[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.225745] audit: type=1800 audit(1547348536.236:25): pid=7966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 40.253774] audit: type=1800 audit(1547348536.236:26): pid=7966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 40.274544] audit: type=1800 audit(1547348536.236:27): pid=7966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.236' (ECDSA) to the list of known hosts. 2019/01/13 03:02:26 fuzzer started 2019/01/13 03:02:28 dialing manager at 10.128.0.26:41687 2019/01/13 03:02:29 syscalls: 1 2019/01/13 03:02:29 code coverage: enabled 2019/01/13 03:02:29 comparison tracing: enabled 2019/01/13 03:02:29 setuid sandbox: enabled 2019/01/13 03:02:29 namespace sandbox: enabled 2019/01/13 03:02:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/13 03:02:29 fault injection: enabled 2019/01/13 03:02:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/13 03:02:29 net packet injection: enabled 2019/01/13 03:02:29 net device setup: enabled 03:05:19 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x163, @tick=0x648, 0x1000, {0x3, 0xd25}, 0x7fff, 0x2, 0x9}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) ioctl$RTC_VL_CLR(r0, 0x7014) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x200000, 0x0) r2 = getpgid(0x0) ptrace$setopts(0x4206, r2, 0x5, 0x2) write$eventfd(r0, &(0x7f0000000180)=0x2, 0x8) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000001c0)={0x3, 0x3e, "e32d532f6f4111118a958f79ddac4bbed43c72adadfdec944eae1ba3c5c326ed3aa4de636c29beec8644722440a9096610cd7d3a8fe23ec464be42ebff12"}) setpgid(r2, r2) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000340)={r3, 0x50, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e22, @rand_addr=0xfffffffffffffffd}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}]}, &(0x7f0000000380)=0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000400)={r4, @in={{0x2, 0x4e23, @broadcast}}, 0x7fff, 0xfffffffffffffff7, 0x1, 0x44187022}, &(0x7f00000004c0)=0x98) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000500)={{0x2, 0x4e24, @empty}, {0x306}, 0x10, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ip6gre0\x00'}) write$FUSE_IOCTL(r1, &(0x7f0000000580)={0x20, 0x0, 0x6, {0x2, 0x0, 0x80000000, 0xd2}}, 0x20) pkey_alloc(0x0, 0x2) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000005c0)={0x3, 0x16, "6b427404d48c990120a962d9b8a83fc13dbef4bde499"}) fsetxattr$security_capability(r0, &(0x7f0000000600)='security.capability\x00', &(0x7f0000000640)=@v1={0x1000000, [{0x1, 0x5}]}, 0xc, 0x1) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000680)={0x6, r0, 0x1}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000006c0), 0x4) write$P9_RAUTH(r1, &(0x7f0000000700)={0x14, 0x67, 0x1, {0x6, 0x0, 0x8}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000ac0)=0xe8) getgroups(0x1, &(0x7f0000000b00)=[0xee00]) sendmmsg$unix(r0, &(0x7f0000000c00)=[{&(0x7f0000000740)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000007c0)="6bd265c8835bb3758395aa201da993936945872f3588095381d248301496fbef65caa716124e8bc2800a4c2719b92bdbb7c00f3751d00a6a67ced580ee3173c3deda919fc6be543c28a043a59d2704f4cb2f62749b471277873caa94ae8ff5778a80ee4b89c4f23505ee8e8680ecf2c6276805c07166b86ebba39f10a051baa5df52fbc4cca2f38282a2a8ef0b9b64489363b718e845060cd7af024fd07e5274136e008b830b25b8b97a6eba6e0b65720bc5e52a88ab57", 0xb7}, {&(0x7f0000000880)="662b69fa8a07e6bcef5980679ed61a4148ca2e48ef523b790d2bf1c5ceab1635a0191b48c7aa14b3d831d84cfe8527ac4da6184b45a7242b415630e072c863162f2bade411304474b4e7517b3c399dd9b0d816425c6cd3f4ed1f056b484de748179e6bb98404ace84d2ecf6257f19640c05ac5d1500f29fb807563ffa97b1c22", 0x80}, {&(0x7f0000000900)="7e61183b3c9eba0c1f86e803a49c1dc09582ee105468268370b9110318987436902f7f61842b767ff98941a0e2448da4a39ed942dc919beb03", 0x39}, {&(0x7f0000000940)="14ce101ac1cf1622406fc8acb0e16dcd0320d86ac9859e932513d7d8e34420565c3afcf1", 0x24}], 0x4, &(0x7f0000000b40)=[@cred={0x20, 0x1, 0x2, r2, r6, r7}, @rights={0x20, 0x1, 0x1, [r1, r0, r0, r5]}, @rights={0x20, 0x1, 0x1, [r5, r1, r5]}, @rights={0x30, 0x1, 0x1, [r5, r1, r1, r0, r0, r1, r0]}, @rights={0x18, 0x1, 0x1, [r5, r0]}], 0xa8, 0x8891}], 0x1, 0x45) socket(0x8, 0xf, 0x8) inotify_init() ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000c40)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000c80)={r8, 0x80000, r0}) syzkaller login: [ 223.172175] IPVS: ftp: loaded support on port[0] = 21 03:05:19 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x1ff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0xfffffffffffffffa}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r1, 0x8}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0xfff, @rand_addr="77609f81699ee01b931f2892cabc1140", 0x9}}, 0x2, 0x7}, 0x90) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000200)=[@in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e22, @rand_addr=0xffffffff}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @broadcast}], 0x40) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000240)=0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0xfffffffffffffff8, 0x123001) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000002c0)=0x9) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000300), 0x4) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, r3, 0x800, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$FIGETBSZ(r2, 0x2, &(0x7f00000004c0)) getrusage(0xffffffffffffffff, &(0x7f0000000500)) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm-control\x00', 0x400200, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000600)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000006c0)={{0x4, 0x3, 0x8, 0xfffffffffffffff8, '\x00', 0x2}, 0x1, 0x10, 0x2, r5, 0x7, 0x7, 'syz0\x00', &(0x7f0000000640)=['/dev/dlm-control\x00', '\x00', '/dev/autofs\x00', '(-}\x00', '&wlan0$\'/bdev\x00', 'user(nodevproc\\\x00', '\x00'], 0x41, [], [0x8, 0xf97a, 0x9, 0x800]}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000800)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000840)=0x10) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000880)={0x6f0, 0x6, 0x101, @random="500700e2e8f8", 'lapb0\x00'}) membarrier(0x8, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000008c0)) sysinfo(&(0x7f0000000900)=""/4096) r6 = accept4$tipc(r0, 0x0, &(0x7f0000001900), 0x800) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r4) setsockopt$sock_void(r4, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000fed000/0x11000)=nil, 0x11000, 0x1000008, 0x4110, r6, 0x0) ioctl$void(r6, 0x5450) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000001940)=0x1) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f0000001980)=0x3) [ 223.337224] chnl_net:caif_netlink_parms(): no params data found [ 223.437205] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.445997] IPVS: ftp: loaded support on port[0] = 21 [ 223.458748] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.468253] device bridge_slave_0 entered promiscuous mode [ 223.478190] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.485458] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.494734] device bridge_slave_1 entered promiscuous mode 03:05:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000080)='\x00', 0x1, 0x3) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000140)='team_slave_1\x00'}) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f00000001c0)={0x1, 0x7, [{0xfff, 0x0, 0x3}]}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000200)={{0x3bb, 0x0, 0x81, 0x0, 0xfffffffffffff770, 0xffffffffffffff15}, 0xfa5, 0x7, 0xfffffffffffffff8, 0x1, 0x200, "7ceeb8365861ae66f6125b5bb7dcabaf01695c36df6c02d717807dcd168b46a37e27ca0c7e01754c5e9f7a4a5d1f3c9d99d33e85f3aa8817bd7112261ed78420dfc822306627bb737b58e43ea565ae4fbb8c0a87cd39975e5d1ee8caef1e786b92fb6a587d861f86e8ae471645886eed085dd2600cc55d1bb799153fec5e0c34"}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1, 0x4, [@remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x23}, @loopback]}, 0x20) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() ptrace$setregs(0xffffffffffffffff, r1, 0x3, &(0x7f0000000300)="d500fe678ddf1ae91c9d4d6a319edcdd0fedd194bc38a755b8d153a1d781de63e187b3f828fb5b2a48fe5c55a392882add843ed54da6721873458058e0d842e3018dcb34b5e5566c818fcf8735df554bd7f1fc417ce89fc5f468e304c274148cf7bc3bf5ce66153b5918d734c1d0ae8fcbebb563808aabab2428d9abd341b90a8ef065cdf33b19e290626118d177a6749e11a0d6c54b37317165f1e8ed8fa780698367571b69d5312508a8b3a26fa291e7c0800bf139f26a40f61d81d9910ee52a2957baae58fecac3f6e45be53340ff6e88e4fe9ebd7d") ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000440)={0x9f0000, 0x7fffffff, 0x5, [], &(0x7f0000000400)={0x980910, 0x1, [], @ptr=0x4ebe}}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x34a729107b5968fc}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x84, r2, 0x5, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x1d}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x2a}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}]}, 0x84}, 0x1, 0x0, 0x0, 0x804}, 0x4) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000680)=0x8) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000006c0)={0x3, 0x2}) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000700), &(0x7f0000000740)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000780)={0xffffffffffffffff}, 0x106, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000800)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) openat$cgroup_procs(r0, &(0x7f0000000840)='tasks\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000018c0)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000001880)="b2a75691b7adea673a812bda890283718d7f7b0cfc9e0c270e74", 0x1a}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000001900), &(0x7f0000001940)=0x4) read(r0, &(0x7f0000001980)=""/179, 0xb3) ptrace$peek(0x2, r1, &(0x7f0000001a40)) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001a80)=0x8) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000001ac0)=0x2) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000001b00)=0x101, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000001b40)={0x51, 0xe0e6, 0x8, {0x57d, 0x9}, {0x4, 0xcb}, @ramp={0x6, 0x3, {0x6, 0x5184, 0x66538252, 0x8}}}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000001b80)={0x5, 0xf000}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000001bc0)={[], 0x7fff, 0x2, 0x0, 0xd4, 0x62f, r1}) [ 223.551618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.595647] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.648319] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.675134] team0: Port device team_slave_0 added [ 223.680878] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.695224] team0: Port device team_slave_1 added [ 223.723517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.727517] IPVS: ftp: loaded support on port[0] = 21 [ 223.750498] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 03:05:19 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x10000, 0x0, 0x80000001, 0x7f, 0xc, 0x6, 0x7fff, 0x3, 0x3, 0x7}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3c3db9f85a9a9381}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x94, r1, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10000}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}]}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4008000}, 0x40081) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000002c0)={0x3, {{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fffffff}}, {{0xa, 0x4e21, 0x100000001, @rand_addr="4f0cd671ef7b8cefe3c07c0c1aff0447", 0xd3d3}}}, 0x108) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000400)=""/123) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000480)={0x1f, 0x8, 0x9, 0x9, 0xf328, 0xcab0, 0xfffffffffffffff9, 0x3ff, 0x4, 0xfbbb, 0x5}, 0xb) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000500)={0x5, &(0x7f00000004c0)=[{0x8, 0x1e88, 0x2, 0x6}, {0x401, 0x8000, 0x3ff, 0xeede}, {0x7, 0x5, 0x1c3, 0x3ff}, {0xaa72, 0x4582, 0x9, 0x7911}, {0x100000000, 0x5, 0x3f, 0x7}]}, 0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000540)={0x0, 0x1, 0x27, 0x81}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000580)=0x7, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000005c0), &(0x7f0000000600)=0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000640)={0x0, 0x7, 0x5}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000006c0)={r2, 0x54b}, &(0x7f0000000700)=0x8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000740)={0x7, 0x4000}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000780)=0x9, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000007c0)=[@in6={0xa, 0x4e21, 0x9326, @remote}], 0x1c) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x14, r1, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000001) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000900)) r3 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000940), 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000980)) getresuid(&(0x7f00000009c0), &(0x7f0000000a00)=0x0, &(0x7f0000000a40)) getgroups(0x6, &(0x7f0000000a80)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xee00, 0xee01]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0}, &(0x7f0000000b00)=0xc) r7 = getegid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000b40)=0x0) r9 = getpid() shmctl$IPC_SET(r3, 0x1, &(0x7f0000000b80)={{0x5, r4, r5, r6, r7, 0x1a4, 0x7}, 0x65, 0xc7f6, 0x9, 0x8, r8, r9, 0x8}) sendmsg(r0, &(0x7f0000002ec0)={&(0x7f0000000c00)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e23, 0x1}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000c80)="32bba33dd028c033856d2cb1ccda413cbfa6933ccdb4f6b883088a6fd14e15a09947b7c702bf77335eef33ca6148ed825e61429146c100a45de1131d53294afb318f6084c29595d31b5f3094052886df769583abba5d49244d6457e5fe110133fe4c4b249524b74d0fddedea5dee820b40d32ed0a594fb1135c4db4cf3376e7199da73f2aaf7bd8cdb7983630ec83998bd2c4b3d4810b16ff017bf64880324ed", 0xa0}, {&(0x7f0000000d40)="9e6a9bbb188d54e9380493c65e36489b402b9e53c38ea9e475392cdccd599555e20b4ec3801942dd91c8f015ddffa8e7cb0805a1ea50bed7b3f98c78e920a471f04f29662b210be042deb063c32fb0d007ffe0beae6662773bedc92aece81e5ff9246e776c001ebf37f570186ae3543213181b06840dad952059e841efdd1e23580dc28cbb528abfd7252e90ca77f3a1c2cb15c0a316cb6de0d7658307d981d33cfa4223351a926ef6b2ab952fb968ae68dba86a335e821a0157c6a28a64020d", 0xc0}], 0x2, &(0x7f0000000e40)=[{0x1010, 0x10c, 0x3, "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"}, {0x1010, 0x102, 0x6, "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"}, {0x60, 0x0, 0x7ff, "42aa85336e0066232c30e6ee47b051c63b3dc34c629f0d706927c28c8264dd45a164e39c78cbab6aac227f1123e1a0d6206908850e1367c848bfa98ef12c54015ff71065353a273af8955be74e"}], 