[ 39.645014][ T26] audit: type=1800 audit(1553115310.491:26): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 39.681625][ T26] audit: type=1800 audit(1553115310.501:27): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 39.704322][ T26] audit: type=1800 audit(1553115310.501:28): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.568150][ T26] audit: type=1800 audit(1553115311.431:29): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.121' (ECDSA) to the list of known hosts. 2019/03/20 20:55:20 fuzzer started 2019/03/20 20:55:23 dialing manager at 10.128.0.26:37497 2019/03/20 20:55:24 syscalls: 1 2019/03/20 20:55:24 code coverage: enabled 2019/03/20 20:55:24 comparison tracing: enabled 2019/03/20 20:55:24 extra coverage: extra coverage is not supported by the kernel 2019/03/20 20:55:24 setuid sandbox: enabled 2019/03/20 20:55:24 namespace sandbox: enabled 2019/03/20 20:55:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/20 20:55:24 fault injection: enabled 2019/03/20 20:55:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/20 20:55:24 net packet injection: enabled 2019/03/20 20:55:24 net device setup: enabled 20:58:40 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) close(r0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) syzkaller login: [ 250.175172][ T7894] IPVS: ftp: loaded support on port[0] = 21 20:58:41 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)) [ 250.295950][ T7894] chnl_net:caif_netlink_parms(): no params data found [ 250.399195][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.430685][ T7894] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.438806][ T7894] device bridge_slave_0 entered promiscuous mode [ 250.447762][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.455297][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.463486][ T7894] device bridge_slave_1 entered promiscuous mode [ 250.488691][ T7894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.499337][ T7894] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.513927][ T7897] IPVS: ftp: loaded support on port[0] = 21 [ 250.530338][ T7894] team0: Port device team_slave_0 added [ 250.539466][ T7894] team0: Port device team_slave_1 added 20:58:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x1000002ac) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 250.623754][ T7894] device hsr_slave_0 entered promiscuous mode [ 250.660969][ T7894] device hsr_slave_1 entered promiscuous mode [ 250.719898][ T7899] IPVS: ftp: loaded support on port[0] = 21 [ 250.743246][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.750617][ T7894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.758514][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state 20:58:41 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) [ 250.765650][ T7894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.932597][ T7897] chnl_net:caif_netlink_parms(): no params data found [ 251.011687][ T7894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.050099][ T7902] IPVS: ftp: loaded support on port[0] = 21 [ 251.052707][ T7894] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.077517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.088920][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.108482][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.118353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:58:42 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="240000001a0007041dfffd946f610500020000001f00000000000800080004000400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000000c0)={@loopback}, &(0x7f0000000100)=0x14) socket$inet6(0xa, 0x1, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x9) getgid() openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x80080, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) fcntl$dupfd(r0, 0x406, r0) [ 251.157069][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.166357][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.173487][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.186256][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.213192][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.220287][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.257982][ T7899] chnl_net:caif_netlink_parms(): no params data found [ 251.293662][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.301467][ T7897] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.320754][ T7897] device bridge_slave_0 entered promiscuous mode [ 251.343428][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.352761][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.386128][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.395829][ T7897] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.404075][ T7897] device bridge_slave_1 entered promiscuous mode 20:58:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) [ 251.426450][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.435818][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.447913][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.458657][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.479396][ T7894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 251.487978][ T7909] IPVS: ftp: loaded support on port[0] = 21 [ 251.496114][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.513342][ T7897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.533146][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.541893][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.576311][ T7897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.636896][ T7894] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.662555][ T7899] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.669711][ T7899] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.678349][ T7899] device bridge_slave_0 entered promiscuous mode [ 251.687714][ T7899] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.694945][ T7899] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.703007][ T7899] device bridge_slave_1 entered promiscuous mode [ 251.721617][ T7897] team0: Port device team_slave_0 added [ 251.735710][ T7899] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.736718][ T7911] IPVS: ftp: loaded support on port[0] = 21 [ 