7, 0x5}}, {0x0, 0xc}}}, 0xa0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, &(0x7f0000000580)={0x3, 0x6}) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f00000000c0)={0xb99, 0x1, 0xff, 0x8, 0x6, 0x4, 0x1, 0x80000000, 0x7, 0x5, 0x1000}, 0xb) 01:58:55 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/105, &(0x7f0000000100)=0xfffffffffffffd8e) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x6, 0x4) 01:58:55 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xffffffff, 0x12) 01:58:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) 01:58:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbb) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa000, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000240)=""/4096) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 01:58:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x804000000000c) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) pwritev(r0, &(0x7f0000000a40)=[{&(0x7f0000000280)="703703b960f5d8aae39af6bf6c3d245c34d55b6edf14d025daa25a3b69a4b1b4357e5e95fbceced81a0bb1c582d54ff80ff52681888f68b5ef8f87cb2df3b402852f3a73e8ee3606907b20f165b40a9bfee87ee7d93394aec5bddb1ef9881422044d22f5459502661e842a7873447549c047316ecacc0c012d68a70b706bdf969caf235b55ec0d1f7fe47880025e864a143526b964cd253e67c548dfdc38d5f2883da5ab1aa4d986810c7f6f9e680617ecacf8714b8d41ba55843bbd809064dcd7d3", 0xc2}, {&(0x7f0000000000)="73ba1ee6da298afc926d5e1183ca1142600cdaf14b93357604bbcd3669b3ece7b62bf59f07686f367182b1ec370e74c0dedb01b7b0aa78e7b55b1505dfa028e884993a7c613bbe3789de0463e7f5c350c2b9455be8cd164e014aa545e88d7b9c049e974a94fc957cd54e", 0x6a}, {&(0x7f00000003c0)="3e75da245d3791f710d7b31ff6a442d08250373808586d782b73c894b29f68aa6e4346776f3786e0c9d33f9ffce2eb0fceb06e8f57f31d9a499dcc0c917dc6f8571259afdc71c4ab0c5a476a3c23e9eaa3fe8905257f446c48cfefd0acffac1e8e3ce47658eaecf8f03e030cb7775d8ef7c0316239b4ce8c0634879874a34c778b88c34e2589e8075bf63152fb7bfe4ce6ebfcc409", 0x95}, {&(0x7f00000005c0)="4b8adafcabd3611b2d009db8c7cb288873b9152e5ad47cabfe1acbe993dc0428e262a8a881f8f7ef5535b4bc9402cddf21e4ad3f949cb0923c3a42ca83aff2790fe80dc20e30fac826848883d9b182baebb6d5c547b3efb866aa4ff8ca333e5475e956d9b5c73f13e9d764a3cfbac60a897908fa3a1e4156e546f04d9c9a8f404c96a3a130d347123c4b52df713857b1b6aafd035723d76c64cf391f2253d17da0351064fb30b7467dadc43fb4319677d5b3417dc0c7fc248d53e12787f77c75708e3096634c190f6b2c8df2ba140ecc3876c3a4d3322ee791772b1b7ce9660de955f20ea8b660dc75d0f3c611fe72a9aaffbc9cba79f16e6c", 0xf9}, {&(0x7f00000006c0)="b4430e137fcf3aa79bbbc22fbbb0b808c536ea2d04bcf6b9924883847682edabd747afa10875179b786e0aa26463e7f127faa24d08bf9a7e9a0a359d9b6fda8d42150e4c4fbf4cb3578048a80388c88384d9332e379079719fe50331ec91f742a1c08bac45e74943245936b9c9a90a5bd2bb7fd289ebee11a7ec31f2ffd08d8f996fc22f79bfea8aab27564fcaa524cb4e544b3ab8334cffb736b3e83b25d0ec19ee99926fee34dc08ba0bcc2fb491f2647d3c9f94ee375a09411845c21ab263d7ffc5930d", 0xc5}, {&(0x7f00000007c0)="0e945c3a9a68773f5e19ee8c4d24ad263ba51d9b60a364964a278d3940010b75443cdd9c2bd8ef9b5203c92fe129f4eef093c52e8ce45f4ab92e98bb47760b4d1a80714880c580fa3779ef1a6dc63977cb84a6662e44b5dd880aa333fcf48da2b93f6712c15bf84695c43f9fdf0c82cf13d5fd016396c620a6f686a98190570f22e781c0255fbdff172b1c6a42801148", 0x90}, {&(0x7f0000000880)="2e94004cd1060ad27fb9128c2545000130328a49bf0dca48fe655a16a318a00435d394929e38d7e46234329470099fdc8627b38c2292664ee31327ff7f265bb9928a0d6fa87b41ce5a22c5f65a2fb1fed96cc3a8a99d9ba8854945b37c8ff77371767fad5b26a3d1b188eac8ec224854021c26bd811e9e094f0c154cc3ae4feb41808bb614daed593a22f0c6defa82b759e7b282d6cfa1d843e43e0462991ba8416c64f711ee24816965f18df01fa8da43db5123147c50a66e6f88f4cc1416a5ff9c61ec07f1b3ee5fa99e5d9d", 0xcd}, {&(0x7f0000000980)="1292bc366ff196d7dba9bf9860d5e726f889ed76752ffbd229f5d11b2b8573b273d2565cd71f18a031a93d2c12881355ed9144257143253e9c397d28ad04f28588df4c091208f137d73bb0cc1e6ec88477b21f352106bd6b51747df68e1222436998bb86ba98db24ec22cfb02e7b3e3c78f50241cf37a0b39ea360db56ff6f03bd1b5290f481ae7006ea9c36954032e3ea6b6406", 0x94}, {&(0x7f00000000c0)="48ee6d9288d7d5c6b03c1a81db7f16a6755b9d77fc70d9533a54d2aab657f1e0cd830ff69ff7ea059f", 