0x2080}, 0x4000000) [ 223.856531] device hsr_slave_0 entered promiscuous mode [ 223.903420] device hsr_slave_1 entered promiscuous mode [ 223.947837] IPVS: ftp: loaded support on port[0] = 21 [ 223.979332] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.986812] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 224.056465] chnl_net:caif_netlink_parms(): no params data found 03:05:20 executing program 4: r0 = accept(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @initdev}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@broadcast, @in6=@rand_addr="1385d00d63457c04d4cc7e3533771347", 0x4e21, 0x0, 0x4e20, 0xa49, 0xa, 0xa0, 0xa0, 0xdf, 0x0, r2}, {0x8, 0xfffffffffffffbff, 0xfffffffffffffffa, 0x87, 0x4, 0x4, 0x8, 0xfffffffffffffff8}, {0x1, 0x3, 0x5, 0x7}, 0x800000000000000, 0x6e6bb1, 0x2, 0x1, 0x2, 0x2}, {{@in=@rand_addr=0x5, 0x4d6, 0x3c}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x28}, 0x3502, 0x7, 0x2, 0x951, 0xf54397f, 0x8d, 0x9}}, 0xe8) getpeername(r0, &(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000380)=0x80) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000003c0)={0x40, 0x4, 0x3}, 0x10) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000400)={{0x2, 0x4e24, @multicast2}, {0x6, @random="91958a879d20"}, 0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 'bpq0\x00'}) r3 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x2, 0x840) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f00000004c0)={0x0, 0x1, @start={0xfffffffffffffe00, 0x1}}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in=@local, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e24, 0x7f, 0x4e24, 0x81, 0x2, 0x20, 0x20, 0x88, r1, r2}, {0x3f, 0x5, 0x1c0000000000, 0xfffffffffffff635, 0x8, 0x8, 0x2, 0x9}, {0xe3, 0x6, 0x101, 0xffffffffffff0001}, 0x13, 0x6e6bb1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d6, 0xff}, 0x2, @in=@remote, 0x3503, 0x4, 0x1, 0x7, 0x8001, 0x1, 0x8}}, 0xe8) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000640)) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000680)={0x100000000, 0x32314752, 0x1, @discrete={0x8, 0x40d6}}) r4 = syz_open_dev$radio(&(0x7f00000006c0)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000700)=0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) r7 = perf_event_open(&(0x7f0000000740)={0x6bcd08172d843155, 0x70, 0x5, 0x8, 0xfffffffffffffffd, 0x3, 0x0, 0x8, 0x5301, 0x1, 0x8000, 0x8, 0x3, 0x0, 0x400, 0x1800000000000, 0x1, 0x3, 0xe5c1, 0xffffffff, 0xffffffffffffffc1, 0x4, 0x1, 0x10000, 0x4, 0x9, 0x3, 0x2, 0x65, 0xcb, 0xfff, 0x8, 0x1fe0000, 0x7, 0x76, 0xfff, 0x6, 0x0, 0x0, 0x29b, 0x4, @perf_config_ext={0xb863, 0x9}, 0x10000, 0x6e, 0x5, 0x0, 0x3, 0x7, 0x5}, r5, 0x9, r3, 0x1) recvmsg(r0, &(0x7f0000001fc0)={&(0x7f0000000840)=@alg, 0x80, &(0x7f0000001e00)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/3, 0x3}, {&(0x7f0000001900)=""/231, 0xe7}, {&(0x7f0000001a00)=""/216, 0xd8}, {&(0x7f0000001b00)=""/94, 0x5e}, {&(0x7f0000001b80)=""/74, 0x4a}, {&(0x7f0000001c00)=""/69, 0x45}, {&(0x7f0000001c80)=""/14, 0xe}, {&(0x7f0000001cc0)=""/22, 0x16}, {&(0x7f0000001d00)=""/207, 0xcf}], 0xa, &(0x7f0000001ec0)=""/217, 0xd9}, 0x40000000) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000)='/dev/autofs\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000002040)=@assoc_id=0x0, &(0x7f0000002080)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r8, 0x84, 0x6d, &(0x7f00000020c0)={r9, 0x96, "3b20454a4fbd148b208328f54b3e437c8b51097a42e9c973c8b88061692c21c451d6ebc04ef705fb9d94632a4a5ff44db30205f9c4cb3e0c62ae8666ee29d8337a112ad03861572591001b0fc5b1bcc488823ad4ac76fbef1c414c366abe25eabacc8023c688437e003e0808e3b8528e277696173a17f30d8ce3c5437360f050bf7845901f17c37726d9a76500bb5a221b6fe4ea507f"}, &(0x7f0000002180)=0x9e) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f00000021c0)={0xfffffffffffffff8, {{0xa, 0x4e23, 0xd7, @local, 0xffffffffbd8ead0c}}}, 0x88) sendmsg$unix(r4, &(0x7f0000004500)={&(0x7f0000002280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004440)=[{&(0x7f0000002300)="0f868691fdaa88ca75024daa2840aa0d11c7754a18f9f6f27e18e99ce59d1a290fc9d643a590589a389aa3a630e7b50aced050534cb82e81be907bf1a136384a118a209245179e7bcb8a8198d3d149b96f2a4f91c1b6f2f28aba9acdb16fc11012dba716c975f1b18b427ba0a2241984d131a3258b76695da618c607a572ced3f488492ce5c497cb7d6e9ac40e7489e2cec476457e4572b859a15239a073c8c919975bd392838075ba80ae68ad83297afc30e34dea8cb5d134549d4153361e7d6625108f2833101ae523b5ef4213e1b5b4b73186f886c08c2fab32c1b17584978c289fca195dc5d7a77450857ba7493fe0b078c67f60d8b04b6152e92bdea4ea6c099ef9c8a7efa7a3f6b80a93806d4325bc710e818bdc668bd3ac7b21b0ba9bf7fda219400370ad6580feac211607bd4b1ef6d9e7d0ccbd5ff385a61fffce2c44a7b911b292a979b0a4d6ef3cb0b94d600b77efb06c3c78b1c4c58cbfd54e65b8b7d9debe0d5ac4c8aa88f5d2ea8b3ee522ae1a72625301736d1e9c43f5049b746401004a0e2d0098c65d1056638759f377b13e7824071456cf781506f83efcaa8745d7aeaa66360a308c12879879c467aefa861df278cd29bd85a72c79c135ddaab7493c1365e84c457e6d7ab48d440e66411f54d9efd5a2685e899cb90fd1d2f60367f0b6acab47fb2c558839b90297cb31a7add1af53fe1d0b67bf939b57cbc475bc39e0512870c3a6e20843a21b1145b104fa830111c313daa25b1319cc1f581a60fc2d56f41d1c4f5c906b37be76c4177a6861a36a64ef2abf091cbd8cf5e59fc0bdb6207fcf533b3e7a402e256c6dcc59e5b02936618698ee9ac07bc9d3e79d759a3936b27aff6eedcd6ae25f2c2d02f2d8b4ffd9ddb2466d92ed139b08bb6654aacbfd8c9c17134e84f800d26cc5b84eb8798fec9013b7ff468fae98e41309f65617a0d39ed8674be650b1ad27fa19068da09cf0f0a4fd3e8249a98ba00ec4c4fb0ea30310a45e27cb46fd926680cf42bfa5700b01124c24e0498881cd589326e3eca46d443d2d6cfe259bde96483b81ac626f054c9a34cdc95002d399f29ec42b2e476ad4ad86b9eae80d9788ae115f48efb2857d0d05f91927c1084121d4d9380b9ee73579021db53cc8ce8350de12e6bdb9859f4fde00d21402c3e7158e31d72e394bdfb474a567535b9e3d6eab1f2195666be0213d661d1e2a9a2e0b679401d557cc2c19912c6e0804a18645f61f00769fc285267b909e8705d95ccf4742f64861655adb5f688499aa5ebafe944e2577885c7f21be334e5225457a26d76ae162f240906602f4b000dc0ea45b03ba62928f51976365272034b5696500d8d713e865659a7899d0280d888eae4e2937274f0f17712f41a21dd0e172f768801a50eda509d25f22a38768a27bf97e960b4aeb00fb3cbc5234643c224665db1fe92b13997935d8adbc65421569819378bcb6a3fc71275a54b233ac1eea423ff74e73aed7fecbfb7b80aea66bcf6e824029b228e0405093039ed7c50e9bc487b7cfc992680181cba466398c17998f19bd3c0387823769ea1c343803aa2662b22ae5ff72bed72e860445aabf3a3be0e00f621803e71bdf07bcec3f88d423f9a0a5f24c566bbcdfd4830cfbd6467b9e744aafa49ab2c554849b68844126a04459bf520445f657afba6038737c7891b3467fbd1a0a9954c628559db52ccab0f542d09df399450951065132910393e29767f3b18b13c24317e1e62cbe3ba9904914a3d30224dbab2f847dc59b1ea24e38afb63893e0d9361d895f69323501878f0375ed22ebbf9fd3a308388515ea49407ee1ad8ac804891d33172f060eceb578465874ca5aa70c16868220f8313f856a1282b7f4e4bad910181f5bc93628382701a924165795247d7eff01c372a3a4e3ff0964323898b49bb6986eb63c5fb08c2edde86a4af156e5efa4071d469a32d4741273d4b1f73be434801d6d6bc87c5db5b9486db6ea1c95e225722908565873d7b28cb006dc0a0bbdd55521fe9a2d912ca522dedde5917ac92a03bcdfe0630eef78e0e86bb1d778ed217e579e17a79d1ada809272d6c66d5854c4a5b9cd50f6eb61d014935bca2fcc97f0ba97ddf0b2deaae9faed791d1e764a6ac6699a638fde62c84a8a805bcdedb8cc18c0631d740f19989b86206a9c207d0f690f44a5e292bed780b23c570239cb296c3a7f504a1956f596f02d9f02b7033f3d8e9c7c04a17d7fc3da72183c5728a0f0daa436eeea2cd2a499ed8c3833bba7c46cb122b7be0df4101652d1e1cfb2643ee5b9088003e93577cbb1cd8d4873feb1cca6e04404ea938c67bc18b139a2d8b33b30dd72cbc28621acb0c3375fb42ec4d83b37ff9ede6c704ef63bb09880fc3738a31ae02ba77c1f18075dd6b0230fe1389829474e68a8a960154e7c96fd63066605421638d57852a642e05e7d32cb3d92daf787ad7cf2837a8db6ce2a44944c79dcc7f09bdeae277f4f3a9eb3d893c600137b65fc8e4f83acb2cda1badfceacec09debc4e30670e41e230152e262c4990521763f3cc34a235dae793f1bd323b34c03ae8b330b271c5bb8d5d546b5d2c001d16b73dcae10959334580e9e3c27ae61ee690a77580a39f86a19dba1cc3be9328dce6a423c0b27ed00b15989ceeddc5f341262cab30dfd0b62675e908377a292ffa8761b174fd7c55cf00a477790c7f811f279c79b5ed3474d29f335a9b09f3c09aeff483b66adb85c0db56bb7d65ed116339a8c2f4c3057274b9af9a446fdadc871ae990d9b4b7cda2146f1eda4c41e924572437d3f39ab7fa3e219d1aa9a199d9b729abaa294ae22614de9b9f37060e37ad41f5eaa86e972299f39c6e9ca2d2509ea3288fb4038a5bf77408f991602ea4a80a1f6c2c693e2d96cbbd9bae8c5017ce342e18d2bf195a1d37ac7eca6037ef313d745fa679fb483fe8b562ec0884b6264a834545cc8feb5af54425f40af1cff56226c4cf827651bccb54aa2b154aadc4f36fc00b23fa538f5586348422b09cecff3dbf46d3e96c2b93a706fe216bd5d3e4042be21c27b95f40137572f9797913dd5748642b1b588704e4b507a9fb85c1a51b3c8f604db029c8d34b76ae29ae851cc628505867bef397fe7fea1710c821469cd30b16d654446c14d92a28e25d8b031e08a465845beb876dcfa6f2222d2942b8c43aafb36834e1f95156d97e0ca57aafcd56da0d1a86c90d6078723d0dd68cad65389faa47bb19efd3a640bdb27c461f47a7bb61610b1a83ea32298a75f311b3c9cd41b8bbc4942ec302b3cf6750a4ac80bf15a077d85003e910a558be9dae30f7d93430c972847c02dcc9cf755205f8abc495072e9e32880a26078556cc83b1aa718250180c9c99019735f406fcf55a7d01ed540f81b581d0c5d7391490b933dff421ba7c5ee8c6e23abe5c5388049675f09daa850dcb9d3f76901031b6debf60a197709c416bc65f9c26908b2d3725bfdb1601ea6a468b91df9e8a0f53a9dc79a621637c569086db45dd5836f5cd767ca3c23c4b3e4da48e02592269bf3c771c84fa35850063007a4f271249caa2f7a6f9ae81539c8f7c034416746e0029301aa8dc9ae9714247734d89d576b69881716aab1464f7555e5ead83c7d79b0c1fd3fe755e75d02af5cf2b1b4de19a2be4a763843cf7dd61aed8649c8d8691fc4ed6caa23cb45673f03af01fdd05009298d9667056c9bd0ff218a4af1a6e187a94acae4ff0fea2a72c196b54ac2d61ebf0dd13b0afe6e4c938478de74dc23b2a0e2d3d1a4871472e344c31fcc76a510418da58ef69f964144bb2ebbe75829d0c49dc428089047a51f09249675f0693dda38ee317e92d679615f274e6d4547f9cf730e3d6699040f07b10b4903b770f9068234d8f8e8f10fe9685fdb0b32c1bf9f95998cb7b9c8c51c217877cd236461684dc479f52bc8ae41808244aadd4eee6df8706465eab1b6fdaf2b16ec5fa8ac7518172109b8e816fc1318a5d52f7bc526c8c8741ff58d00b2e888790e053dbba14c43983d049fc3efa9bc24d48772453f01f5617ed71d8d6b304b1e3a8330040c9a5b1d8bcc27d64d368ac2d2db392aef7d07910b812e2ace29958616196b438c13b6710b0fc1925925e43f5ca9f3e14b4bd1fcc6c737b138c3afb5d4f9d66e8abcd42dd9220c14a1745f289bb641982fcf20e88b9dc7ee016287cbb33c88895b80e7149ae2836025c169acfbd2c89458814103330f5c90197ac2768edd04ada1af91d37e6eb46c1c140e7eda4cc3043705c44070cec77d6e1d04459043c30b26feaf7425088672a9038a798ad891405772673b73c94275143b52eb4d6da0b13a5bb9d0831c9f2a701ba913c7e19a36741f8a3d68df21f084a070fe39447c433ce104fc48c3da5759931e1a9fa9f9053d698be6f09d0adfdb949c3d59713191bf9e9ced86a890054daf81b2651a85d315a71824bc22d04c5d721f282a3e34c131f627c8d74af67400b901c2039fda2d40cc0b1c68581270ff5be7991d764cb23bb18415cc349d529ebf1d789e3e09ab5bf76707f92e894b1840865cf8fbbf6b25b6363655177eb70f9bbd7962a4c421c42665d624850d0631cc76b46fd1e187a239cc5bf1a14be01482594742b29fa5807581365a82d197b0ef23dae58f6d0491dc84cae017001c389cc8eb9dca149798eb26a8046cada58bddaa0079e4166b7945a3e5de5a32a3d43b79b0209557702448891079871ba6db7b54acdb48daa0c8b8e8831659df0b58d47b7c20faf41be8c67dbca61198e688c20adb4df41b6152f1d38112c93b4c505dd9471a985f9f8a300302d8485f9db478c66e121dc70aeb3cd821dda439dc6f6627f44796036b9a0a7a37be545ba96c99221fd7315b7b7984643811082bf22aab70cc208fbb7bb4212302fcd9b20892e9dd57fbde421635a704e2d41104c681a313592832169ee83d4731b773424ce09521d382cdf840458aa770e5e627662c15fbd35e63c33cd374368313395274b3c4482e3129211a5264a35a5866a7731c0007bf8137178cd3b2b51068b7f5118eb0588c28164370187fffc18a87dcd366f57aa5d332887eecca48e6e52aea4c2e96b2088d2542f92fb62bf77f3df337bad9fa2ee99e4d11a68d096941ddd73d185d1a1bbff3f61b1a884a92b52c8431fa134b85b3df4472d3ba3d574a553e4f87a33926a4cb4999eb3400861f6762dfa95d9c8e4fac444b1a656a30f10f94be8ce0545138c3e9404c9ef6c2fb98bbb53c8ab3c1b9c03688d5057b54d51bd7f796c6e8ca3d62117b1a510eb9bb8cef0fa814ac327281a167cd5dcbc115b46d524890cb3d975d0358950ff62e8cadf752f5f26725635cfb390c40970fc8f86716b203bf1949ab25fefe6799f2b7a09bf123d13ce66c4ac47d11c96c9c88e1a1cfc3925d00bb40a23d3309e90a37d77f04ad3c39bb20fc4807968e562446978e0e9feda9ea77c4ba2aa8a9264a88211afede77edf4cb1cdac37ea0fc768a40c5a416deb4efbe46a2deee3b57f97051fa0fc9e148b7d5d48b9f0631204eff62c2101fa413b569da4acdb887900ba18cf9128b016369cbfc3b7dd274547a1d3b0e4e4b0e0a77d72a4d0d0402f8708ac00afd93085c855c3cefc216ba5b9cd4947f4477475601c5d521897ab8868e1e00683845600df3528cf1abab1d63d6f21b1a93886e72be40398c8c94957fa9754f80dcc8608512d3aab89d531f37a472e84763ec28123e66bed864cd6088a807e4ea81c232dfef990526ea20116a86dc79b92eeaf13938b4ae5", 0x1000}, {&(0x7f0000003300)="6bc30bd8da82372d6fb7542d1ef8a6a8a4b908d8a146fa9cf0fcc89193c9d923dff3c0a7dfdba249bb1084e3af18daedf3c3983ea95dec326a61f2dfc373d28220b5", 0x42}, {&(0x7f0000003380)="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", 0x1000}, {&(0x7f0000004380)="e1dc8373d526acc2de20f4ca348ea51d7f581b8ac81432330c356edf0dc6cbabd300327c48dcbf0bc6a9d2e4a25ca0e9e2743cdebfe156991ec8332bb842c5d8fa3dc925bd737c58a3d4787179019fde224df9f46ca3b866d39edd0892bcd5670057fc562b1495088bd3d213f2a5c9c855418af1e8a89392cbea0b3f95bb638c6a47f65f4c6a0c85e4904a348d7bbd6753d98a8570351f1dde12e7a981456f944dd00561ee1b651459b55a962470bf3de149413a8b2a871258fa", 0xba}], 0x4, &(0x7f0000004480)=[@rights={0x38, 0x1, 0x1, [r4, r8, r4, r3, r7, r0, r0, r3, r0]}, @cred={0x20, 0x1, 0x2, r5, r2, r6}], 0x58, 0x844}, 0x4000804) socket$nl_route(0x10, 0x3, 0x0) bind$vsock_stream(r0, &(0x7f0000004540)={0x28, 0x0, 0xffffffff}, 0x10) getpeername(r8, &(0x7f0000004580)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000004600)=0x80) set_robust_list(&(0x7f00000046c0)={0x0, 0x2, &(0x7f0000004680)={&(0x7f0000004640)}}, 0x18) ioctl$sock_inet_SIOCGIFDSTADDR(r8, 0x8917, &(0x7f0000004700)={'hsr0\x00', {0x2, 0xb5, @multicast1}}) openat$nullb(0xffffffffffffff9c, &(0x7f0000004740)='/dev/nullb0\x00', 0x20000, 0x0) setregid(r6, r6) write$P9_RWRITE(r4, &(0x7f0000004780)={0xb, 0x77, 0x2, 0xffffffff80000001}, 0xb) ioctl$KVM_SET_TSS_ADDR(r4, 0xae47, 0xd000) [ 224.121739] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.128341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.135553] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.141939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.319715] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.343738] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.407806] chnl_net:caif_netlink_parms(): no params data found [ 224.444697] IPVS: ftp: loaded support on port[0] = 21 03:05:20 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x90000, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000000c0)={0x9, &(0x7f0000000040)="0ed3b1afb7f61a01aa47257cff670994b8ae73d416b2588579361831b831b3bdb953ff15aef5d9d13ffca5355ac67f28e3135c75c0d5d157a5f09f3358a4d3454ea5d2ab9afa85f41edf12e36a88fd9f5315294dc1ed5c4d88c8632e7a117565db4f5c04552ceed2887aa31c5d1681e7f6f61fe4e778"}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000100)={{0x1, @addr=0x4}, 0x8, 0x2, 