[ 40.750447][ T27] audit: type=1800 audit(1554336755.144:27): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 40.780326][ T27] audit: type=1800 audit(1554336755.144:28): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.369633][ T27] audit: type=1800 audit(1554336755.814:29): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 41.392538][ T27] audit: type=1800 audit(1554336755.814:30): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. 2019/04/04 00:12:57 fuzzer started 2019/04/04 00:13:00 dialing manager at 10.128.0.26:37451 2019/04/04 00:13:02 syscalls: 2408 2019/04/04 00:13:02 code coverage: enabled 2019/04/04 00:13:02 comparison tracing: enabled 2019/04/04 00:13:02 extra coverage: extra coverage is not supported by the kernel 2019/04/04 00:13:02 setuid sandbox: enabled 2019/04/04 00:13:02 namespace sandbox: enabled 2019/04/04 00:13:02 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/04 00:13:02 fault injection: enabled 2019/04/04 00:13:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/04 00:13:02 net packet injection: enabled 2019/04/04 00:13:02 net device setup: enabled 00:13:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2002001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) syzkaller login: [ 102.464323][ T7709] IPVS: ftp: loaded support on port[0] = 21 00:13:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000100)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000180), 0x4) [ 102.567523][ T7709] chnl_net:caif_netlink_parms(): no params data found [ 102.615709][ T7709] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.644303][ T7709] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.652701][ T7709] device bridge_slave_0 entered promiscuous mode [ 102.684302][ T7709] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.691475][ T7709] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.713450][ T7709] device bridge_slave_1 entered promiscuous mode [ 102.738136][ T7709] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.749569][ T7709] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.752386][ T7712] IPVS: ftp: loaded support on port[0] = 21 [ 102.785875][ T7709] team0: Port device team_slave_0 added [ 102.794606][ T7709] team0: Port device team_slave_1 added 00:13:37 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000000)="0adc1f123c40a41d88b070") close(r0) [ 102.907330][ T7709] device hsr_slave_0 entered promiscuous mode [ 102.964710][ T7709] device hsr_slave_1 entered promiscuous mode [ 103.030137][ T7714] IPVS: ftp: loaded support on port[0] = 21 [ 103.037322][ T7709] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.044634][ T7709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.052544][ T7709] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.059730][ T7709] bridge0: port 1(bridge_slave_0) entered forwarding state 00:13:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0}}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) [ 103.244010][ T7709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.276634][ T7712] chnl_net:caif_netlink_parms(): no params data found [ 103.299176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.324351][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.354849][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.364970][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 103.382524][ T7709] 8021q: adding VLAN 0 to HW filter on device team0 00:13:37 executing program 4: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mount$9p_virtio(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x10020, 0x0) [ 103.406959][ T7719] IPVS: ftp: loaded support on port[0] = 21 [ 103.462350][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.472717][ T7717] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.479886][ T7717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.489784][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.498719][ T7717] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.505868][ T7717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.556961][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.566575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.577608][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.609783][ T7709] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 103.637226][ T7709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.648302][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 103.659161][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.668096][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.693765][ T7714] chnl_net:caif_netlink_parms(): no params data found 00:13:38 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) [ 103.719888][ T7712] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.728218][ T7712] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.736335][ T7712] device bridge_slave_0 entered promiscuous mode [ 103.759534][ T7722] IPVS: ftp: loaded support on port[0] = 21 [ 103.790294][ T7712] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.797567][ T7712] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.805768][ T7712] device bridge_slave_1 entered promiscuous mode [ 103.817309][ T7709] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.920191][ T7712] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.942987][ T7714] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.950922][ T7714] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.959176][ T7714] device bridge_slave_0 entered promiscuous mode [ 103.986155][ T7712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.009552][ T7714] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.021255][ T7714] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.031761][ T7714] device bridge_slave_1 entered promiscuous mode [ 104.059024][ T7714] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 104.071315][ T7728] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 104.109914][ T7714] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.134473][ T7724] IPVS: ftp: loaded support on port[0] = 21 00:13:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2002001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 104.188776][ T7712] team0: Port device team_slave_0 added [ 104.196652][ T7712] team0: Port device team_slave_1 added [ 104.212330][ T7714] team0: Port device team_slave_0 added [ 104.266028][ T7714] team0: Port device team_slave_1 added [ 104.319063][ T7719] chnl_net:caif_netlink_parms(): no params data found 