0x29}], 0x9, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000bc0)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000e40)={0x0, 0x341, 0x8, [0x907, 0x2ab2, 0x9, 0x3ff, 0xd8, 0x5, 0x2, 0x1f]}, &(0x7f0000000e80)=0x18) sendmsg$inet_sctp(r1, &(0x7f0000000f00)={&(0x7f0000000c00)=@in={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000e00)=[{&(0x7f0000000c40)="3e5732a01605b8d4e7a8b48b4693f95cd6b3113e5ceb3240ac6373f4f332ab58b3cc9429911cab2434cbc853855ed5db45d3ab65cae5465c4a5ef74d0a641024a6ff5edb2cb01f84a57c7aded216fcff62d7b20258fa530bf61fb4a90aaccd9d98bd672396ff542e291977c17b9541631574b4231314b228ae488336a078dafb84d1ad1f1356fb08a98e31e7060fb5da62085fcc48be40c4e1aa0f75c652a39729c3", 0xa2}, {&(0x7f0000000d00)="4737804ad764c91f2f1387d7b627613c386dee7e8ee595aa0390165f57a3597dff60db4c0020896fde85390ac21b0fd2991d91efc80dbac7514cb2d2cc1e287b387a1b622c4a35bf1bfa3b68a737cd222270c3b456e017cef845f3f0b6c88976edfa6290a5dfdadeb5998e7d8f7b461c66ab2643709c81a05d38f9f8389f19300fd992e94ac010b8d8c7bdea7003041b27f487cef46429286d85ce6432492095c6b76f521c7922d27d1683f7fc5c36fb4451512de2a98c66e56bea90a6fc24457e38f045734762adfc31557ce4c6792c8737", 0xd2}], 0x2, &(0x7f0000000ec0)=[@sndrcv={0x30, 0x84, 0x1, {0x7ff, 0x3, 0x200, 0x100000001, 0xa5f, 0x9db5, 0x4, 0x1, r2}}], 0x30, 0x800}, 0x4) ioctl$int_out(r0, 0x37827f96408bee47, &(0x7f0000000480)) r3 = creat(&(0x7f0000000b40)='./file0\x00', 0x0) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000b80)={0x40, 0x1b63}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000b00)) ftruncate(r1, 0x1f) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="081fe87d6b9734f51ea8456962c10c007bf22e2211b1a335a83085ecc70dc992f9cb466273b1b0af49fb2153cf007fff5260238f5a8391c3e14c731756d053aedfbcc3ab8032e9d09a3ce9e87b4283eb181ee66c42eed4eb39af40f50f3386685ef170d6608d3f7352c9922f8f26f301fd597cbb979242313c7af80953caa176bdbf9761c36cb00533208e950c80e9b3b7202d258ac725b95a3a416baadf1e5fbf1745288f68b9dc0426ed9d205449c08c29b6af79efb8889bebfd67bfea65243e08d28f80007f4f4db24e3a48d7"}, {&(0x7f00000004c0)="3287b5235e6ed58bc2ad120969a3f30af0636a466e5e8d8830cef6f8aea02a5bcd1a3b5872433fe028e36040201681df1989206bddcd780bc5830959f1137ac19978fe6c8e902440eba7bb3bce59ee4ee3183480b062854f76c1b49375e75f3af38a787b41cba3c74f1d7b1a6f84435ac97a4d54100aa1988f8a31c8671d997b50baa633d02a3797ce72317c3c29b8eb82c7d4ddd6d73f197b3e092219fea5042bcd09a5d4f1c25e3d95db58d4e4c347e35f9a5517473e897b178ebdd5ea547eb58ca7077af9f98c1b3f8bb37d9acd014ae807ca1c2ec0f57c727d65cfb08350087a73783c"}], 0x68) 01:58:55 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) 01:58:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='lo\x00\x00\x00\x00\xdf\xff\xff\xff\x00', 0xc99691c97198e2fd) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffa, 0x4) sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0xfffffd20, 0x0, 0x0, 0xffffffec) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x1, 0x1}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x7, 0x20}, &(0x7f0000000240)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl(r4, 0x1001000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x0, 0x0, 0xfffffffffffffe3d) 01:58:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) 01:58:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) 01:58:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='lo\x00\x00\x00\x00\xdf\xff\xff\xff\x00', 0xc99691c97198e2fd) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffa, 0x4) sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0xfffffd20, 0x0, 0x0, 0xffffffec) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x1, 0x1}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x7, 0x20}, &(0x7f0000000240)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl(r4, 0x1001000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x0, 0x0, 0xfffffffffffffe3d) 01:58:55 executing program 0: r0 = socket$inet(0x2, 0x9, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2}) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7, 0x201) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) [ 