251.764239][ T7899] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.784350][ T7897] team0: Port device team_slave_1 added 20:58:42 executing program 0: 20:58:42 executing program 0: [ 251.873380][ T7897] device hsr_slave_0 entered promiscuous mode 20:58:42 executing program 0: 20:58:42 executing program 0: [ 251.921193][ T7897] device hsr_slave_1 entered promiscuous mode 20:58:42 executing program 0: [ 251.977559][ T7899] team0: Port device team_slave_0 added 20:58:42 executing program 0: 20:58:42 executing program 0: [ 252.049375][ T7899] team0: Port device team_slave_1 added [ 252.182417][ T7899] device hsr_slave_0 entered promiscuous mode [ 252.200980][ T7899] device hsr_slave_1 entered promiscuous mode [ 252.301218][ T7909] chnl_net:caif_netlink_parms(): no params data found [ 252.321133][ T7902] chnl_net:caif_netlink_parms(): no params data found [ 252.336157][ T7899] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.343304][ T7899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.350698][ T7899] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.357922][ T7899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.390359][ T7906] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.398570][ T7906] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.449851][ T7909] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.457731][ T7909] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.465716][ T7909] device bridge_slave_0 entered promiscuous mode [ 252.490443][ T7902] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.497787][ T7902] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.505944][ T7902] device bridge_slave_0 entered promiscuous mode [ 252.514116][ T7909] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.521609][ T7909] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.529508][ T7909] device bridge_slave_1 entered promiscuous mode [ 252.540915][ T7902] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.547993][ T7902] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.558154][ T7902] device bridge_slave_1 entered promiscuous mode [ 252.578152][ T7902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.588077][ T7902] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.615155][ T7897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.645733][ T7909] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.662351][ T7909] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.682691][ T7902] team0: Port device team_slave_0 added [ 252.706153][ T7899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.733871][ T7902] team0: Port device team_slave_1 added [ 252.749811][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.758112][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.769974][ T7897] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.797948][ T7909] team0: Port device team_slave_0 added [ 252.808575][ T7909] team0: Port device team_slave_1 added [ 252.872438][ T7902] device hsr_slave_0 entered promiscuous mode [ 252.921212][ T7902] device hsr_slave_1 entered promiscuous mode [ 252.992445][ T7899] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.004921][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.012628][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.020308][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.030203][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.038775][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.045862][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.055427][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.075386][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.084627][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.093497][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.100683][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.163546][ T7909] device hsr_slave_0 entered promiscuous mode [ 253.200971][ T7909] device hsr_slave_1 entered promiscuous mode [ 253.253428][ T7911] chnl_net:caif_netlink_parms(): no params data found [ 253.281249][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.289990][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.299891][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.307013][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.316703][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.325483][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.334039][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.342769][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.351566][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.360413][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.368844][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.375929][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.409022][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.417068][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.428398][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.437250][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.485973][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.494782][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.504993][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.513680][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.522755][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.531225][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.539669][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.548511][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.579440][ T7899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 253.591482][ T7899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 253.603269][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.612250][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.620791][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.629043][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.637499][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.646071][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.654718][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.667996][ T7911] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.676181][ T7911] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.684232][ T7911] device bridge_slave_0 entered promiscuous mode [ 253.698149][ T7911] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.705739][ T7911] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.714158][ T7911] device bridge_slave_1 entered promiscuous mode [ 253.723943][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.765519][ T7911] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.784763][ T7909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.794469][ T7911] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.821969][ T7902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.842713][ T7899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.865728][ T7911] team0: Port device team_slave_0 added [ 253.877014][ T7897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.898471][ T7902] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.918655][ T7911] team0: Port device team_slave_1 added [ 253.929757][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.939587][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.948011][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.962880][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.995157][ T7909] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.025703][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 20:58:44 executing program 1: [ 254.041354][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.059320][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.066495][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.081975][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.108948][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.123606][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.130783][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.190014][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.201456][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.210048][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.219230][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.228076][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.235185][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.243625][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.252334][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.260917][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.268020][ T7904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.275970][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 20:58:45 executing program 2: [ 254.284861][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.293721][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.303881][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.312935][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.374178][ T7911] device hsr_slave_0 entered promiscuous mode [ 254.401165][ T7911] device hsr_slave_1 entered promiscuous mode [ 254.450046][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.458293][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.466790][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.475753][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.485583][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.494441][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.503367][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.512575][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.520997][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.529256][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.537758][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.552496][ T7909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.565768][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.574649][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.595093][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.603688][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.615668][ T7902] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 254.627319][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.637471][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.646629][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.660154][ T7909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.689511][ T7902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.785695][ T7948] [ 254.788299][ T7948] ============================= [ 254.793684][ T7948] WARNING: suspicious RCU usage [ 254.798649][ T7948] 5.1.0-rc1-next-20190320 #7 Not tainted [ 254.805057][ T7948] ----------------------------- [ 254.807685][ T7911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.810022][ T7948] net/xfrm/xfrm_user.c:1080 suspicious rcu_dereference_check() usage! [ 254.828290][ T7948] [ 254.828290][ T7948] other info that might help us debug this: [ 254.828290][ T7948] [ 254.840876][ T7948] [ 254.840876][ T7948] rcu_scheduler_active = 2, debug_locks = 1 [ 254.856411][ T7948] 1 lock held by syz-executor.4/7948: [ 254.869604][ T7911] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.875407][ T7948] #0: 0000000003359d37 (&net->xfrm.xfrm_cfg_mutex){+.+.}, at: xfrm_netlink_rcv+0x61/0x90 [ 254.885729][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.896298][ C0] hrtimer: interrupt took 37961 ns [ 254.900001][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.931658][ T7948] [ 254.931658][ T7948] stack backtrace: [ 254.938514][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.948880][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.958184][ T7948] CPU: 0 PID: 7948 Comm: syz-executor.4 Not tainted 5.1.0-rc1-next-20190320 #7 [ 254.964397][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.969618][ T7948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.969692][ T7948] Call Trace: [ 254.969772][ T7948] dump_stack+0x172/0x1f0 [ 254.976870][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.986908][ T7948] lockdep_rcu_suspicious+0x153/0x15d [ 254.986935][ T7948] xfrm_alloc_userspi+0x7d5/0xa80 [ 254.996548][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.001815][ T7948] ? xfrm_state_netlink+0x140/0x140 [ 255.001921][ T7948] ? nla_parse+0x45/0x60 [ 255.001948][ T7948] ? xfrm_state_netlink+0x140/0x140 [ 255.008120][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.012376][ T7948] xfrm_user_rcv_msg+0x458/0x770 [ 255.012397][ T7948] ? xfrm_dump_sa_done+0xf0/0xf0 [ 255.012418][ T7948] ? mark_held_locks+0xf0/0xf0 [ 255.012430][ T7948] ? lockdep_hardirqs_on+0x418/0x5d0 [ 255.012543][ T7948] ? __mutex_lock+0x3cd/0x1310 [ 255.012560][ T7948] ? xfrm_netlink_rcv+0x61/0x90 [ 255.012618][ T7948] netlink_rcv_skb+0x17a/0x460 [ 255.012634][ T7948] ? xfrm_dump_sa_done+0xf0/0xf0 [ 255.012650][ T7948] ? netlink_ack+0xb50/0xb50 [ 255.012676][ T7948] xfrm_netlink_rcv+0x70/0x90 [ 255.012691][ T7948] netlink_unicast+0x536/0x720 [ 255.012712][ T7948] ? netlink_attachskb+0x770/0x770 [ 255.012759][ T7948] ? _copy_from_iter_full+0x259/0x8f0 [ 255.012812][ T7948] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 255.027350][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.030368][ T7948] ? __check_object_size+0x3d/0x42f [ 255.030393][ T7948] netlink_sendmsg+0x8ae/0xd70 [ 255.035674][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.043581][ T7948] ? netlink_unicast+0x720/0x720 [ 255.043662][ T7948] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 255.043686][ T7948] ? apparmor_socket_sendmsg+0x2a/0x30 [ 255.054983][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.058338][ T7948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.058428][ T7948] ? security_socket_sendmsg+0x93/0xc0 [ 255.058453][ T7948] ? netlink_unicast+0x720/0x720 [ 255.065925][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.068607][ T7948] sock_sendmsg+0xdd/0x130 [ 255.068628][ T7948] ___sys_sendmsg+0x806/0x930 [ 255.098361][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.102881][ T7948] ? copy_msghdr_from_user+0x430/0x430 [ 255.102998][ T7948] ? kasan_check_read+0x11/0x20 [ 255.103027][ T7948] ? __fget+0x381/0x550 [ 255.103047][ T7948] ? ksys_dup3+0x3e0/0x3e0 [ 255.103065][ T7948] ? lock_downgrade+0x880/0x880 [ 255.103083][ T7948] ? __fget_light+0x1a9/0x230 [ 255.103099][ T7948] ? __fdget+0x1b/0x20 [ 255.103113][ T7948] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 255.103129][ T7948] __sys_sendmsg+0x105/0x1d0 [ 255.103143][ T7948] ? __ia32_sys_shutdown+0x80/0x80 [ 255.103197][ T7948] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.103213][ T7948] ? do_syscall_64+0x26/0x610 [ 255.103230][ T7948] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.103253][ T7948] ? do_syscall_64+0x26/0x610 [ 255.115475][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.121580][ T7948] __x64_sys_sendmsg+0x78/0xb0 [ 255.121599][ T7948] do_syscall_64+0x103/0x610 [ 255.121622][ T7948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.121633][ T7948] RIP: 0033:0x458079 [ 255.121648][ T7948] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.121725][ T7948] RSP: 002b:00007fd024f33c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 255.121739][ T7948] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 255.121746][ T7948] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000007 [ 255.121754][ T7948] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 255.121762][ T7948] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd024f346d4 [ 255.121771][ T7948] R13: 00000000004c56c3 R14: 00000000004d95f0 R15: 00000000ffffffff [ 255.384121][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.395400][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.404299][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.413726][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.423139][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.431927][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.447415][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.480070][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 255.538458][ T7911] 8021q: adding VLAN 0 to HW filter on device batadv0 20:58:46 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 20:58:46 executing program 0: 20:58:46 executing program 5: r0 = msgget(0x3, 0x386) msgctl$IPC_RMID(r0, 0x0) 20:58:46 executing program 1: 20:58:46 executing program 2: 20:58:46 executing program 4: 20:58:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x06\x00\x00\x00^\x00\xac\xd8\xfd\xcc\xeeq\xe5\xf5\xcb\x801`\xe48\x85\xa4\xf5\xd0\x1b\\\x04\f\xf8F\\\xb4\xba\x8d\xef\x12d\xee\xa5?\x00kZ\x8b\x19h\xd7|\x14i\r\x18U9\xc1\xd7\x10\xf0G\x12\xa8\xbaa\xb2\x94|%n\x1e+\x9f\xbb\xb8\xac\x81\x8d\x93q\xd4\xd4z\xaaZ\x0f\xaa\xc7\x97#\xe5g l\xd55\x15\xbf\xfc\xf5\x83\xb72\x00Y\x15\x92\xb1\xb6a\xf4\xe9u\xb2\xe7\xeciy\b\xdb\xc7\xf1\x87\xc9\a\x91\x04J\xc8\x0e\xff|J\'Nxr\x00\xbc\xab5\x9b\x85>\x99\xcaz2\xabKI\xdc\xe4\x9f\xa5\xd0\x0ewm\xe7\xccK\xc9\x8b\x8bE\x89\x03\x00\x00\x00}@Ry\xa69^\xdc\x9d\xa0\x04\xdf \aelO7\xf1\xda\xcc\xa2x\xc2\x9a\xf5\x18F\xa0\x80M\xf9,+\xc9\xf7/nt\x9ba\x14\x1b\x18\xdd\x18X\xd2o\x15\x97L\xe6\xb5\xba\xc7\xf2W\n\x7f\x14ZIL:T\x1bd\x19\x8dE\x9c\xb1\xb9JK\x1do\x85\xe9\xa2\xca\x9cd\b\xc8\xbdiQ_L\xb0\xb9 \xf7/F\xfc\'M#,\x84M\xba\xa9\xa2yr\'?f\tb\xdai\xfd\x8c\x9aoj\x84\x03i\x8a|\xf7T;=p\xa2\x98f\xc7\xefu=\x96\xcb\x11\x91\xce\xce\xbev\xaa\xbb\xca\xfa\xa3\xde\xd5\x1f\xd7\x03:12\xf2\xfd\rN\x84=A\xae\x9b3\x81\xa9~\xb7\x80\xd1\xe2\xf6\xf2\xb8\xc9\x8a\xabC\xe2\xec\xb8,j\xe1\xbb\x1b\x1f@', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000380), 0xfffb) fcntl$addseals(r1, 0x409, 0x8) fchown(r1, 0x0, 0x0) 20:58:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:46 executing program 0: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000080)='./file0\x00', 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000082000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pkey_free(0xffffffffffffffff) 20:58:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgrp(0xffffffffffffffff) 20:58:46 executing program 5: r0 = socket$inet6(0xa, 0x200000000000001, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @multicast1}}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000180)=0x40) setsockopt$inet_buf(r0, 0x0, 0x100000040, &(0x7f0000000040), 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 256.057608][ T7986] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:58:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x8, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x18}, 0x18) io_submit(0x0, 0x0, 0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x7}]) 20:58:47 executing program 3: close(0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66b8ea000f00d8eadd5484f88a00f0833600660f71d50066ba4100edb8010000000f01d90f0866b8bd008ee0b94d0200000f32360f07", 0x36}], 0xaaaaaaaaaaaabce, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:58:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) open$dir(&(0x7f0000000080)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) 20:58:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$P9_RCLUNK(r0, &(0x7f0000000000)={0x7}, 0x7) [ 256.646102][ T8022] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 20:58:47 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:58:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:48 executing program 0: clock_nanosleep(0x800000002, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000000)) 20:58:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x200) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 20:58:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) 20:58:51 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 20:58:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x200) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 20:58:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) 20:58:51 executing program 0: r0 = socket$inet6(0xa, 0x200000003, 0x8000000003c) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'security\x00'}, 0x0) 20:58:51 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:58:51 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x0) lstat(&(0x7f0000000240)='./control\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) capset(&(0x7f0000000580)={0x19980330}, 0x0) chown(&(0x7f0000000440)='./control\x00', 0x0, r0) open(0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 20:58:51 executing program 2: syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) 20:58:51 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f00000003c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@euid_gt={'euid>'}}, {@dont_appraise='dont_appraise'}]}) 20:58:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) [ 260.627118][ T8097] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 20:58:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0185647, &(0x7f00000000c0)={0x0, 0x200000001, 0x0, [], &(0x7f0000000040)={0x98f905, 0x0, [], @p_u16=0x0}}) 20:58:51 executing program 2: syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) 20:58:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='%roc\x00', 0x0, 0x0) 20:58:51 executing program 3: ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:58:51 executing program 5: socket$unix(0x1, 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 20:58:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:52 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:58:52 executing program 2: syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) 20:58:52 executing program 0: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) ptrace(0x4218, r0) r1 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x1ff, 0x20000) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000040)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d909abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef3a19cd9833cbc7153961c01455c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f21524eb2"]) r2 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000300)={0xe4, 0x4, 0x8, 0x10000, 0x80000001, 0xffffffffffffff00, 0x11aa8cb60000, 0xffffffffffff689f}, &(0x7f0000000340)=0x20) stat(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000400)='./file1\x00', 0x6, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="8df2a16bfb17c867a86d2dffcb45893802d5f66425716a34608da6eb256e3d9c9bacfafadfdd2e284f0d65bd3e6b2f582020f17394523fd8c71636c7dfd617c08ef67639499fd3a592f8e9507e355b8e320e7491c5bcfebbd7078f65ff34a37523693d631321db92a11591bdd79de90832463e6cf1eccb4985a25fe3e11f2852fd4eb15b1b867fd679f58d8645aad3db55d1e8f7f50038e041210389373d3b53e5baeaf8897d8c7c557309abf26bf075d9a18efa5a71fcad2b44dce19688a5d84bd230d747d4b49a471e73f9765caacbdae760dc5da82509a11c24009322618caf19e8be7ac4d2bea2d92a5c4b", 0xed, 0x2}], 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000380), 0x4) 20:58:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:52 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) [ 261.704195][ T8156] overlayfs: failed to resolve './file1': -2 20:58:52 executing program 3: ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:58:52 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) 20:58:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) [ 261.972898][ T8156] overlayfs: failed to resolve './file1': -2 20:58:52 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) 20:58:53 executing program 5: socket$unix(0x1, 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 20:58:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:53 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:58:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]}) 20:58:53 executing program 2: r0 = syz_open_dev$dri(0x0, 0x4000007, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:53 executing program 2: r0 = syz_open_dev$dri(0x0, 0x4000007, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:53 executing program 3: ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:58:53 executing program 2: r0 = syz_open_dev$dri(0x0, 0x4000007, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]}) 20:58:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:54 executing program 5: socket$unix(0x1, 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 20:58:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:54 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 20:58:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]}) 20:58:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 20:58:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:55 executing program 3: ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:58:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]}) 20:58:55 executing program 2: syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7) 20:58:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c) close(r0) 20:58:55 executing program 5: 20:58:55 executing program 2: syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_SMI(r0, 0xaeb7)