0x1}) write$P9_RAUTH(r0, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x80, 0x2}}, 0x14) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000180)=[0x7, 0xfffffffffffffffb]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0xb3, 0xd7, &(0x7f00000001c0)="a461efe46cb5ebd1fc70b9a1fcf1fa95c9260a07103af91b61ad48e1bc272c0af3b0f3e15c8cdfa314acf9b8fd0d0381972967753e715cfa7a48b672133c330d0457e1265022e7fae612c488a69612c1c9cdd05595ec9f325350a2d18af6f4b109570316fe668c1ef439badbcedf3634ef42e070f667e613189423451eaebc5d4055cd519a8d743bce4cf6e97f3386c7a49a6e1f4a75b2120a4bc93ae2afbd836a1024a30622580c9138024eede712ce53a01d", &(0x7f0000000280)=""/215, 0x101}, 0x28) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x9, &(0x7f00000003c0)=""/98) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000440)=@req3={0x19, 0x8, 0x401, 0x7fffffff, 0x10001, 0x3, 0xfffffffffffffffc}, 0x1c) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000480)) fcntl$setpipe(r0, 0x407, 0x6) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000004c0)={0x56, 0x2, 0x8001, {0x6, 0x5}, {0x8, 0x5a}, @const={0x6572bc47, {0x6, 0x1000, 0xfffffffffffffc00, 0x3}}}) write$P9_RREAD(r0, &(0x7f0000000500)={0x6c, 0x75, 0x2, {0x61, "6c328c230e17672aa6ec52e4af60b698b8663f3b4c8b4b427c2c83d4980a9b16ad19d3baa4eeeb33d804c0b65ce96bd222b5d1d6370d33d1d388c205bc30e23dbebe9c18666ff1b17a14e082e85684d336c2969eda1e54103e44f5bca1ecfcc0c4"}}, 0x6c) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000580)) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f00000005c0)={0x40000000, 0x105, "267734f820167918f0d20832ca6fe4d429aba45b9afa74d0e7f073bfbf4ec531", 0x7f, 0x5, 0x5, 0x6, 0x0, 0x5, 0x3, 0xfff, [0x7fc7f142, 0x7, 0x2, 0x6]}) accept4$inet6(r0, 0x0, &(0x7f00000006c0), 0x800) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000700)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x20000, 0x0) sendmsg$tipc(r0, &(0x7f00000018c0)={&(0x7f0000000780)=@id={0x1e, 0x3, 0x2, {0x4e24, 0x3}}, 0x10, &(0x7f0000001840)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="125c7a6798c44bba375a85e79bd3e7696ae2587df371bed77c888e6afe1348718aa03441ea7a09be433c32ed92add5b7bdf07f4c41fd3c12fe68b1dfb1a147dd5d30fb7f1cc1e964283a89fa16813f0acdcc1b85ec9dba52", 0x58}], 0x2, &(0x7f0000001880)="70f19dec5b68f3bf9c9a13a6d41fa8746408406a9395667d4403df9ec270ee62a6623b5f6136309d3b36c5d6177f44c8ff2a7a48152863", 0x37, 0x90}, 0x8011) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001900)={'filter\x00', 0x4}, 0x68) mknodat(r2, &(0x7f0000001980)='./file0\x00', 0x522, 0x1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f00000019c0)={@reserved}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000001a00)=0x11f000) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000001a40)={0x4}) capget(&(0x7f0000001a80)={0x200f1526, r1}, &(0x7f0000001ac0)={0x48, 0x7, 0x1, 0x1ff, 0xfffffffffffffffd, 0x7}) r3 = syz_open_dev$mouse(&(0x7f0000001b00)='/dev/input/mouse#\x00', 0x401, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f0000001b40)={{0x7, 0x7}, 0x0, 0x100000000, 0x4, {0x800, 0x1}, 0x6a6, 0x9}) open_by_handle_at(r0, &(0x7f0000001bc0)={0xe9, 0x8001, "0f60d41f248f99f33996726f7ffb38a9c4a04a65c1f44570ea7c319da42d21802a3a4421b8b2b1780e97d40ab229327b656f8aae072bf4e751305d5f8f34edea6e8ef2155e73b929c5e8489370e1021c3164f2c95de35c89b2fac0c6987c45e16bd7cf8a6094f15c1431a2c16e105ef2fd05b0514751a0935d349a4dca012dfba2b00914f070460d78099b7fc85dff89e9bb710f30f1bab4bfc261f38b371cf1f5756eb5aba67169256aa365994816f923843b051351f3b1373d50d0766fd765a75a1f9119263c4d7a8d8c3fcb9d99e1d95522a2217ff8bdbfbe9715bd98363c51"}, 0x400002) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000001cc0)={0x0, 0x7, 0x0, 0x100000000, 0x40b}, &(0x7f0000001d00)=0x18) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000001d40)={r4, 0x0, 0x706}, 0x8) [ 224.470775] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.480523] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.490648] device bridge_slave_0 entered promiscuous mode [ 224.548474] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.555282] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.562785] device bridge_slave_1 entered promiscuous mode [ 224.591098] chnl_net:caif_netlink_parms(): no params data found [ 224.652814] IPVS: ftp: loaded support on port[0] = 21 [ 224.666563] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.709249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.729499] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.736316] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.743638] device bridge_slave_0 entered promiscuous mode [ 224.752599] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.759092] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.766165] device bridge_slave_1 entered promiscuous mode [ 224.826647] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.839577] team0: Port device team_slave_0 added [ 224.847351] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.854221] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.861287] device bridge_slave_0 entered promiscuous mode [ 224.871404] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.878079] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.885567] device bridge_slave_1 entered promiscuous mode [ 224.911536] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.920395] team0: Port device team_slave_1 added [ 224.929178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.945252] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.955407] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.965215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.976266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.986447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 224.999959] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.021889] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.029541] team0: Port device team_slave_0 added [ 225.061627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.069830] team0: Port device team_slave_1 added [ 225.077834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.116902] device hsr_slave_0 entered promiscuous mode [ 225.173640] device hsr_slave_1 entered promiscuous mode [ 225.213926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 225.221107] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 225.230039] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.238394] team0: Port device team_slave_0 added [ 225.244086] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.251505] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.259129] team0: Port device team_slave_1 added [ 225.265775] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.284926] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.331886] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.343291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.397291] device hsr_slave_0 entered promiscuous mode [ 225.433849] device hsr_slave_1 entered promiscuous mode [ 225.506988] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 225.521018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.529034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.556917] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 225.567834] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 225.575050] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.581345] chnl_net:caif_netlink_parms(): no params data found [ 225.646027] device hsr_slave_0 entered promiscuous mode [ 225.683618] device hsr_slave_1 entered promiscuous mode [ 225.726611] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 225.756922] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 225.766865] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.783280] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 225.822399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.835216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.842793] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.849219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.876537] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 225.897518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.904803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.914080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.921668] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.928065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.941673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 225.949158] chnl_net:caif_netlink_parms(): no params data found [ 225.983679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.008114] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.014664] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.021649] device bridge_slave_0 entered promiscuous mode [ 226.029269] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.036519] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.044031] device bridge_slave_1 entered promiscuous mode [ 226.071686] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.086944] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.098673] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.108057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.135055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.148482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.172009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.181938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.198702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 226.206095] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.212530] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.220028] device bridge_slave_0 entered promiscuous mode [ 226.227072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.236063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.244431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.254285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.262070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.270006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.277673] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.288580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.296113] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.304494] team0: Port device team_slave_0 added [ 226.310570] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.319044] team0: Port device team_slave_1 added [ 226.325225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.332512] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.339566] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.346988] device bridge_slave_1 entered promiscuous mode [ 226.358373] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.370202] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 226.378070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.388608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.395874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.402764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.411303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.435757] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 226.441810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.482735] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.492051] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 226.498575] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.516630] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 226.525688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.538936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.548082] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.626694] device hsr_slave_0 entered promiscuous mode [ 226.663815] device hsr_slave_1 entered promiscuous mode [ 226.716137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.724334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.732220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.743521] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.749869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.757632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.765509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.774307] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.780674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.788290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.806500] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 226.814700] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 226.826189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.834411] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.841564] team0: Port device team_slave_0 added [ 226.848935] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.856718] team0: Port device team_slave_1 added [ 226.862442] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.874156] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.883831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.901506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.909293] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.918719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.934066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.954182] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.962059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.005283] device hsr_slave_0 entered promiscuous mode [ 227.056541] device hsr_slave_1 entered promiscuous mode [ 227.113997] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 227.121277] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 227.137877] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.146755] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.154521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.161579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.171298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.189451] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.204035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.212190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.222860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.231815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.250018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 227.275001] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 227.281726] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.294011] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.301311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.309872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.319943] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 227.326787] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.336360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 227.347130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 