00:13:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2002001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 104.379583][ T7712] device hsr_slave_0 entered promiscuous mode [ 104.423806][ T7712] device hsr_slave_1 entered promiscuous mode 00:13:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2002001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 104.540094][ T7714] device hsr_slave_0 entered promiscuous mode [ 104.594059][ T7714] device hsr_slave_1 entered promiscuous mode 00:13:39 executing program 0: clone(0x210007f6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) [ 104.718197][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.727913][ T7719] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.743049][ T7719] device bridge_slave_0 entered promiscuous mode [ 104.756087][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.763248][ T7719] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.771175][ T7719] device bridge_slave_1 entered promiscuous mode [ 104.790675][ T7719] bond0: Enslaving bond_slave_0 as an active interface with an up link 00:13:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000140)=0x81, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000100)) [ 104.834387][ T7747] 8021q: VLANs not supported on lo [ 104.841743][ T7719] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.854654][ T7722] chnl_net:caif_netlink_parms(): no params data found 00:13:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000140)=0x81, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000100)) 00:13:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000140)=0x81, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000100)) [ 104.941465][ T7724] chnl_net:caif_netlink_parms(): no params data found [ 104.956972][ T7719] team0: Port device team_slave_0 added [ 104.972724][ T7719] team0: Port device team_slave_1 added [ 105.057649][ T7722] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.065608][ T7722] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.074870][ T7722] device bridge_slave_0 entered promiscuous mode [ 105.108810][ T7722] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.124933][ T7722] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.132623][ T7722] device bridge_slave_1 entered promiscuous mode [ 105.217065][ T7719] device hsr_slave_0 entered promiscuous mode [ 105.273804][ T7719] device hsr_slave_1 entered promiscuous mode [ 105.327258][ T7722] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 105.340318][ T7722] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 105.364227][ T7724] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.371361][ T7724] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.379984][ T7724] device bridge_slave_0 entered promiscuous mode [ 105.391137][ T7712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.406964][ T7724] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.415261][ T7724] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.422913][ T7724] device bridge_slave_1 entered promiscuous mode [ 105.450094][ T7724] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 105.461103][ T7722] team0: Port device team_slave_0 added [ 105.470369][ T7722] team0: Port device team_slave_1 added [ 105.492933][ T7724] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 105.512785][ T7712] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.576423][ T7722] device hsr_slave_0 entered promiscuous mode [ 105.633824][ T7722] device hsr_slave_1 entered promiscuous mode [ 105.715259][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.723182][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.750979][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.760389][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.769287][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.776414][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.784831][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.793461][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.801740][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.808836][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.818013][ T7724] team0: Port device team_slave_0 added [ 105.827955][ T7714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.843007][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.851235][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.861432][ T7724] team0: Port device team_slave_1 added [ 105.885348][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.901938][ T7714] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.946330][ T7724] device hsr_slave_0 entered promiscuous mode [ 106.003716][ T7724] device hsr_slave_1 entered promiscuous mode [ 106.047217][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.055253][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.062936][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.071881][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.080823][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.118113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.129900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.138644][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.145756][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.154008][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.162631][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.171801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.193251][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.201806][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.212008][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.220684][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.229403][ T7717] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.236498][ T7717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.246558][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.260930][ T7712] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 106.272961][ T7712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.295019][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.305345][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.313898][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.321979][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.331278][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.340483][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.368459][ T7724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.387920][ T7712] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.398076][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.407391][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.416533][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.424920][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.442191][ T7724] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.464733][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.472391][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.483926][ T7714] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 106.496668][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.519025][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.535196][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.553797][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.562443][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.571768][ T7717] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.578875][ T7717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.590210][ T7722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.610929][ T7719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.618703][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.627179][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.636252][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.644777][ T7717] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.651869][ T7717] bridge0: port 2(bridge_slave_1) entered forwarding state 00:13:41 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x3, 0x4}) [ 106.681817][ T7719] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.693249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.704229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.714384][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.725526][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.744330][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.752845][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.763993][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.774449][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.782851][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.790042][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.807053][ T7722] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.824156][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.832060][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.840791][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.850731][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.858996][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.867203][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.876054][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.884661][ T7745] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.891708][ T7745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.900337][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.909357][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.917900][ T7745] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.925084][ T7745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.933252][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.944828][ T7714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.976736][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.985147][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.994328][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.002822][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.011261][ T7745] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.018330][ T7745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.026288][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.034597][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.042736][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.051360][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.060140][ T7745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.071019][ T7724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.105596][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.127015][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.136344][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.145365][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.153961][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.164090][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.172356][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.181001][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.189773][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.198523][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.207258][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.216622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.225482][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.236645][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:13:41 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000000)="0adc1f123c40a41d88b070") close(r0) [ 107.252851][ T7722] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 107.264535][ T7722] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.276637][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.285145][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.295746][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.304203][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.312813][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.326740][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.353848][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.378530][ T7719] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.388581][ T7724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.430331][ T7722] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.513332][ C0] hrtimer: interrupt took 64418 ns 00:13:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0}}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 00:13:42 executing program 4: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mount$9p_virtio(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x10020, 0x0) 00:13:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000140)=0x81, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000100)) 00:13:42 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x3, 0x4}) 00:13:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000000)="0adc1f123c40a41d88b070") close(r0) 00:13:42 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) 00:13:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0}}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) [ 107.612753][ T7791] overlayfs: filesystem on './file0' not