173.839420][T10773] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:58:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x42, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x2, 0x23, 0x6e9, 0x1, 0x8c1, 0x7, 0x1bc, 0x6, 0x1, 0x90b5, 0x9a}, 0xb) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000001c0)) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000017e3648000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000804a78dbe277cd5864be40d084491b94ba1068a2192855808b5e8f1673968ffc416a0582ffdd715bcece759e6690d969e5773a9f8448d4de0cc5fc0756e5bdd6ecbdee045c744e809d1819e39fd256"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x21, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x21) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000180)=@get={0x1, &(0x7f0000000400)=""/4096, 0x40}) [ 174.811353][ T7] device bridge_slave_1 left promiscuous mode [ 174.817542][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.871290][ T7] device bridge_slave_0 left promiscuous mode [ 174.877477][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.630839][ T7] device hsr_slave_0 left promiscuous mode [ 175.670619][ T7] device hsr_slave_1 left promiscuous mode [ 175.725168][ T7] team0 (unregistering): Port device team_slave_1 removed [ 175.736120][ T7] team0 (unregistering): Port device team_slave_0 removed [ 175.745744][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 175.783118][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 175.843621][ T7] bond0 (unregistering): Released all slaves [ 175.955799][T10798] IPVS: ftp: loaded support on port[0] = 21 [ 176.011359][T10798] chnl_net:caif_netlink_parms(): no params data found [ 176.037855][T10798] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.045170][T10798] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.052751][T10798] device bridge_slave_0 entered promiscuous mode [ 176.060187][T10798] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.067340][T10798] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.074943][T10798] device bridge_slave_1 entered promiscuous mode [ 176.089939][T10798] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.100399][T10798] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 176.118367][T10798] team0: Port device team_slave_0 added [ 176.125021][T10798] team0: Port device team_slave_1 added [ 176.262964][T10798] device hsr_slave_0 entered promiscuous mode [ 176.303498][T10798] device hsr_slave_1 entered promiscuous mode [ 176.350499][T10798] debugfs: Directory 'hsr0' with parent '/' already present! [ 176.370784][T10798] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.377852][T10798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.385217][T10798] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.392299][T10798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.428890][T10798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.439409][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.447290][ T3520] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.465395][ T3520] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.478405][T10798] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.488590][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.497373][ T3520] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.504446][ T3520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.521238][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.529486][ T3520] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.536566][ T3520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.544839][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.553558][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.562172][ T3520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.572541][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.583853][T10798] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.596489][T10798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.604760][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.625274][T10798] 8021q: adding VLAN 0 to HW filter on device batadv0 01:58:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) 01:58:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) 01:58:58 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/105, &(0x7f0000000100)=0xfffffffffffffd8e) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x6, 0x4) 01:58:58 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x1) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='irlan0\x00', 0xfffffffffffffe16) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:58:58 executing program 0: setrlimit(0xf, &(0x7f0000000080)={0x0, 0x3f}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000740)='./file0\x00', &(0x7f00000007c0)=[&(0x7f0000000780)='bdev-]\x00'], &(0x7f0000000880)=[&(0x7f0000000800)='\x00', &(0x7f0000000840)='TIPC\x00'], 0x800) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7, 0x800) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f00000003c0)='./file1\x00', 0x38) read$eventfd(r0, &(0x7f0000000380), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000680)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000700)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x2, @rand_addr="19581c6a1e04867173419e18ba5c4587"}, r2}}, 0x30) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) chdir(&(0x7f0000000040)='./file1\x00') setxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x4b30, 0x9}, {0xb3, 0x7}]}, 0x14, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000340)) getuid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRES32=0x0, @ANYBLOB="0200fdff", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="b730cd74705747cec6a910be2f5ed6bc324f26bba7214c7774bb135b", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x6c, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7570707765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c04"]) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x1c, r3, 0xb19f16fb7a000bb3, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x54) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='ntfs\x00', 0x0, 0x0) 01:58:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='lo\x00\x00\x00\x00\xdf\xff\xff\xff\x00', 0xc99691c97198e2fd) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffa, 0x4) sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0xfffffd20, 0x0, 0x0, 0xffffffec) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x1, 0x1}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x7, 0x20}, &(0x7f0000000240)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl(r4, 0x1001000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x0, 0x0, 0xfffffffffffffe3d) 01:58:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa000800450004280000000000039078ac141400ac1423bb0703907800070000000000000000000000000000083b6bbd4a02b4a6ab9b3f1523c3fe07094d61780260909659e60bbf9faf5da849dc72cb874efd51197f3739cd079dd7ce976ca0647a0b0ad34287166af40157984ac5a9f5977accd90d568af21808e3a2d8afec73dd42b6c9d722784c20dc0ae29cb75daf7abdca48b8c631715330596da2e89f43a61f521a14d1c1a0c2e164105403ae64f7d0a27643cf7c6f8b22f10d13649d8bf5040000000000000063ffd51eef6cfde0102c3bd23ec03ea94926fa0991165e8500c1f815f0f1859164e7"], 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:58:58 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/105, &(0x7f0000000100)=0xfffffffffffffd8e) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x6, 0x4) [ 176.881080][T10811] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:58:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x200, 0x0) 01:58:59 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/105, &(0x7f0000000100)=0xfffffffffffffd8e) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x6, 0x4) 01:58:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) io_setup(0x8001, &(0x7f0000000040)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xa, 0x5, r0, &(0x7f0000000080)="b909b64049367e969132582618525fddbea485c548bf717ebaf379cf74fcaeb5853bdd8d95372abd3a7c537b89", 0x2d, 0x9, 0x0, 