227.357927] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.365827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 03:05:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, 0x0}, 0x48) [ 227.373729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.381732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.389712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.398790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.407049] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 227.417052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 227.445429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.466258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.488078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.496941] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.503343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.510172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.518756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.526519] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.532861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.542334] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.550047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.561324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.568692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.576844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.584991] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.591318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.613732] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 03:05:23 executing program 0: [ 227.649283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.668751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.687324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 03:05:23 executing program 0: [ 227.708698] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.715209] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.732111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.750023] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 03:05:23 executing program 0: [ 227.768180] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 227.792633] 8021q: adding VLAN 0 to HW filter on device bond0 03:05:23 executing program 0: [ 227.814788] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 227.821546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.840978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 03:05:23 executing program 0: [ 227.862731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.876040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 03:05:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x40000108}]}) [ 227.917830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.932098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.950824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.975468] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.002126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.005517] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 228.018449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.053475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.061954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.078817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.088522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.100245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.111660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.126900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.138752] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 03:05:24 executing program 1: [ 228.149587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.175607] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.184605] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.195613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 228.210087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.222074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.236488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.255839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.266414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.281965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.291078] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 228.299022] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.306825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 228.316967] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 228.326393] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.339547] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 228.345735] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.351865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.360302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.367887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.376103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.383714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.390582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.400149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 228.417445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.425280] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 228.431293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.439102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.447813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.456126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.464127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.471650] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.478027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.485274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.494508] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 228.500527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.511652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.522428] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.533910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.544358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.551890] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.558271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.565698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.573569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.581052] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.587445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.594783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.608657] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 228.625708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.640173] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 228.648261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.655845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.664294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.671811] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.678227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.685831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.696977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.706801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.717016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.725549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.734222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.741976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.754223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.764797] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.774224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.782746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.798727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.807368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.815271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.823683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.834452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.853665] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.860907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.901615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.912776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.925853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 228.940941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 03:05:24 executing program 2: [ 228.958048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 228.968202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.976525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.998662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.030056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.043917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.054292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 03:05:25 executing program 3: [ 229.074907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 229.086243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 229.099872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.110050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.122557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.143968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.154189] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 229.160220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.181331] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 229.189781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.220507] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 229.252857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.267267] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 229.280259] 8021q: adding VLAN 0 to HW filter on device batadv0 03:05:25 executing program 1: 03:05:25 executing program 0: 03:05:25 executing program 2: 03:05:25 executing program 3: 03:05:25 executing program 4: 03:05:25 executing program 5: 03:05:25 executing program 0: 03:05:25 executing program 3: 03:05:25 executing program 1: 03:05:25 executing program 2: 03:05:25 executing program 5: 03:05:25 executing program 3: 03:05:25 executing program 4: 03:05:25 executing program 0: 03:05:25 executing program 3: 03:05:25 executing program 1: 03:05:25 executing program 2: 03:05:25 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) stat(0x0, &(0x7f0000000180)) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) add_key(&(0x7f0000000080)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r2 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000000), 0x4) 03:05:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000000c0)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xf}}) 03:05:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, 0x0) 03:05:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000000c0)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam}) 03:05:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) capset(&(0x7f0000000200)={0x19980330}, &(0x7f0000000140)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 03:05:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="727eba4c", @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x8000}, 0x1) lsetxattr$security_evm(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)='security.evm\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x2) setfsgid(0x0) mkdir(&(0x7f0000004080)='./file0\x00', 0xfffffffffffdffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000080)={0x0}) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000000)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003dc0)=[{{&(0x7f0000002a40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003bc0)=[{0x0}, {&(0x7f0000003ac0)=""/71, 0x47}, {&(0x7f0000003b40)=""/121, 0x79}], 0x3, &(0x7f0000003c00)=""/182, 0xb6}}, {{&(0x7f0000003cc0)=@alg, 0x80, 0xfffffffffffffffe, 0x0, &(0x7f0000003d40)=""/128, 0x80, 0x3f}, 0x2}], 0x2, 0x0, &(0x7f0000003f40)={r2}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000001b40)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000001b80)={0x0, 0x800}, 0x8) mount(&(0x7f0000000040)=@nullb='[d::]:/llb:\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='\x00') getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x8, 0x1, [0xe37]}, &(0x7f0000000480)=0xa) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000004c0)={r4, 0xa29c}, 0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x1fffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000500)={0xfffffffffffffffd, "721c872a81b28012689ed873d51007f2bce2c8cf9193ae5e8a06365e7a2bc367", 0x40010, 0x4, 0x80000000, 0x0, 0x7}) 03:05:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000a00), &(0x7f0000000a40)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r1, &(0x7f0000000840)={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0xd}, 0x93) r2 = dup3(r1, r0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000a80)={0x3ff, 0x6, 0xb270, 0x1, 0xffffffffffff3d91, 0x5797}) sendmmsg(r1, &(0x7f00000002c0), 0x4000000000002c7, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000040)=@ipx={0x4, 0x80000001, 0x31b7, "35c2b46db649", 0xfc}, 0x80, &(0x7f0000000680)=[{&(0x7f00000000c0)="1591b9a8e42e8487d63cdad856d29d4ef01e187805c9781b08515a3a75ed9cf3529345cfddf734e6767141cdb07bc29ab5bcc1ad96c28aadbcae72b2eeb8b15989774187594e68e8cca898ca3dca280fef4e937ac99e98d4ed1faf6a76f556", 0x5f}, {&(0x7f0000000180)="233a4c3d709486b78851b8a24333573ab27ebc50fc32bccfd1d757538119ca65317445f1a349bab0e2e38c71ca212de7be8cf1bf09908c208fd9891f7e5ca00653100de6ef5322e35f3a2b6522777a18b336752e97035d2276fdaceeeb3caaf530637ae012459a7606d86825b89c06004a2751302b256398ffe9b602446a326ecd9f73176b69c0fad750a209f92d9153a749136c7f3e756f305e", 0x9a}, {&(0x7f0000000240)="91129f056908455f2c95185c3deaf2a1ef99ac032827df66", 0x18}, {&(0x7f0000000280)="873f9a4b170e386c50b61c32eaf84542957bf2289f1502ea674f81072ab04ce5fbf0d5db70a9ebe619203ccbaf751c4ba188106271da1e71c0d5f83a508519309a62272127b2c1ea0e591346e4793fc4ef3acb0ae6b36ed43de4a95c9b62918b67d9990943d7918bd5ff48bd7df7d56cd8e5c8c89a8e92", 0x77}, {&(0x7f0000000300)="3ca2f02c337522f1147e2b7ee1f048b11728dbfa86028e44853090e7820aa9b8aa56fce876a71e654e7c59d3aeb86884ade405fcaab8410717d22a38b637816f2f1779f31ef099a8fae81e765cc4975fe4ea66687643e049d54f92b9be631cb18fe58b534abba10d403d7641b70cff3f4c5ba26a3de26b46a0df386bbd47f94bd719193c9633e32f6f57f3c58206846012b198e2124205645231f71a6fa235c351fd720ae2225b8b3ef1b8aebf0c0158", 0xb0}, {&(0x7f00000003c0)="84663b4f9c211c11335e589c631e875167fc3b11048f0cc2866cd819a4037cc227c2f409f135c56f17d0da6214238b61eccb99fe642868fe3946b3a31bdcdd4212d3d35918555ba3f99452396cc1d36b3aa6471fc79d79222306d45b5bffa58abdd4cc3f5fbc3c8e1bcd756a1250b0fcc91a356d043adc8a3282a544f5f51bea839ffff9d70892b0b00e603724d4a917c1cb7b8f99", 