supported as upperdir 00:13:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000000)="0adc1f123c40a41d88b070") close(r0) 00:13:42 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) 00:13:42 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x3, 0x4}) 00:13:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, 0x0) 00:13:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0}}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x80000000000) 00:13:42 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, 0x0) 00:13:42 executing program 4: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mount$9p_virtio(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x10020, 0x0) 00:13:42 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x3, 0x4}) 00:13:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1, {[@timestamp={0x44, 0x8, 0x8, 0x0, 0x0, [{}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 00:13:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, 0x0) 00:13:42 executing program 3: io_setup(0x3, &(0x7f0000000240)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) io_submit(r0, 0x2, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 00:13:42 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="0205010007000000000000000000000002000100000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000017, 0x0) 00:13:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, 0x0) 00:13:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1, {[@timestamp={0x44, 0x8, 0x8, 0x0, 0x0, [{}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 00:13:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x100000001}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x3ff, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x100000001}, 0x1c) 00:13:42 executing program 3: io_setup(0x3, &(0x7f0000000240)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) io_submit(r0, 0x2, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 00:13:42 executing program 4: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mount$9p_virtio(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x10020, 0x0) 00:13:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1, {[@timestamp={0x44, 0x8, 0x8, 0x0, 0x0, [{}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 00:13:42 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="0205010007000000000000000000000002000100000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000017, 0x0) 00:13:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x100000001}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x3ff, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x100000001}, 0x1c) 00:13:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, 0x0) 00:13:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1, {[@timestamp={0x44, 0x8, 0x8, 0x0, 0x0, [{}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 00:13:43 executing program 3: io_setup(0x3, &(0x7f0000000240)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) io_submit(r0, 0x2, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 00:13:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x100000001}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x3ff, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x100000001}, 0x1c) 00:13:43 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="0205010007000000000000000000000002000100000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000017, 0x0) 00:13:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080), 0x0}, 0x18) 00:13:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x0) 00:13:43 executing program 3: io_setup(0x3, &(0x7f0000000240)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) io_submit(r0, 0x2, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 00:13:43 executing program 4: r0 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000140)) 00:13:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x100000001}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x3ff, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x100000001}, 0x1c) 00:13:43 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="0205010007000000000000000000000002000100000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000017, 0x0) [ 108.912445][ T7900] serio: Serial port pts0 00:13:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080), 0x0}, 0x18) 00:13:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080), 0x0}, 0x18) 00:13:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mknod(&(0x7f0000000040)='./bus\x00', 0x1010, 0x0) 00:13:43 executing program 4: r0 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000140)) 00:13:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') pread64(r0, 0x0, 0x0, 0x0) 00:13:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mknod(&(0x7f0000000040)='./bus\x00', 0x1010, 0x0) 00:13:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080), 0x0}, 0x18) [ 109.630237][ T7940] serio: Serial port pts1 00:13:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x0) 00:13:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080), 0x0}, 0x18) 00:13:44 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') pread64(r0, 0x0, 0x0, 0x0) 00:13:44 executing program 4: r0 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000140)) 00:13:44 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mknod(&(0x7f0000000040)='./bus\x00', 0x1010, 0x0) 00:13:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080), 0x0}, 0x18) 00:13:44 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') pread64(r0, 0x0, 0x0, 0x0) [ 109.782105][ T7954] serio: Serial port pts0 00:13:44 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mknod(&(0x7f0000000040)='./bus\x00', 0x1010, 0x0) 00:13:44 executing program 4: r0 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$packet_int(r0, 0x107, 0x15, 0x0, &(0x7f0000000140)) 00:13:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x0) 00:13:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080), 0x0}, 0x18) [ 109.950624][ T7967] serio: Serial port pts1 00:13:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:13:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x0) 00:13:45 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') pread64(r0, 0x0, 0x0, 0x0) 00:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x411}, 0x1c}}, 0x0) 00:13:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:13:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adcb67d3c123f3188b070") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, 'noextend'}}]}}) 00:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x411}, 0x1c}}, 0x0) 00:13:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) [ 110.685337][ T7993] serio: Serial port pts0 00:13:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x0) 00:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x411}, 0x1c}}, 0x0) 00:13:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) [ 110.890801][ T8012] serio: Serial port pts1 00:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x411}, 0x1c}}, 0x0) 00:13:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x0) 00:13:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adcb67d3c123f3188b070") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, 'noextend'}}]}}) [ 111.701276][ T8034] serio: Serial port pts0 00:13:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:13:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x0) 00:13:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) [ 111.915494][ T8047] serio: Serial port pts1 00:13:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adcb67d3c123f3188b070") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, 'noextend'}}]}}) 00:13:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="a3375f83dd2586651779c2b1dc11", 0x0}, 0x28) 00:13:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:13:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) [ 112.530351][ T8081] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. [ 112.553591][ T8081] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:13:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:13:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adcb67d3c123f3188b070") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, 'noextend'}}]}}) 00:13:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="a3375f83dd2586651779c2b1dc11", 0x0}, 0x28) 00:13:47 executing program 5: socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x2b, 0x0, 0xfd01}}, &(0x7f0000000080)='GPL\x00', 0x401, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 112.741945][ T8091] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:47 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r3}, &(0x7f0000000280)={0x3, 0x6, 0x3f, 0x100000001, 0x9, 0xfffffffffffffffb}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x4000) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x800}, 0x8) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) 00:13:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="a3375f83dd2586651779c2b1dc11", 0x0}, 0x28) [ 112.833858][ T8091] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:47 executing program 5: socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x2b, 0x0, 0xfd01}}, &(0x7f0000000080)='GPL\x00', 0x401, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:13:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:13:47 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000015e15)={@broadcast, @local={[], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3]}, @mcast2}}}}}}}, 0x0) [ 113.075285][ T8117] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:47 executing program 5: socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x2b, 0x0, 0xfd01}}, &(0x7f0000000080)='GPL\x00', 0x401, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:13:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="a3375f83dd2586651779c2b1dc11", 0x0}, 0x28) [ 113.126839][ T8117] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:47 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000015e15)={@broadcast, @local={[], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3]}, @mcast2}}}}}}}, 0x0) 00:13:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000100)=0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x2, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 00:13:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}], @gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}]]}}}]}, 0x44}}, 0x0) 00:13:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:13:47 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000015e15)={@broadcast, @local={[], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3]}, @mcast2}}}}}}}, 0x0) 00:13:47 executing program 5: socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x2b, 0x0, 0xfd01}}, &(0x7f0000000080)='GPL\x00', 0x401, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:13:47 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x100000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 113.413896][ T8140] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. [ 113.438987][ T8141] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 113.468606][ T8140] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:48 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000015e15)={@broadcast, @local={[], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3]}, @mcast2}}}}}}}, 0x0) 00:13:48 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000001340), &(0x7f0000000140)=0x4) [ 113.527028][ T8141] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 00:13:48 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3403, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0, 0x0) 00:13:48 executing program 5: r0 = memfd_create(&(0x7f0000000000)='lan1nodev\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03D\x82K\x10\x89\x8eV\xc5\xa9\xf2\x8f\x8b\x80\xb7s\x8bA\x1a\x9e\x96g\x8e\xc8\xfe\xf8\xde\x9e:P\x92C\x90K K\xcd\xdf\xdc{\xb2wR\xefSVZ%\x16\x8a\xd6\xc1\x93\x01C\x11\x9c\xfa\x9e\xd7tY\xab\xc7,Gw\x87HjB$\xf7\xd9H>\xdf4\xc6\x15S\xa9\xba\xa6\xb0U\a\x91\xab\xf8\xdd\x92|:\xb9\xa6\x06\xce\x19\xc2{Hh\x8e\xc2\v\xfbq\x111h \xe1\xea\x98VAZ\xc8(n9z3\xc9\xfc\x91\xa7\xe8\xdf\xd0J\xde\x95>\x06', 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) fcntl$addseals(r0, 0x409, 0x8) 00:13:48 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000001340), &(0x7f0000000140)=0x4) 00:13:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}], @gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}]]}}}]}, 0x44}}, 0x0) 00:13:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x401c5820, 0x0) 00:13:48 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3403, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0, 0x0) 00:13:48 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000001340), &(0x7f0000000140)=0x4) 00:13:48 executing program 5: r0 = memfd_create(&(0x7f0000000000)='lan1nodev\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03D\x82K\x10\x89\x8eV\xc5\xa9\xf2\x8f\x8b\x80\xb7s\x8bA\x1a\x9e\x96g\x8e\xc8\xfe\xf8\xde\x9e:P\x92C\x90K