0x1, r3}, &(0x7f0000000140)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001000) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x1c100) [ 177.025834][T10831] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 177.129446][T10837] ------------[ cut here ]------------ [ 177.134958][T10837] ODEBUG: free active (active state 0) object type: work_struct hint: smc_tx_work+0x0/0x1d0 [ 177.145353][T10837] WARNING: CPU: 0 PID: 10837 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 177.154907][T10837] Kernel panic - not syncing: panic_on_warn set ... [ 177.155595][ T3907] kobject: 'loop5' (00000000a61e9a2f): kobject_uevent_env [ 177.161494][T10837] CPU: 0 PID: 10837 Comm: syz-executor.4 Not tainted 5.3.0-rc2+ #97 [ 177.161501][T10837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.161506][T10837] Call Trace: [ 177.161533][T10837] dump_stack+0x172/0x1f0 [ 177.178658][ T3907] kobject: 'loop5' (00000000a61e9a2f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 177.186635][T10837] ? debug_print_object+0x80/0x250 [ 177.186651][T10837] panic+0x2dc/0x755 [ 177.186673][T10837] ? add_taint.cold+0x16/0x16 [ 177.218136][T10837] ? __kasan_check_write+0x14/0x20 [ 177.218164][T10837] ? __warn.cold+0x5/0x4c [ 177.227586][T10837] ? __warn+0xe7/0x1e0 [ 177.231664][T10837] ? debug_print_object+0x168/0x250 [ 177.236877][T10837] __warn.cold+0x20/0x4c [ 177.241133][T10837] ? debug_print_object+0x168/0x250 [ 177.246341][T10837] report_bug+0x263/0x2b0 [ 177.250717][T10837] do_error_trap+0x11b/0x200 [ 177.250734][T10837] do_invalid_op+0x37/0x50 [ 177.250751][T10837] ? debug_print_object+0x168/0x250 [ 177.250766][T10837] invalid_op+0x23/0x30 [ 177.250783][T10837] RIP: 0010:debug_print_object+0x168/0x250 [ 177.250798][T10837] Code: dd 60 31 c6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 31 c6 87 48 c7 c7 60 26 c6 87 e8 70 cd 05 fe <0f> 0b 83 05 a3 73 67 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 177.250805][T10837] RSP: 0018:ffff88806b39fbb8 EFLAGS: 00010082 [ 177.250815][T10837] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 177.250823][T10837] RDX: 0000000000000000 RSI: ffffffff815c3ba6 RDI: ffffed100d673f69 [ 177.250832][T10837] RBP: ffff88806b39fbf8 R08: ffff888069baa700 R09: ffffed1015d04101 [ 177.250840][T10837] R10: ffffed1015d04100 R11: ffff8880ae820807 R12: 0000000000000001 [ 177.250848][T10837] R13: ffffffff88d798c0 R14: ffffffff814aa120 R15: ffff8880a4c33968 [ 177.250864][T10837] ? __exit_umh+0x2e0/0x2e0 [ 177.250882][T10837] ? vprintk_func+0x86/0x189 [ 177.250898][T10837] ? debug_print_object+0x168/0x250 [ 177.250913][T10837] debug_check_no_obj_freed+0x2d4/0x43f [ 177.250933][T10837] kmem_cache_free+0x18f/0x320 [ 177.250949][T10837] __sk_destruct+0x4bc/0x6e0 [ 177.250963][T10837] sk_destruct+0x86/0xa0 [ 177.250976][T10837] __sk_free+0xfb/0x360 [ 177.250990][T10837] sk_free+0x42/0x50 [ 177.251007][T10837] smc_release+0x2f6/0x380 [ 177.251023][T10837] __sock_release+0xce/0x280 [ 177.251037][T10837] sock_close+0x1e/0x30 [ 177.251052][T10837] __fput+0x2ff/0x890 [ 177.251067][T10837] ? __sock_release+0x280/0x280 [ 177.251081][T10837] ____fput+0x16/0x20 [ 177.251094][T10837] task_work_run+0x145/0x1c0 [ 177.251115][T10837] exit_to_usermode_loop+0x316/0x380 [ 177.251132][T10837] do_syscall_64+0x5a9/0x6a0 [ 177.251147][T10837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.251157][T10837] RIP: 0033:0x413511 [ 177.251168][T10837] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 177.251175][T10837] RSP: 002b:00007fffb488d440 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 177.251186][T10837] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 177.251193][T10837] RDX: 0000001b2e920000 RSI: 0000000000000000 RDI: 0000000000000003 [ 177.251200][T10837] RBP: 0000000000000001 R08: ffffffff8100a3f8 R09: 00000000f8103863 [ 177.251207][T10837] R10: 00007fffb488d520 R11: 0000000000000293 R12: 000000000075bf20 [ 177.251214][T10837] R13: 000000000002b3d4 R14: 0000000000760370 R15: ffffffffffffffff [ 177.251230][T10837] ? do_syscall_64+0x1f8/0x6a0 [ 177.251894][T10837] Kernel Offset: disabled [ 177.510186][T10837] Rebooting in 86400 seconds..