0x95}, {&(0x7f0000000480)="f59ee7abc661d36134a401d4261ac50a4b5d1a51891fed7bf388061d6a6853ab33bf11732a987e38ae36aaf5cc7363b5f1596a43746de35eff8cb3e017348c1be261eeab732be95fb4b39c0b4c5428f4fac5cd2dd6913dd6fc7a122bbc67979c29893d42a8dbbd663205b972fe94371f4902665515c49a5b0af4969980d53aad23d364c2a5a97db3e7805878fcf630fb5b32700041836aa90e9e4934a43c4dd4a78321917f460e84a62e6014f08dc77d0024ae032522068e8ef7cfc42ef4c6058fe0ae7375377149888548cf2f290f544194c6a95396502ba4ee6f2e6781e3ef5005dccf7d5834293c8d0970", 0xec}, {&(0x7f0000000580)="8ff906c08aed51917d7c0f07d892e14b69413ce36080e252a0ec2ea4615862f527", 0x21}, {&(0x7f00000005c0)="98e86952ff94a9c6f2e8a44544ec3ca6cc69b1fbe801f6174aa29bf93b2d3d68c91e809566ae55550f4348cc3663aac1eef05972df08b7cebaf7ea5ec5d219e25edb8ba5dd7da54c440634729f51be5d2c12c0f8a64c3f5b5b010bf9505a8da6efd28e6610b0eda6c7b23c0b78d65601a5a170660499ed5fdc395f0da66b6acdaf9abfc3ba491a6387e854eaf57e61b7d112f21b4cbc50a4ae86d53367444ab8", 0xa0}], 0x9, &(0x7f0000000740)=[{0x58, 0x118, 0x1, "763c0d25061e42b88bf4ca466ce64b05f963e77d1191fd88d945c3964c5f3beb96c119ae6aadd05877ed98f860642df0fbc02b68f0f209ba20f4d68c6e98a10d5ad6adaadb"}, {0x40, 0x0, 0x4, "ed8545fe94754f21544e8c47334d6bffd284182d5324fb978df30fd460e926af2532611161a7b91c1aaec4023763"}], 0x98}, 0x50207355}], 0x1, 0x4004000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000008c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000009c0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r4, 0x10, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x7f, @media='ib\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 230.021191] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) 03:05:26 executing program 2: openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10, 0x800) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000580)=@get={0x1, &(0x7f00000002c0)=""/28, 0xed16}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340)="a00d9b712c08617e79cee636501674a7cc43dc83cb8e6db54fd3ed6a414b5153b0327dd742f7d0ed461950ac8e6b7fee8686f57b4b7ad09d54fa034d79b80ccecbcdbb98ad673085680434f8c780fa2831c38a5bb9d6a3b5eac75fa09744d0d20bf91fe71da0e85952ac94bc9d4c6b8efb03acf434f36910af451f471920ce62b079ab6bf952f4d8038ae4a36c7bd8339013274358eccaf550824d0fd61de1fbb197731412e175c8527d54ef2c005250850dd894fd216372b7971655854a4308cc08c61e7f", 0xc5) name_to_handle_at(r3, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x8, 0x9}, 0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) write$UHID_CREATE(r3, &(0x7f0000000440)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000000)=""/93, 0x5d, 0x8, 0x6, 0x3, 0x200, 0x6}, 0x120) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000180), 0x4) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xfffffffffffffffd, 0x0) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000100)) sendto$inet6(r1, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x1d0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000300)={'syzkaller0\x00'}) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000140)={0x88, 0x9, 0x7, 0x2}, 0x8) 03:05:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x1) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000040)={0x5, 0xb90, 0x4, 0x1f, 0x3}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x0f\xff\x00', 0x4}, 0x68) [ 230.087064] hrtimer: interrupt took 51273 ns 03:05:26 executing program 1: r0 = socket(0x2000000000000021, 0x800, 0x2) setsockopt$inet6_dccp_buf(r0, 0x110, 0x4, 0x0, 0x4) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000040)=""/177, &(0x7f0000000100)=0xb1) getpeername$netlink(r0, &(0x7f0000000140), &(0x7f0000000180)=0xc) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x1, 0x0) 03:05:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x1) flistxattr(r0, &(0x7f0000000000)=""/55, 0x37) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x5, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="390000001300090468fe0700000000000700ff3f03000000450001070000001419001a0004000210070000008aa159ab090000000000000000", 0x39}], 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) recvfrom(r0, &(0x7f0000000140)=""/168, 0xa8, 0x143, &(0x7f0000000200)=@ll={0x11, 0x16, r1, 0x1, 0x100000000, 0x6, @random="0128a6692883"}, 0x80) 03:05:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0xffffffffffffff6e, 0x0, 0x0, 0x5d) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0xcd, 0x6, &(0x7f0000003700)={0x77359400}) 03:05:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1a) exit(0x0) syz_open_procfs(0x0, &(0x7f00000006c0)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 03:05:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fff, 0x202000) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet_sctp(r2, &(0x7f00000007c0)={&(0x7f0000000180)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000640), 0x80, &(0x7f0000000240)=[@prinfo={0x18}], 0x18}, 0x0) getsockname(r1, &(0x7f00000000c0)=@ax25={{0x3, @bcast}, [@remote, @null, @null, @remote, @default, @bcast, @null]}, &(0x7f0000000040)=0x80) 03:05:26 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000004c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$vcsn(&(0x7f0000001a00)='/dev/vcs#\x00', 0x9ea, 0x0) read$eventfd(r1, &(0x7f0000001ac0), 0xfffffffffffffd3a) keyctl$chown(0x4, r0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') modify_ldt$read(0x0, &(0x7f0000000180)=""/67, 0x43) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000300)=""/225, 0xe1}, {&(0x7f0000000400)=""/48, 0x30}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f0000000440)=""/117, 0x75}, {0x0}, {&(0x7f00000015c0)=""/90, 0x5a}, {&(0x7f0000001640)=""/87, 0x57}, {&(0x7f00000016c0)=""/208, 0xd0}], 0x9, &(0x7f0000001880)=""/128, 0x80, 0xa0}, 0xb18adc9706b39d51) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000001940)={{0x2c, @broadcast, 0x0, 0x1, 'rr\x00', 0x1, 0x7fff, 0x64}, {@multicast1, 0x0, 0x1, 0x5, 0x0, 0x1}}, 0x44) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40a01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040), 0x4) keyctl$setperm(0x5, r0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x101000, 0x0) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x100000001) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000800)={0x0, 0x800}, &(0x7f0000000840)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000880)=@assoc_value={r4, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000001b00)=ANY=[@ANYBLOB="1b0b21e2a62d0a300cf121867a8c5fd29c07e21e333f3bb55cfbef9c8a25193cb0b9b7c39c12edc4d1c98b5d2ff6924dbabd1f2c1413a3ce08f4f69ac175826de7c722bfb43e65ae0670232b333ea3c15cb264a3eca70bb4f2c06af3430c3ccb86284c9f851c861ac40cf3955edfe463de3508072d5d834b7646c566", @ANYRES32, @ANYRESHEX=0x0], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f00000000c0)="ac994bb978eca5b76b6a56d33f958454175b1237c9be49e452818b43a060ab909e0f15d02721625e7dddf97e2b7a7a209193f07c") ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000600)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:05:26 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000800)='/dev/vbi#\x00', 0x0, 0x2) getpeername$inet6(r0, &(0x7f0000000840)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000880)=0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x6c00000000000000, 0x14000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000e8210001599f739adad874d20004000000"], 0x14}}, 0x0) r3 = accept(r2, &(0x7f0000000280)=@pppol2tpv3in6, &(0x7f0000000300)=0x80) sendto$unix(r3, &(0x7f0000000340)="bd7eff7579630a944fcb4130fc5f3318691b21eb2904c146cfb6358ee2d158431981a1aeefc5f2a524f245e0398f5d8224db3a6e64d60db6d2c8a44dadd0bee7e26d9d39836e928181fb6630f53ed0d90661f23fc2908ea94d2609dfa1cf3aefee24a183c1bb0a9725351a9eebd0eb0c03e3b8eccb95b3ca62ec640a75af9c9a69e3e4abac81c3889c00d63f48f3ae0dc741138a306a377a03d6428b5ffa4087726ad6ad461d4fc145d98c72635bbffeae6a27686ecc579d93f54a92", 0xbc, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f00000008c0)={0x1, 0x7, 0x40000000008}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000700)=ANY=[@ANYBLOB="9fbe0d16184334e39f13bb650f167cc147a452e156274f0716b9cab731e9910b2ac24b28afc5745359f92027f25c96334b5e5f638a6e96a7dee5c256bae5fa1b90cb7d4dfa47e4df894ececbe70f332952256c8b56d77f3afea9fc64fe0bbc5bd7d8361b7bd680de4c613a8872e8dd227eceea5c44d9ce78062a65bfb5005ca631509aa3af5adb735fd0d699092c62d1769a3a0ecd83919df930a646b6dde2d7c5bd811788348936a107059d1314c24ce43f16de3e9e9b89e19e241b8c40479c724c86010c4622c78e84d8695f135bdc111b56c1"], 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000600)=0x1, 0x952c) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1', "60af854918fbb3438f4653beafae9eda487332"}, 0x17) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000540)={0x48, @time={r7, r8+10000000}, 0x0, {0x20, 0x81}, 0xc38, 0x3, 0x3b}) r9 = getpgid(0xffffffffffffffff) r10 = getpgrp(r9) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000200)=r10) setsockopt$inet6_int(r5, 0x29, 0x4b, &(0x7f00000005c0)=0x1f, 0x4) r11 = accept4(r5, &(0x7f0000000040)=@in={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x80, 0x7ff) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f00000001c0)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r11, 0x0, 0x63, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) 03:05:26 executing program 0: syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0}) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WIE_OFF(r0, 0x7010) r3 = socket$inet6(0xa, 0x805, 0xe) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r4, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r4, 0xb) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x6, r5, 0x2, 0x5}) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) shmat(r4, &(0x7f0000ffc000/0x2000)=nil, 0x7000) 03:05:26 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) tee(r0, r0, 0x4, 0xc) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x12f000) r2 = shmget(0x2, 0x4000, 0x837162c25996927c, &(0x7f0000ff9000/0x4000)=nil) shmat(r2, &(0x7f0000ff9000/0x3000)=nil, 0x2000) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x2) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB='lrootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',\x00']) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000140)={0x0, 0xbf50, 0x1}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000001c0)=""/214) 03:05:26 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3}}) openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40045402, &(0x7f0000000080)) [ 230.694835] binder: 8311:8313 unknown command -995987523 [ 230.728163] binder: 8311:8313 ioctl c0306201 20007000 returned -22 03:05:26 executing program 5: r0 = getpid() ptrace$peekuser(0x3, r0, 0x8) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000300), 0x8) r2 = semget$private(0x0, 0x7, 0x241) semctl$IPC_INFO(r2, 0x3, 0x3, &(0x7f0000000000)=""/71) [ 230.792440] binder: 8311:8313 ioctl 7010 0 returned -22 03:05:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x40) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0x1f, "98f68673f4023a0cfa9519b97f86cb9e47b0facb62e4164b20f5be5d3cc8c6"}, &(0x7f00000004c0)=0x27) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000540)={r3, 0x720, 0x7fff, 0xfaad, 0x0, 0x57cd}, &(0x7f0000000580)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0xb0, &(0x7f0000000300)=[@in6={0xa, 0x4e22, 0x6, @ipv4={[], [], @local}, 0x8}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0x0, @mcast2, 0x9}, @in6={0xa, 0x4e21, 0x401, @rand_addr="48ce38bfb47b4a0538f8ad8dfd5cb179", 0x1}, @in6={0xa, 0x4e22, 0x5, @local, 0xcef3}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000440)=@assoc_value={r4, 0x7ff}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}, 0x10000, 0x6}, &(0x7f0000000200)=0x90) pipe2$9p(&(0x7f0000000480), 0x4000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0x7ffe, 0x1, 0x81, 0x8000, r5}, &(0x7f0000000280)=0xfffffffffffffd58) 03:05:26 executing program 3: mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x2) 03:05:26 executing program 5: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) socketpair$unix(0x1, 0x10, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000380)=0x8, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x7, 0x200) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000540)=0x11, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6) mkdir(&(0x7f00000002c0)='./bus\x00', 0x20) r4 = inotify_init1(0x80800) ioctl$FICLONE(r1, 0x40049409, r4) semget(0x3, 0x7, 0x20) signalfd(r0, &(0x7f0000000280)={0x4}, 0xfffffffffffffd06) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000700)={&(0x7f0000000780)=ANY=[@ANYBLOB="50a9ce1bdb43ba1fa6e00000007fc681d53b1ff2efc66e19f84c4dc1c25275dcfd9240a47f300db66ab71423bb2dc08eac5b76a15c457f6a7cad573195658f67766a11a9c2a6cde9d71afed953edb311942c4ff39914d2d9a6b991d2f49e20c771bd16b49ccc6d0dbdc7a5d8315ef61ce18cc88ea61ccb155d834611a25dccaa9ad5e33cef3dba3bea43095d9e1a", @ANYRES16=r5, @ANYBLOB="000626bd7000ffdbdf2508000000080006000200000008000400060000002000030014000600fe8000000000000000000000000000bb080008000000000008000500000001004000020014000100e00000020000000000000000000000000800050003000000080002004e23000008000b000a00000008000b000a000000080005004cf4ffff2800010014000300ac14141a000000000000000000000000080004004e210000080001000200000024000100080002007c0000000800050000000000080009004900000008000500000000000800060002000000"], 0xe0}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$LOOP_CLR_FD(r3, 0x4c01) r6 = socket$inet6(0xa, 0x400000080007, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f0000000000)) times(&(0x7f0000000240)) sendfile(r6, r7, &(0x7f00000000c0)=0x209, 0x5a) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r7, 0x4010641c, &(0x7f00000004c0)={r8, &(0x7f0000000400)=""/168}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000040)=0x78) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000180)={0x2, {0x9, 0xc6, 0x5}}) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000a40)=""/4096) [ 230.889248] binder: 8311:8313 ioctl c0206434 20000000 returned -22 [ 230.916698] binder: 8311:8313 ioctl c0206434 20000040 returned -22 03:05:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) r1 = semget$private(0x0, 0x4, 0x184) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x4, 0x5def, 0x8, 0x5, 0x8, 0x3, 0x2]) preadv(r0, &(0x7f00000017c0), 0x191, 0x400000000000) 03:05:27 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x2}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, r2, 0x410, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x922}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xa230}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) 03:05:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x37, 0x3, 0x0, {0x4, 0x16, 0x0, 'vboxnet0proc&}vboxnet0'}}, 0x37) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x2f, "1bb7c5b5da60af26a890dca17f2e384e00660f04629ab8c3a4d820d632ddac4b46db049fa22d6924391f02591e75b4"}, &(0x7f00000000c0)=0x37) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x8}, &(0x7f00000001c0)=0x8) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000300)) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f00000005c0)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2\x1fl\x8cw\xdax\x86\xcd\xb0UK\x88=\x01\xae\xf9+Fb,\xac\xe2\xa6\x89\x89UVX\x8d\xd2\xb6\xdfDH\xfa\x0e\xfd\x92G\a\xea4\xfdbDTo!