K\xcd\xdf\xdc{\xb2wR\xefSVZ%\x16\x8a\xd6\xc1\x93\x01C\x11\x9c\xfa\x9e\xd7tY\xab\xc7,Gw\x87HjB$\xf7\xd9H>\xdf4\xc6\x15S\xa9\xba\xa6\xb0U\a\x91\xab\xf8\xdd\x92|:\xb9\xa6\x06\xce\x19\xc2{Hh\x8e\xc2\v\xfbq\x111h \xe1\xea\x98VAZ\xc8(n9z3\xc9\xfc\x91\xa7\xe8\xdf\xd0J\xde\x95>\x06', 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) fcntl$addseals(r0, 0x409, 0x8) 00:13:48 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000001340), &(0x7f0000000140)=0x4) [ 114.098016][ T8147] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 114.124729][ T8147] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 114.283755][ T8147] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 114.299570][ T8167] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 114.308375][ T8167] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 114.321387][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:13:48 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x100000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:13:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x401c5820, 0x0) 00:13:48 executing program 5: r0 = memfd_create(&(0x7f0000000000)='lan1nodev\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03D\x82K\x10\x89\x8eV\xc5\xa9\xf2\x8f\x8b\x80\xb7s\x8bA\x1a\x9e\x96g\x8e\xc8\xfe\xf8\xde\x9e:P\x92C\x90K K\xcd\xdf\xdc{\xb2wR\xefSVZ%\x16\x8a\xd6\xc1\x93\x01C\x11\x9c\xfa\x9e\xd7tY\xab\xc7,Gw\x87HjB$\xf7\xd9H>\xdf4\xc6\x15S\xa9\xba\xa6\xb0U\a\x91\xab\xf8\xdd\x92|:\xb9\xa6\x06\xce\x19\xc2{Hh\x8e\xc2\v\xfbq\x111h \xe1\xea\x98VAZ\xc8(n9z3\xc9\xfc\x91\xa7\xe8\xdf\xd0J\xde\x95>\x06', 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) fcntl$addseals(r0, 0x409, 0x8) 00:13:48 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3403, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0, 0x0) 00:13:48 executing program 3: r0 = memfd_create(&(0x7f0000000000)='lan1nodev\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03D\x82K\x10\x89\x8eV\xc5\xa9\xf2\x8f\x8b\x80\xb7s\x8bA\x1a\x9e\x96g\x8e\xc8\xfe\xf8\xde\x9e:P\x92C\x90K K\xcd\xdf\xdc{\xb2wR\xefSVZ%\x16\x8a\xd6\xc1\x93\x01C\x11\x9c\xfa\x9e\xd7tY\xab\xc7,Gw\x87HjB$\xf7\xd9H>\xdf4\xc6\x15S\xa9\xba\xa6\xb0U\a\x91\xab\xf8\xdd\x92|:\xb9\xa6\x06\xce\x19\xc2{Hh\x8e\xc2\v\xfbq\x111h \xe1\xea\x98VAZ\xc8(n9z3\xc9\xfc\x91\xa7\xe8\xdf\xd0J\xde\x95>\x06', 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) fcntl$addseals(r0, 0x409, 0x8) 00:13:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}], @gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}]]}}}]}, 0x44}}, 0x0) [ 114.383731][ T8189] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 00:13:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x401c5820, 0x0) 00:13:48 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3403, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0, 0x0) [ 114.458296][ T8200] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 114.497181][ T8200] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 00:13:48 executing program 5: r0 = memfd_create(&(0x7f0000000000)='lan1nodev\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03D\x82K\x10\x89\x8eV\xc5\xa9\xf2\x8f\x8b\x80\xb7s\x8bA\x1a\x9e\x96g\x8e\xc8\xfe\xf8\xde\x9e:P\x92C\x90K K\xcd\xdf\xdc{\xb2wR\xefSVZ%\x16\x8a\xd6\xc1\x93\x01C\x11\x9c\xfa\x9e\xd7tY\xab\xc7,Gw\x87HjB$\xf7\xd9H>\xdf4\xc6\x15S\xa9\xba\xa6\xb0U\a\x91\xab\xf8\xdd\x92|:\xb9\xa6\x06\xce\x19\xc2{Hh\x8e\xc2\v\xfbq\x111h \xe1\xea\x98VAZ\xc8(n9z3\xc9\xfc\x91\xa7\xe8\xdf\xd0J\xde\x95>\x06', 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) fcntl$addseals(r0, 0x409, 0x8) 00:13:49 executing program 3: r0 = memfd_create(&(0x7f0000000000)='lan1nodev\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03D\x82K\x10\x89\x8eV\xc5\xa9\xf2\x8f\x8b\x80\xb7s\x8bA\x1a\x9e\x96g\x8e\xc8\xfe\xf8\xde\x9e:P\x92C\x90K K\xcd\xdf\xdc{\xb2wR\xefSVZ%\x16\x8a\xd6\xc1\x93\x01C\x11\x9c\xfa\x9e\xd7tY\xab\xc7,Gw\x87HjB$\xf7\xd9H>\xdf4\xc6\x15S\xa9\xba\xa6\xb0U\a\x91\xab\xf8\xdd\x92|:\xb9\xa6\x06\xce\x19\xc2{Hh\x8e\xc2\v\xfbq\x111h \xe1\xea\x98VAZ\xc8(n9z3\xc9\xfc\x91\xa7\xe8\xdf\xd0J\xde\x95>\x06', 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) fcntl$addseals(r0, 0x409, 0x8) 00:13:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x401c5820, 0x0) 00:13:49 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x1}) [ 114.786160][ T8204] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:13:49 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x100000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:13:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7e, 0x3, 0x3}, 0x2c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x5, r0, 0x0, [0x305f, 0xa]}, 0x2c) 00:13:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}], @gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}]]}}}]}, 0x44}}, 0x0) 00:13:49 executing program 3: r0 = memfd_create(&(0x7f0000000000)='lan1nodev\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03D\x82K\x10\x89\x8eV\xc5\xa9\xf2\x8f\x8b\x80\xb7s\x8bA\x1a\x9e\x96g\x8e\xc8\xfe\xf8\xde\x9e:P\x92C\x90K K\xcd\xdf\xdc{\xb2wR\xefSVZ%\x16\x8a\xd6\xc1\x93\x01C\x11\x9c\xfa\x9e\xd7tY\xab\xc7,Gw\x87HjB$\xf7\xd9H>\xdf4\xc6\x15S\xa9\xba\xa6\xb0U\a\x91\xab\xf8\xdd\x92|:\xb9\xa6\x06\xce\x19\xc2{Hh\x8e\xc2\v\xfbq\x111h \xe1\xea\x98VAZ\xc8(n9z3\xc9\xfc\x91\xa7\xe8\xdf\xd0J\xde\x95>\x06', 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) fcntl$addseals(r0, 0x409, 0x8) 00:13:49 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x1}) 00:13:49 executing program 4: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 114.924550][ T8204] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 00:13:49 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x1}) 00:13:49 executing program 3: keyctl$setperm(0x9, 0x0, 0xffffffff) [ 114.998396][ T8231] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 115.024296][ T8231] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 00:13:49 executing program 3: keyctl$setperm(0x9, 0x0, 0xffffffff) 00:13:49 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x1}) 00:13:49 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:13:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7e, 0x3, 0x3}, 0x2c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x5, r0, 0x0, [0x305f, 0xa]}, 0x2c) [ 115.235082][ T8241] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 115.377279][ T8241] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 00:13:49 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x100000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:13:49 executing program 3: keyctl$setperm(0x9, 0x0, 0xffffffff) 00:13:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7e, 0x3, 0x3}, 0x2c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x5, r0, 0x0, [0x305f, 0xa]}, 0x2c) 00:13:49 executing program 4: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:49 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:13:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7e, 0x3, 0x3}, 0x2c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x5, r0, 0x0, [0x305f, 0xa]}, 0x2c) 00:13:50 executing program 3: keyctl$setperm(0x9, 0x0, 0xffffffff) 00:13:50 executing program 4: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:50 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:13:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7e, 0x3, 0x3}, 0x2c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x5, r0, 0x0, [0x305f, 0xa]}, 0x2c) 00:13:50 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:13:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7e, 0x3, 0x3}, 0x2c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x5, r0, 0x0, [0x305f, 0xa]}, 0x2c) [ 115.851221][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 116.026608][ T8281] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 00:13:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7e, 0x3, 0x3}, 0x2c) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x5, r0, 0x0, [0x305f, 0xa]}, 0x2c) 00:13:50 executing program 4: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:50 executing program 5: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:50 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:13:50 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:13:50 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x11e], [0xc1]}) 00:13:50 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:13:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000140)={{0x3, @remote, 0x48}, [@bcast, @netrom, @remote, @remote, @default, @bcast, @null, @bcast]}, 0x48) 00:13:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000240)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{}]}) ioctl$EVIOCGREP(r1, 0x40107446, &(0x7f0000000000)=""/174) 00:13:50 executing program 5: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:50 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000140)={{0x3, @remote, 0x48}, [@bcast, @netrom, @remote, @remote, @default, @bcast, @null, @bcast]}, 0x48) 00:13:51 executing program 5: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x11e], [0xc1]}) 00:13:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000140)={{0x3, @remote, 0x48}, [@bcast, @netrom, @remote, @remote, @default, @bcast, @null, @bcast]}, 0x48) 00:13:51 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x20) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x7a00, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 00:13:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000140)={{0x3, @remote, 0x48}, [@bcast, @netrom, @remote, @remote, @default, @bcast, @null, @bcast]}, 0x48) 00:13:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000240)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{}]}) ioctl$EVIOCGREP(r1, 0x40107446, &(0x7f0000000000)=""/174) 00:13:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x11e], [0xc1]}) 00:13:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045520, &(0x7f0000000040)={0x3}) 00:13:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000240)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{}]}) ioctl$EVIOCGREP(r1, 0x40107446, &(0x7f0000000000)=""/174) 00:13:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x11e], [0xc1]}) 00:13:51 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045520, &(0x7f0000000040)={0x3}) 00:13:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:51 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045520, &(0x7f0000000040)={0x3}) 00:13:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000240)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{}]}) ioctl$EVIOCGREP(r1, 0x40107446, &(0x7f0000000000)=""/174) 00:13:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:52 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x2) 00:13:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x8, 0x209e20, 0x2, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffd, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:13:52 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045520, &(0x7f0000000040)={0x3}) 00:13:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00006ed000), &(0x7f0000000000)=0x4) 00:13:52 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x2) 00:13:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00006ed000), &(0x7f0000000000)=0x4) 00:13:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f0000000640)=@xdp, &(0x7f0000000100)=0x80, 0x800) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x8000000000000000, @dev}, r3}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) capset(&(0x7f0000000240), &(0x7f0000001fe8)={0x7f, 0x0, 0x0, 0x0, 0x5}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140)='hash\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x8000000000000000, @dev}, r3}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) capset(&(0x7f0000000240), &(0x7f0000001fe8)={0x7f, 0x0, 0x0, 0x0, 0x5}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140)='hash\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x8000000000000000, @dev}, r3}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) capset(&(0x7f0000000240), &(0x7f0000001fe8)={0x7f, 0x0, 0x0, 0x0, 0x5}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140)='hash\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x8000000000000000, @dev}, r3}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) capset(&(0x7f0000000240), &(0x7f0000001fe8)={0x7f, 0x0, 0x0, 0x0, 0x5}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140)='hash\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.757703][ T8482] RSP: 002b:00007f68cccefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 118.766110][ T8482] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 118.774137][ T8482] RDX: 0000000000000048 RSI: 00000000200001c0 RDI: 0000000000000006 [ 118.782098][ T8482] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 118.790146][ T8482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f68cccf06d4 [ 118.798105][ T8482] R13: 00000000004ce188 R14: 00000000004dd8c8 R15: 00000000ffffffff [ 118.806090][ T8482] [ 118.808529][ T8482] Allocated by task 8443: [ 118.812873][ T8482] save_stack+0x45/0xd0 [ 118.817012][ T8482] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 118.822651][ T8482] kasan_kmalloc+0x9/0x10 [ 118.826984][ T8482] kmem_cache_alloc_trace+0x151/0x760 [ 118.832345][ T8482] cma_alloc_port+0x4f/0x1a0 [ 118.836920][ T8482] rdma_bind_addr+0x1bc0/0x1f80 [ 118.841753][ T8482] rdma_resolve_addr+0x437/0x21f0 [ 118.846761][ T8482] ucma_resolve_ip+0x153/0x210 [ 118.851504][ T8482] ucma_write+0x2da/0x3c0 [ 118.855820][ T8482] __vfs_write+0x8d/0x110 [ 118.860130][ T8482] vfs_write+0x20c/0x580 [ 118.864416][ T8482] ksys_write+0xea/0x1f0 [ 118.868653][ T8482] __x64_sys_write+0x73/0xb0 [ 118.873229][ T8482] do_syscall_64+0x103/0x610 [ 118.877803][ T8482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.883679][ T8482] [ 118.886006][ T8482] Freed by task 8435: [ 118.890019][ T8482] save_stack+0x45/0xd0 [ 118.894175][ T8482] __kasan_slab_free+0x102/0x150 [ 118.899105][ T8482] kasan_slab_free+0xe/0x10 [ 118.903600][ T8482] kfree+0xcf/0x230 [ 118.907431][ T8482] rdma_destroy_id+0x7fc/0xaa0 [ 118.912187][ T8482] ucma_close+0x115/0x320 [ 118.916498][ T8482] __fput+0x2e5/0x8d0 [ 118.920463][ T8482] ____fput+0x16/0x20 [ 118.924443][ T8482] task_work_run+0x14a/0x1c0 [ 118.929029][ T8482] exit_to_usermode_loop+0x273/0x2c0 [ 118.934300][ T8482] do_syscall_64+0x52d/0x610 [ 118.938876][ T8482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.944753][ T8482] [ 118.947077][ T8482] The buggy address belongs to the object at ffff888098b1b340 [ 118.947077][ T8482] which belongs to the cache kmalloc-32 of size 32 [ 118.960946][ T8482] The buggy address is located 8 bytes inside of [ 118.960946][ T8482] 32-byte region [ffff888098b1b340, ffff888098b1b360) [ 118.974056][ T8482] The buggy address belongs to the page: [ 118.979707][ T8482] page:ffffea000262c6c0 count:1 mapcount:0 mapping:ffff88812c3f01c0 index:0xffff888098b1bfc1 [ 118.989862][ T8482] flags: 0x1fffc0000000200(slab) [ 118.994787][ T8482] raw: 01fffc0000000200 ffffea000291f988 ffffea0002928f48 ffff88812c3f01c0 [ 119.003375][ T8482] raw: ffff888098b1bfc1 ffff888098b1b000 000000010000003f 0000000000000000 [ 119.011966][ T8482] page dumped because: kasan: bad access detected [ 119.018364][ T8482] [ 119.020673][ T8482] Memory state around the buggy address: [ 119.026304][ T8482] ffff888098b1b200: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 119.034366][ T8482] ffff888098b1b280: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 119.042413][ T8482] >ffff888098b1b300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 119.050454][ T8482] ^ [ 119.056854][ T8482] ffff888098b1b380: fb fb fb fb fc fc fc fc 00 fc fc fc fc fc fc fc [ 119.064908][ T8482] ffff888098b1b400: 00 00 00 00 fc fc fc fc 00 fc fc fc fc fc fc fc 00:13:53 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 00:13:53 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5011, &(0x7f0000000580)) [ 119.072969][ T8482] ================================================================== [ 119.081045][ T8482] Disabling lock debugging due to kernel taint [ 119.105389][ T8482] Kernel panic - not syncing: panic_on_warn set ... [ 119.112090][ T8482] CPU: 0 PID: 8482 Comm: syz-executor.4 Tainted: G B 5.1.0-rc3-next-20190403 #17 [ 119.130751][ T8482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.140824][ T8482] Call Trace: [ 119.144135][ T8482] dump_stack+0x172/0x1f0 [ 119.148468][ T8482] panic+0x2cb/0x65c [ 119.152361][ T8482] ? __warn_printk+0xf3/0xf3 [ 119.156964][ T8482] ? cma_check_port+0x8ce/0x8f0 [ 119.163360][ T8482] ? preempt_schedule+0x4b/0x60 [ 119.168217][ T8482] ? ___preempt_schedule+0x16/0x18 [ 119.173336][ T8482] ? trace_hardirqs_on+0x5e/0x230 [ 119.178371][ T8482] ? cma_check_port+0x8ce/0x8f0 [ 119.183213][ T8482] end_report+0x47/0x4f [ 119.187369][ T8482] ? cma_check_port+0x8ce/0x8f0 [ 119.192215][ T8482] kasan_report.cold+0xe/0x40 [ 119.196894][ T8482] ? cma_check_port+0x8ce/0x8f0 [ 119.201747][ T8482] __asan_report_load8_noabort+0x14/0x20 [ 119.207373][ T8482] cma_check_port+0x8ce/0x8f0 [ 119.212049][ T8482] rdma_bind_addr+0x19c3/0x1f80 [ 119.216898][ T8482] ? lock_acquire+0x16f/0x3f0 [ 119.221571][ T8482] ? ucma_get_ctx+0x82/0x160 [ 119.226175][ T8482] ? find_held_lock+0x35/0x130 [ 119.230939][ T8482] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 119.236409][ T8482] ? lock_downgrade+0x880/0x880 [ 119.241261][ T8482] rdma_resolve_addr+0x437/0x21f0 [ 119.246287][ T8482] ? kasan_check_write+0x14/0x20 [ 119.251223][ T8482] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 119.256764][ T8482] ? lock_downgrade+0x880/0x880 [ 119.261613][ T8482] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 119.267869][ T8482] ? rdma_bind_addr+0x1f80/0x1f80 [ 119.272895][ T8482] ucma_resolve_ip+0x153/0x210 [ 119.277659][ T8482] ? ucma_resolve_ip+0x153/0x210 [ 119.282592][ T8482] ? ucma_query+0x820/0x820 [ 119.287100][ T8482] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 119.293361][ T8482] ? _copy_from_user+0xdd/0x150 [ 119.298216][ T8482] ucma_write+0x2da/0x3c0 [ 119.302542][ T8482] ? ucma_query+0x820/0x820 [ 119.307041][ T8482] ? ucma_open+0x290/0x290 [ 119.311451][ T8482] ? apparmor_file_permission+0x25/0x30 [ 119.317004][ T8482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 119.323252][ T8482] ? security_file_permission+0x94/0x380 [ 119.328903][ T8482] __vfs_write+0x8d/0x110 [ 119.333226][ T8482] ? ucma_open+0x290/0x290 [ 119.337644][ T8482] vfs_write+0x20c/0x580 [ 119.341885][ T8482] ksys_write+0xea/0x1f0 [ 119.346124][ T8482] ? __ia32_sys_read+0xb0/0xb0 [ 119.350883][ T8482] ? do_syscall_64+0x26/0x610 [ 119.355556][ T8482] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 119.361619][ T8482] ? do_syscall_64+0x26/0x610 [ 119.366298][ T8482] __x64_sys_write+0x73/0xb0 [ 119.370883][ T8482] do_syscall_64+0x103/0x610 [ 119.375475][ T8482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 119.381363][ T8482] RIP: 0033:0x4582b9 [ 119.385252][ T8482] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 119.404870][ T8482] RSP: 002b:00007f68cccefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 119.413284][ T8482] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 119.421269][ T8482] RDX: 0000000000000048 RSI: 00000000200001c0 RDI: 0000000000000006 [ 119.429240][ T8482] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 119.437237][ T8482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f68cccf06d4 [ 119.445202][ T8482] R13: 00000000004ce188 R14: 00000000004dd8c8 R15: 00000000ffffffff [ 119.454126][ T8482] Kernel Offset: disabled [ 119.458450][ T8482] Rebooting in 86400 seconds..