\x90_y\x04w|\x91\xa5\a\xb4?=\x88 N4\\\xccm\xee\xcfU\xe4\xc1NK\x8b\x92\aP\b\xe4\tT\n\xc22l\x94\v\x98\xf9+\xb4\x90\xca\xe1(\xd1\xb089\xff\r\x88\xbb_gd\xdc\xcas\x0e\xaeYR\xe4\xc8\x18q\x97\f\x85\xb2f\xec\x0fs\xd7\x9d\xa0XI\xf0\xec\x1cg\xc1\xa0:\n\xc0\b~{\xc8S\'\x95\x1cv\xd3S-&s!\x8d\xb3\x96\xcb\xa2\x7f\x11\xbb\xee\xe0h\xc1\xc0\xe8D1\x821\x84\x14\a}\xa6\x99\xdc]Ck\x01G7\xab\xd1\xf2\xc8\r\xd3\x94\xfav\xb9\xeeKN1\x82', 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x1, [0x42], r3, 0x200000000}, 0x48) 03:05:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000080)="88716b022fb7347d8eb4482295200283996c40b42f43a48f34e8c4c58b56ec49d61dddcaf12449dd89eb89521000abe555d869a7cc272bad653f047341fff6bf196dd69c7d97fcf07d0f40d946f50c186c9536585a17f53bac26e98f4393f5c09618271562d6bf4ebb40d7008f663c9c874a551bb26498ce870a3fd79e6b", 0x7e) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000040)=0xa, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 03:05:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x20000020201) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) ioctl$TCXONC(r3, 0x540a, 0x0) accept4$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x80000) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x80) write(r3, &(0x7f0000000380)='(', 0x1) dup3(r0, r3, 0x0) close(r2) 03:05:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='smaps\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000009c0)={0xffffffffffffffff}, 0x111, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000a40)={0x7, 0x8, 0xfa00, {r2, 0xffffffff}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(r0, r0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x4, 0x6000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f00000007c0)={0xa0, 0x19, 0x1, {0xa08, {0xb, 0x3}, 0x3, r4, r5, 0x4e, 0x20, 0x9, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x101, 0x3, 0x6, 0x7, 0x6, 0xba0, 0x0, 0x401}}, 0xa0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000340)=""/35) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="ffb449bb0400000000000008000000831eda531e43313c5ffa167a0b56a40000"], 0x1}}, 0x44801) getpeername$inet(r0, &(0x7f0000000a80)={0x2, 0x0, @loopback}, &(0x7f0000000ac0)=0x10) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x401, 0x101}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000880)={r6, 0x5a, "6f268659cc5af3d698e82924fc86d126620dad7b925da823e254ed06183b647b0af2d73d92e58fb1d8708380d624cce15dd85e956a69142a888dc7ded43aaab236fee1a94bd71ee57552b7b6a17fc3adde430413bc8620adb40d"}, &(0x7f0000000580)=0x62) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000900)={{0xff, @broadcast, 0x4e23, 0x1, 'wrr\x00', 0x8, 0x3, 0x6e}, {@local, 0x4e21, 0x10000, 0x100000001, 0x5, 0x7}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty}, 0x800000000000000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r7, 0x0, 0x0, 0xffff}, 0x14) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x3, 0x5, 0x1936}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') lseek(r8, 0x0, 0x4) 03:05:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x80000, 0x0) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, r0, 0x0) r1 = userfaultfd(0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x2) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000100)={@initdev, @multicast2, 0x0}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_newaddr={0x2c, 0x14, 0x10, 0x70bd25, 0x25dfdbff, {0x2, 0x1f, 0x90, 0xfe, r3}, [@IFA_LABEL={0x14, 0x3, 'rose0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4010}, 0x840) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x0, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000300), {[{{@arp={@multicast2, @broadcast, 0xffffff00, 0xffffffff, @empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0xff, 0xff]}, 0xa38c, 0xffffffff, 0x3, 0x2, 0x40, 0x5, 'syz_tun\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @dev={0xac, 0x14, 0x14, 0x25}, @remote, 0xf, 0x1}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x100000001, 0xff, 0x0, @empty, {[0xff, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x8f, 0x40, 0x0, 0x5, 0x80000001, 0xf1, 'gretap0\x00', 'teql0\x00', {}, {}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast, @local, 0x8}}}, {{@uncond, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x10000}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00002a9000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f00005f5000/0x1000)=nil, 0x1000}, 0x2}) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000602000/0x3000)=nil, &(0x7f0000991000/0x4000)=nil, 0x3000}) 03:05:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)='\x00', 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000080)={0x2, 0x800, 0x1, 0xffff, 0xff, 0x80000001}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x84) 03:05:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x4000005) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) pipe(&(0x7f0000000380)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) dup3(r2, r1, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 231.531257] IPVS: set_ctl: invalid protocol: 255 255.255.255.255:20003 03:05:27 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x30080, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) fcntl$dupfd(r1, 0x0, r1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, r1, 0x7, 0x1}, 0x10) r2 = syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000480)) 03:05:27 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x2}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, r2, 0x410, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x922}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xa230}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) 03:05:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000180)={@random="ade3345025fb", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x29, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "c5771e", 0x0, 0x0, 0x0, @mcast1, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000100)={0x8, [0x9, 0x7, 0x10001, 0x80000001, 0x7ff, 0x0, 0x6, 0x3f]}) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000000c0)={0x2}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12) openat$md(0xffffffffffffff9c, &(0x7f0000000200)='/dev/md0\x00', 0x20080, 0x0) 03:05:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='smaps\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000009c0)={0xffffffffffffffff}, 0x111, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000a40)={0x7, 0x8, 0xfa00, {r2, 0xffffffff}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(r0, r0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x4, 0x6000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f00000007c0)={0xa0, 0x19, 0x1, {0xa08, {0xb, 0x3}, 0x3, r4, r5, 0x4e, 0x20, 0x9, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x101, 0x3, 0x6, 0x7, 0x6, 0xba0, 0x0, 0x401}}, 0xa0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000340)=""/35) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="ffb449bb0400000000000008000000831eda531e43313c5ffa167a0b56a40000"], 0x1}}, 0x44801) getpeername$inet(r0, &(0x7f0000000a80)={0x2, 0x0, @loopback}, &(0x7f0000000ac0)=0x10) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x401, 0x101}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000880)={r6, 0x5a, "6f268659cc5af3d698e82924fc86d126620dad7b925da823e254ed06183b647b0af2d73d92e58fb1d8708380d624cce15dd85e956a69142a888dc7ded43aaab236fee1a94bd71ee57552b7b6a17fc3adde430413bc8620adb40d"}, &(0x7f0000000580)=0x62) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000900)={{0xff, @broadcast, 0x4e23, 0x1, 'wrr\x00', 0x8, 0x3, 0x6e}, {@local, 0x4e21, 0x10000, 0x100000001, 0x5, 0x7}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty}, 0x800000000000000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r7, 0x0, 0x0, 0xffff}, 0x14) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x3, 0x5, 0x1936}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') lseek(r8, 0x0, 0x4) 03:05:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='smaps\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000009c0)={0xffffffffffffffff}, 0x111, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000a40)={0x7, 0x8, 0xfa00, {r2, 0xffffffff}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(r0, r0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x4, 0x6000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f00000007c0)={0xa0, 0x19, 0x1, {0xa08, {0xb, 0x3}, 0x3, r4, r5, 0x4e, 0x20, 0x9, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x101, 0x3, 0x6, 0x7, 0x6, 0xba0, 0x0, 0x401}}, 0xa0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000340)=""/35) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="ffb449bb0400000000000008000000831eda531e43313c5ffa167a0b56a40000"], 0x1}}, 0x44801) getpeername$inet(r0, &(0x7f0000000a80)={0x2, 0x0, @loopback}, &(0x7f0000000ac0)=0x10) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x401, 0x101}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000880)={r6, 0x5a, "6f268659cc5af3d698e82924fc86d126620dad7b925da823e254ed06183b647b0af2d73d92e58fb1d8708380d624cce15dd85e956a69142a888dc7ded43aaab236fee1a94bd71ee57552b7b6a17fc3adde430413bc8620adb40d"}, &(0x7f0000000580)=0x62) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000900)={{0xff, @broadcast, 0x4e23, 0x1, 'wrr\x00', 0x8, 0x3, 0x6e}, {@local, 0x4e21, 0x10000, 0x100000001, 0x5, 0x7}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty}, 0x800000000000000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r7, 0x0, 0x0, 0xffff}, 0x14) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x3, 0x5, 0x1936}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') lseek(r8, 0x0, 0x4) 03:05:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bond0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="51000000000000000000000000000000437fc1e4b6a6ed3da337e9bf7e63e7752128e8abb26de6c6ef9a7be5bf059f6cc7604947c635ffcf99c3e6b1c5dd5ce7be020c1efcd447c19aaa7316e36dc90a8b764243f87c5b00ecd372a81c1e04e9d52633b1196d1c3a111799d9cbff93e03b76f50ce2980bc8107eae8f385fba517c3fc4bb23a773b54f2c0edb03c6fa43025c71ed92a382624e9319383f2f69a2946b"]}) [ 232.067119] IPVS: set_ctl: invalid protocol: 255 255.255.255.255:20003 03:05:28 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x80, &(0x7f0000000200)=""/191) r2 = dup(r0) r3 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENTPLUS(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f0000000040)=0xab, 0x4) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x401004000000016) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe7, 0xc000) 03:05:28 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x1ff, {{0x2, 0x4e24, @local}}}, 0x88) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000001d0007031dfffd946fa2830020200a0009000300ff1d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:05:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='smaps\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000009c0)={0xffffffffffffffff}, 0x111, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000a40)={0x7, 0x8, 0xfa00, {r2, 0xffffffff}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(r0, r0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x4, 0x6000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f00000007c0)={0xa0, 0x19, 0x1, {0xa08, {0xb, 0x3}, 0x3, r4, r5, 0x4e, 0x20, 0x9, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x101, 0x3, 0x6, 0x7, 0x6, 0xba0, 0x0, 0x401}}, 0xa0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000340)=""/35) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="ffb449bb0400000000000008000000831eda531e43313c5ffa167a0b56a40000"], 0x1}}, 0x44801) getpeername$inet(r0, &(0x7f0000000a80)={0x2, 0x0, @loopback}, &(0x7f0000000ac0)=0x10) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x401, 0x101}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000880)={r6, 0x5a, "6f268659cc5af3d698e82924fc86d126620dad7b925da823e254ed06183b647b0af2d73d92e58fb1d8708380d624cce15dd85e956a69142a888dc7ded43aaab236fee1a94bd71ee57552b7b6a17fc3adde430413bc8620adb40d"}, &(0x7f0000000580)=0x62) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000900)={{0xff, @broadcast, 0x4e23, 0x1, 'wrr\x00', 0x8, 0x3, 0x6e}, {@local, 0x4e21, 0x10000, 0x100000001, 0x5, 0x7}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty}, 0x800000000000000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r7, 0x0, 0x0, 0xffff}, 0x14) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x3, 0x5, 0x1936}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') lseek(r8, 0x0, 0x4) [ 232.447989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 03:05:28 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000040)={0x7, 0x3, @raw_data=[0x4, 0x40, 0x3, 0xfffffffffffff98c, 0x0, 0x5, 0x5, 0x7f, 0x5, 0x0, 0x7, 0x2, 0x4, 0x8, 0x9, 0x200]}) ioctl$sock_inet_SIOCRTMSG(r0, 0x80085504, &(0x7f00000000c0)={0x0, {0x2, 0x0, @dev}, {}, {0x2, 0x2, @rand_addr=0x6}, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x200000}) [ 232.498051] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 03:05:28 executing program 2: mlockall(0x1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x200000000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, r0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f000027f000/0x3000)=nil, &(0x7f0000332000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000589000/0x3000)=nil, &(0x7f0000dd7000/0x2000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f00007c7000/0x3000)=nil, &(0x7f0000c89000/0x1000)=nil, &(0x7f0000bf3000/0x4000)=nil, &(0x7f0000137000/0x3000)=nil, 0x0}, 0x68) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x4200, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000f00)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x1, 0x55, 0x100000000, 0x5}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={r4, 0x3}, 0x8) [ 232.582437] usb usb3: usbfs: process 8436 (syz-executor0) did not claim interface 0 before use [ 232.666290] usb usb3: usbfs: process 8437 (syz-executor0) did not claim interface 0 before use 03:05:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x4000005) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) pipe(&(0x7f0000000380)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) dup3(r2, r1, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:05:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='smaps\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000009c0)={0xffffffffffffffff}, 0x111, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000a40)={0x7, 0x8, 0xfa00, {r2, 0xffffffff}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(r0, r0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x4, 0x6000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f00000007c0)={0xa0, 0x19, 0x1, {0xa08, {0xb, 0x3}, 0x3, r4, r5, 0x4e, 0x20, 0x9, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x101, 0x3, 0x6, 0x7, 0x6, 0xba0, 0x0, 0x401}}, 0xa0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000340)=""/35) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="ffb449bb0400000000000008000000831eda531e43313c5ffa167a0b56a40000"], 0x1}}, 0x44801) getpeername$inet(r0, &(0x7f0000000a80)={0x2, 0x0, @loopback}, &(0x7f0000000ac0)=0x10) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x401, 0x101}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000880)={r6, 0x5a, "6f268659cc5af3d698e82924fc86d126620dad7b925da823e254ed06183b647b0af2d73d92e58fb1d8708380d624cce15dd85e956a69142a888dc7ded43aaab236fee1a94bd71ee57552b7b6a17fc3adde430413bc8620adb40d"}, &(0x7f0000000580)=0x62) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000900)={{0xff, @broadcast, 0x4e23, 0x1, 'wrr\x00', 0x8, 0x3, 0x6e}, {@local, 0x4e21, 0x10000, 0x100000001, 0x5, 0x7}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty}, 0x800000000000000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r7, 0x0, 0x0, 0xffff}, 0x14) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x3, 0x5, 0x1936}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') lseek(r8, 0x0, 0x4) 03:05:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40200, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x100, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tee(r0, r0, 0x9, 0x6) ioctl$KVM_RUN(r3, 0xae80, 0x0) fallocate(0xffffffffffffffff, 0x2, 0x0, 0x0) 03:05:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) keyctl$read(0xb, r0, &(0x7f0000000040)=""/190, 0xbe) 03:05:29 executing program 2: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffff7fffffffd, 0x10031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4de738003c21c104094", 0x15}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="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", 0x2b7}], 0x1}, 0x8000) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0xffcf) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0xd4, @remote, 0x1}, 0x1c) 03:05:29 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000000c0), 0x10) bind$can_raw(r0, &(0x7f0000000080), 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x735e, 0x24ae41) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000000100)="0f133d84bce69a121cee350b6befba49b99d103d2f5eb358153ea41818cd8f94e5219c4e889216eba99807fdfa706fd6b392c8aa06d595f818cc1d85856941017665109b4575955bb2b4d8f2dbf3b2d348b833bd20ae189a00a4b59a5b5481448dff28aa7a40055f5b5ee1724093caa0ae6e40aa6743cf1024906c921baa68b5f1afd24aa4f2e44cdeaaaeddecfc16fdfe541b9f2967bd56ccf40e0e4097d9974eca9e91c779c57df5a1af2953f81b0bec764711b8032a7a71591ed9b98107a6c40a1016fb6ac818dd57cdbcfc08c9", &(0x7f0000000200)=""/129}, 0x18) 03:05:29 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x12a80, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000200)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f00000001c0)=0x9) setpriority(0x0, r0, 0x10000) ioctl$PPPIOCDISCONN(r1, 0x7439) getgid() r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0x0, 0xffff}]}, 0x14, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000380)={0x0, 0xff, 0x5, [0x4, 0x70, 0x1000, 0x1ff, 0x20]}, &(0x7f0000000400)=0x12) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={r3, 0x59, "e9652e947fa16d4bdde92852d73a07f9e6cf7d81c2818df809c718a7c42b2a955fe871feae2b714115c64d27ce8cff2a474657e0fa5e9d6d4148ace3a84e57b455a11c1bfe70e89cbf2b7c2a4437b3be7102625ba9ae2b8aaa"}, 0x0) set_thread_area(&(0x7f0000000080)={0x4, 0x0, 0x1000, 0x200, 0x7fffffff, 0x2, 0x3, 0x0, 0x0, 0x20}) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000002c0)={0x10000, 0x0, &(0x7f0000ffc000/0x3000)=nil}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000003c0)='\x00', &(0x7f0000000100)='security.capability\xf6', &(0x7f0000000440)='/dev/full\x00'], &(0x7f0000000200)) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x80044dff, &(0x7f0000000180)) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000040)=0xf8) 03:05:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x15, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@initdev, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) 03:05:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x22b) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="00007a31fff3843a2cff8f970f31a5261c68598c957698418ce7ea63658c3c4d"], 0x20) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfa, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r3, 0xae9a) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:05:31 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x2001, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000040)={0x3}) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) 03:05:31 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) umount2(&(0x7f0000000ac0)='./file0\x00', 0x2) dup2(r0, r0) 03:05:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) fsync(r0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) connect$caif(r1, &(0x7f0000000040), 0x18) 03:05:31 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) waitid(0x0, r1, 0x0, 0x5, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x2, 0x1ffffffffffffe, 0x0, 0x0}, 0x2c) 03:05:31 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x2000000000000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0xfffffffffffffd91, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000, 0x0, 0x1000, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x339, 0x0, 0x0, 0x0, 0x2000000002, 0x0, 0x0, 0x2cb3, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x80, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000bc0)=""/176, 0xb0}], 0x1) r3 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="5c195772864583bec847f2c6fb876dac7e566b1240169fe75e19f3fc3ecae3f4d24c5cf12e9b8c187a8d95bb0a3f9b6a854e49962e2c31a155edbca2a6cc8de47272781bafbaa0a4dd1a584e8ab21484ffafdd2477a0a24f278460cb71730afbfc2c61b14daf98d5dffbd0472992adff47437cd3d82b1e2eec3247b103432f7c955b4081b7e1c3b2a0871a413f9184fa21", 0x91, 0xffffffffffffffff) keyctl$invalidate(0x15, r3) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000006c0)=""/23) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x600001, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$dmmidi(&(0x7f0000000a80)='/dev/dmmidi#\x00', 0xffffffffbfffffff, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000280)={0x7d, 0x6}) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='em0mime_typecpuset\x00'}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() ioctl$EVIOCGEFFECTS(r4, 0x80044584, &(0x7f00000003c0)=""/126) io_setup(0x5, &(0x7f0000000580)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000ac0)) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000380)) io_destroy(r5) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000005c0)={'ifb0\x00', 0x1ff}) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)=""/196, 0x2b7) get_mempolicy(&(0x7f0000000a00), &(0x7f0000000a40), 0x9, &(0x7f0000ffe000/0x2000)=nil, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x20000000200100, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=0x10) 03:05:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000100)) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000540)={0x7, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x1, 0x200000) getsockopt$inet_dccp_buf(r1, 0x21, 0x8d, &(0x7f0000000380)=""/202, &(0x7f0000000180)=0xca) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)={0x0, 0x0, [0xb63, 0x1]}) r2 = socket(0x3, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'raw\x00'}, &(0x7f0000000240)=0x54) 03:05:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="18", 0x1}], 0x1}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) write$FUSE_OPEN(r2, &(0x7f0000000140)={0x20, 0x0, 0x4, {0x0, 0x3}}, 0x20) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f454c46f00001a6030000000000000003003e0001000000810100000000000040000000000000009f0000000000000000040000090038000100ba05010006000200000001000000b100000000000000090000000000000003000000000000000700000000000000fa090000000000001f000000000000000300007002000000020000000000000000000000000000000008000000000000ffffff7f0000000001010000000000000600000000000000dee3311041dc176d2c6974a97430134c65c21bcbba51a5eaae"], 0xc9) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='vegas\x00', 0x6) sendto(r1, &(0x7f0000000340)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f", 0x68, 0x0, 0x0, 0x0) 03:05:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000002680)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000024c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000001340)=0x400, 0x0) clone(0x7ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getgid() process_vm_readv(0x0, &(0x7f0000002440)=[{&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/44, 0x2c}, {&(0x7f0000001240)=""/7, 0x7}, {&(0x7f0000001280)=""/191, 0xbf}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/45, 0x2d}], 0x7, &(0x7f0000002640)=[{&(0x7f0000002500)=""/172, 0xac}], 0x1, 0x0) r3 = getpid() exit_group(0x0) migrate_pages(r3, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f0000014f88)={0x1, 0x228, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) modify_ldt$write(0x1, &(0x7f00000025c0)={0x5f, 0x20001000, 0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x10) syz_open_dev$amidi(&(0x7f0000000d80)='/dev/amidi#\x00', 0x0, 0x22240) syz_open_dev$dspn(&(0x7f0000000800)='/dev/dsp#\x00', 0x9, 0x208082) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) [ 235.896263] kvm: emulating exchange as write 03:05:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000200)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) keyctl$assume_authority(0x10, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r2 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000340)="760b30a9830e4348e7cb3b644db141a0462ca307875f17a84fa96b93f179b0452c5470d04467d9471cafe3234ca37ba05a9621813dfb98c455c8dd5512f0170185edfe710ac26b0b9628e7a691020fe19b0050200292c668f51d6841aeaf6e78c1e273bcde4e58f82d13a78525d9af63693fa0019fed2dd9e0bb3124bfba854c207869831310d857c72ecb233d3a6ba0deb23a074e873f30a1c4894e00710662741c9c36cb03bafeeb6867149c6cc01187cab0e63a1f", 0xb6, 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x1c0000) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1) getdents(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001640)=ANY=[], 0xf5aab446) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x101, @remote}}, 0x0, 0x3, 0x0, "b93d3f2dbc1c14714450fd4544242288902120ecac7b6189637baa4fb15381dd58612e1831329007738b7846d56c787f5596c4287744b76e60f2a4468032e27e5d542c8cef17142ce543257cde0dcbde"}, 0xd8) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000000300)=0x5, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)=0x42) 03:05:32 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x2000000000000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0xfffffffffffffd91, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000, 0x0, 0x1000, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x339, 0x0, 0x0, 0x0, 0x2000000002, 0x0, 0x0, 0x2cb3, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x80, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000bc0)=""/176, 0xb0}], 0x1) r3 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="5c195772864583bec847f2c6fb876dac7e566b1240169fe75e19f3fc3ecae3f4d24c5cf12e9b8c187a8d95bb0a3f9b6a854e49962e2c31a155edbca2a6cc8de47272781bafbaa0a4dd1a584e8ab21484ffafdd2477a0a24f278460cb71730afbfc2c61b14daf98d5dffbd0472992adff47437cd3d82b1e2eec3247b103432f7c955b4081b7e1c3b2a0871a413f9184fa21", 0x91, 0xffffffffffffffff) keyctl$invalidate(0x15, r3) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000006c0)=""/23) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x600001, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$dmmidi(&(0x7f0000000a80)='/dev/dmmidi#\x00', 0xffffffffbfffffff, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000280)={0x7d, 0x6}) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='em0mime_typecpuset\x00'}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() ioctl$EVIOCGEFFECTS(r4, 0x80044584, &(0x7f00000003c0)=""/126) io_setup(0x5, &(0x7f0000000580)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000ac0)) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000380)) io_destroy(r5) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000005c0)={'ifb0\x00', 0x1ff}) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)=""/196, 0x2b7) get_mempolicy(&(0x7f0000000a00), &(0x7f0000000a40), 0x9, &(0x7f0000ffe000/0x2000)=nil, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x20000000200100, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=0x10) 03:05:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x2, 0x2, 'client0\x00', 0xffffffff80000006, "3e7c88fa55d744f7", "4062a466751cd6badb49019a7b9642fe161e14111e805b44169cf19b2df0d3c5", 0x9, 0x8000}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000180)=[@rights={0x10}], 0x10}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'netdevsim0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 236.481624] Unknown ioctl -2147199442 03:05:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getpeername(r0, &(0x7f0000004080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004100)=0x80) recvmsg(r0, &(0x7f0000004980)={&(0x7f00000044c0)=@xdp, 0x80, &(0x7f0000004900)=[{&(0x7f0000004540)=""/237, 0xed}, {&(0x7f0000004640)=""/33, 0x21}, {&(0x7f0000004680)=""/15, 0xf}, {&(0x7f00000046c0)=""/35, 0x23}, {&(0x7f0000004700)=""/213, 0xd5}, {&(0x7f0000004800)=""/241, 0xf1}], 0x6}, 0x10000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006180)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000061c0)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006240)=0x14) recvmsg(r0, &(0x7f0000006500)={&(0x7f0000006280)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000006480)=[{&(0x7f0000006300)=""/165, 0xa5}, {&(0x7f00000063c0)=""/127, 0x7f}, {&(0x7f0000006440)=""/1, 0x1}], 0x3, &(0x7f00000064c0)=""/50, 0x32}, 0x40000000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004a00)={'te\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbb\x02\x00', r1}) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000180)=@ll={0x11, 0x4305, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x1, 0x0) 03:05:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2042, 0x0) 03:05:32 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000600)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000b7000000970263acc365243f3c873e447ed5ff9a1579fa35169972a5dd94f1a52f87b7851fc7c1076f2703fa596f4b15726ab2ddb911e5955dad5bb6c6a64b9561f5d5afbebd9976f91b9b63abf8113ab51db45bcdb9da21f4bb3ab27a19bbf343afb6944479bd0879159e4bbedfed6b7ca1bed04117dadf0aad6ffc7c50e46913abbb4e2e994f2f000dc1064fb77b01d7c435e44106878f7e3c5a81996a56bef96e60d490c5b10e05224795e7a6cc13e2933d66899fcb153f2739"], &(0x7f0000000000)=0xdb) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)}}, 0xfffffe78) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x4, 0x4, 0x0, 0x80000000, 0x6, 0x244c, 0x7ff, 0x2, 0x0}, &(0x7f0000000800)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000840)={r2, @in={{0x2, 0x4e20, @multicast2}}, 0x611c, 0x9, 0x800, 0xb9f, 0x8}, 0x98) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x3d, 0x7}, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000480)=0xf81d, 0x2) r3 = getpid() r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20a00, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000200)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000300)={{0x4, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x1, 0x20, 0x0, r3, 0x2, 0x2, 'syz1\x00', &(0x7f0000000180)=['uservboxnet0nodev[lo\x00', 'trustedem1cpuset\x00'], 0x26, [], [0x7, 0x0, 0x81]}) sendmsg$nl_generic(r4, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001000020027bd7000fcdbdf250000000018002e66c83990101aa46673beae4e0d02e003ad8e1cba00"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x40810) socketpair(0x11, 0x2, 0x0, &(0x7f0000000040)) getsockname$packet(r0, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003140)=0x14) sendmmsg(r0, &(0x7f0000003940)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000003000)="c7aa2237a210354be4ab3be13e01c24a69feea3129c643c1a4e8d47a6999321dd3db7b8e7774eca6e648a3e799e84afc3421b4b01c20023c0f79a790fd5b397f38a9513372350515272db86913a1082aa0f46e2a91944db56fea4abcd36218acd4", 0x61}], 0x1}, 0x7}], 0x1, 0x40) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000500)={0x40000, 0x0, [0x1ff, 0x400, 0x7ff, 0xc1, 0x7, 0x2da, 0xffffffffffff7fff, 0x8cf2]}) 03:05:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r1, 0x0, 0x2}, 0x14) userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$TIOCSSOFTCAR(r1, 0x40096101, &(0x7f0000000040)) 03:05:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x10800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x1008031, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000140)=0x44) 03:05:32 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000300)={0x6, 0xc5, "ffea23940679685d01f84dd4d287587f450d2d016a42a363e4e2e039b8696634b7856fd529e932dec5beafe43e2d6548911f72d8a68fea0b1e248f1b9fe180a4bab008551f907ec21c7dc30e22673761a6b3dca98834a5e6855bf81c78d5e6b870141f664022481e2d5e0e533844531926ecd61e0568e06a3bf1dc8f7f13052d3d817ec392fc16891a113e2948617f70dd720c8c381ab7708f88e079bf9592212a87a8240f1884641262e7edab7100e7ba2604f17d55fc5ba66d9c08580b91901803717e94"}) r1 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0xffffffff8cb62742, 0x109000) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) bind$alg(r1, &(0x7f00000005c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000200)=0xfffffffffffffef1, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56ea54c7bef8915d564c90c24000000000000000000000", 0x18) sendto$unix(r2, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x1bf) ioctl$void(r1, 0x5451) recvfrom$unix(r2, &(0x7f0000000080)=""/217, 0xd9, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f00000001c0)=0x10000) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x6, 0x0) getgid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) syz_open_procfs(0x0, 0x0) recvfrom(r2, &(0x7f0000002240)=""/4096, 0xffffffffffffffff, 0x0, 0x0, 0x573e8c0d4c32d852) [ 236.743331] QAT: Invalid ioctl [ 236.755102] QAT: Device 0 not found [ 236.772792] QAT: Invalid ioctl [ 236.785047] QAT: Device 0 not found 03:05:32 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x135) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x800000000000002c}]}, 0x69) 03:05:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6(0xa, 0x80001, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0xe}, 0x1c) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x102) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000240)={0x80000001}, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000007d80)={'filter\x00', 0x2f, "d81c8a87541239e105e45fc7274abb45090551b37b138198834d5f44073071ff2547111db59e81a219bbf4da97ed50"}, &(0x7f0000003f40)=0x53) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x4) recvmmsg(r3, &(0x7f0000007900)=[{{&(0x7f0000000440)=@tipc=@name, 0x80, &(0x7f0000000940)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000540)=""/71, 0x47}, {&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000680)=""/56, 0x38}, {&(0x7f00000006c0)=""/80, 0x50}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/2, 0x2}, {&(0x7f0000000880)=""/164, 0xa4}], 0x9, &(0x7f0000000e00)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000000a00)=@rc, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000a80)=""/26, 0x1a}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x2, &(0x7f0000002e00)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000000b00)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000000b80)=""/61, 0x3d}, {&(0x7f0000000bc0)=""/21, 0x15}, {&(0x7f0000000c00)=""/181, 0xb5}, {&(0x7f0000000cc0)=""/149, 0x95}, {&(0x7f0000003e00)=""/175, 0xaf}, {&(0x7f0000003ec0)=""/54, 0x36}, {&(0x7f0000003f00)}, {&(0x7f0000003f40)}], 0x8, &(0x7f0000004000)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000005000)=""/65, 0x41}, {&(0x7f0000005080)=""/222, 0xde}, {&(0x7f0000005180)=""/17, 0x11}, {&(0x7f00000051c0)=""/7, 0x7}, {&(0x7f0000005200)=""/129, 0x81}, {&(0x7f00000052c0)=""/79, 0x4f}, {&(0x7f0000005340)=""/163, 0xa3}], 0x7, &(0x7f0000005480)=""/5, 0x5}, 0x6}, {{&(0x7f00000054c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000006840)=[{&(0x7f0000005540)=""/58, 0x3a}, {&(0x7f0000005580)=""/4096, 0x1000}, {&(0x7f0000006580)}, {&(0x7f00000065c0)=""/200, 0xc8}, {&(0x7f00000066c0)=""/104, 0x68}, {&(0x7f0000006740)=""/208, 0xd0}], 0x6, &(0x7f00000068c0)=""/96, 0x60}, 0x8}, {{&(0x7f0000006940)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000006d40)=[{&(0x7f00000069c0)=""/68, 0x44}, {&(0x7f0000006a40)=""/101, 0x65}, {&(0x7f0000006ac0)=""/154, 0x9a}, {&(0x7f0000006b80)=""/212, 0xd4}, {&(0x7f0000006c80)=""/126, 0x7e}, {&(0x7f0000006d00)=""/29, 0x1d}], 0x6}, 0xffffffff00000000}, {{&(0x7f0000006dc0)=@sco, 0x80, &(0x7f0000007340)=[{&(0x7f0000006e40)=""/42, 0x2a}, {&(0x7f0000006e80)=""/46, 0x2e}, {&(0x7f0000006ec0)=""/146, 0x92}, {&(0x7f0000006f80)=""/128, 0x80}, {&(0x7f0000007000)=""/248, 0xf8}, {&(0x7f0000007100)=""/67, 0x43}, {&(0x7f0000007180)=""/154, 0x9a}, {&(0x7f0000007240)=""/111, 0x6f}, {&(0x7f00000072c0)=""/71, 0x47}], 0x9, &(0x7f0000007400)=""/27, 0x1b}, 0x2}, {{0x0, 0x0, &(0x7f0000007880)=[{&(0x7f0000007440)=""/65, 0x41}, {&(0x7f00000074c0)=""/140, 0x8c}, {&(0x7f0000007580)=""/28, 0x1c}, {&(0x7f00000075c0)=""/200, 0xc8}, {&(0x7f00000076c0)=""/157, 0x9d}, {&(0x7f0000007780)=""/239, 0xef}], 0x6}, 0xdf47}], 0x8, 0x40000002, &(0x7f0000007b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000007b40)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000007c40)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000007c80)={{{@in=@local, @in=@multicast1, 0x4e21, 0x8, 0x4e20, 0x1, 0x2, 0x20, 0x80, 0x3c, r4, r5}, {0x400, 0x8, 0x0, 0x8, 0x7ff, 0x9f, 0x800, 0xd62d}, {0x0, 0xd061, 0x7ff, 0x401}, 0xfff, 0x6e6bbf, 0x2, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d6, 0x7c}, 0xa, @in=@local, 0x3500, 0x0, 0x1, 0xff, 0x400, 0x9507, 0x3}}, 0xe8) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000003f00)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000200)={r6, 0xc1fe, 0x8}, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000d80)={'vcan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000dc0)=r7) getsockopt$inet6_int(r1, 0x29, 0x10000000000010, &(0x7f0000534000), &(0x7f0000000040)=0x4) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xf5, 0x2702) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r6, &(0x7f0000000300)=0x4) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000340)={r6, @in={{0x2, 0x4e20, @empty}}}, 0x84) 03:05:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) close(r0) close(r0) 03:05:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0xbc, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x81, 0x1, 0x8, 0x0, 0x4, 0x100, 0x1, 0x0, 0x8, 0x5, 0x3, 0x401, 0x80, 0x0, 0x2, 0xddae, 0x8, 0xc3, 0x8, 0x9, 0x9c5d, 0xc68, 0xf6, 0x9, 0x8000, 0x5, 0x136a, 0x0, 0x1000, 0x5, 0x200, 0x401, 0xe0, 0x200, 0x47, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x400, 0xb4, 0x3f, 0x7, 0x4, 0xffff, 0x1ff}, 0x0, 0xb, r0, 0x3) 03:05:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) close(r0) close(r0) 03:05:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000600)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x54, r3, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2cc9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000080}, 0x8000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000a00)=ANY=[@ANYBLOB="18020000", @ANYRES16=r4, @ANYBLOB="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"], 0x218}, 0x1, 0x0, 0x0, 0x10}, 0x4000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x2, 0x0, 'queue1\x00', 0x7}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0xfffffffffffffeb7, 0xfa00, {0x4, 0x0, 0x4, 0x3}}, 0x3d4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, 0x0, 0x0) 03:05:33 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000780)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60x0}, &(0x7f0000000800)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000840)={r2, @in={{0x2, 0x4e20, @multicast2}}, 0x611c, 0x9, 0x800, 0xb9f, 0x8}, 0x98) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x3d, 0x7}, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000480)=0xf81d, 0x2) r3 = getpid() r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20a00, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000200)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000300)={{0x4, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x1, 0x20, 0x0, r3, 0x2, 0x2, 'syz1\x00', &(0x7f0000000180)=['uservboxnet0nodev[lo\x00', 'trustedem1cpuset\x00'], 0x26, [], [0x7, 0x0, 0x81]}) sendmsg$nl_generic(r4, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001000020027bd7000fcdbdf250000000018002e66c83990101aa46673beae4e0d02e003ad8e1cba00"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x40810) socketpair(0x11, 0x2, 0x0, &(0x7f0000000040)) getsockname$packet(r0, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003140)=0x14) sendmmsg(r0, &(0x7f0000003940)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000003000)="c7aa2237a210354be4ab3be13e01c24a69feea3129c643c1a4e8d47a6999321dd3db7b8e7774eca6e648a3e799e84afc3421b4b01c20023c0f79a790fd5b397f38a9513372350515272db86913a1082aa0f46e2a91944db56fea4abcd36218acd4", 0x61}], 0x1}, 0x7}], 0x1, 0x40) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000500)={0x40000, 0x0, [0x1ff, 0x400, 0x7ff, 0xc1, 0x7, 0x2da, 0xffffffffffff7fff, 0x8cf2]}) 03:05:33 executing program 3: mkdir(&(0x7f0000004080)='./file0\x00', 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x2040, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x400200, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0xd86e4573564d025d, 0xffffffffffffff9c) r0 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000280), 0x800) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@nfc, &(0x7f0000000000)=0x80) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100)=0x8, 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300)="f29ddd46d26a99c06da8daf01d53076709424beb008a8a37a9a7ebf8b654c53822dcba83fae0f5ba43a02c0e9e1284e669321ee4a809a917baf836732492c468c74382f6c92c94f47754686ea7d716dd13a619034417c7d60aba4a64b864401413277d13ae60451699188116e48c9ef181bdf8fe69a240dafaef0ad3eb306c63d93efd48b2b4e6dde843f6ff90baec857040fc429cd0b184784446ca407e171a0ba80b5fd94834f7aa35bd6e052c1685d5dfd996c0861e5968f88344280a628a6744ae5af9188977979f7965d71ca81ba87dd2e94f5e764cf3c071c759c0ec028a642fd837cb45f014ed", 0xea) flistxattr(r1, &(0x7f0000000180)=""/53, 0x35) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x0, @loopback, 0xd9a}], 0x1c) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) 03:05:33 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) sync() 03:05:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x440000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020d00002a0000000000000000030000030006000520000002000068e000000100000000000000000800120019000200000000000000000030faff00020300000000000f000000000a000000000005009242b4851fa58f"], 0x57}}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'veth0\x00'}) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000001c0)={0x0, 0x2, 0x700f, 0x1}) 03:05:33 executing program 3: r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xe1c, 0xa00) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000400)=[@in={0x2, 0x4e22, @rand_addr=0x100000000}], 0x10) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.SMACK64EXEC\x00', &(0x7f0000000280)='/dev/media#\x00', 0xc, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000380)=0x1a) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000440)={0x0, 0x81, 0x10}, &(0x7f0000000480)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000004c0)) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mISDNtimer\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) fanotify_init(0x43, 0x80000) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f00000005c0)={0x0, 0x4010, 0x8, 0x101, 0x3, 0x2}) init_module(&(0x7f00000002c0)='/dev/media#\x00', 0xc, &(0x7f0000000300)='\x00') socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x3) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000003c0)=0x5) 03:05:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x7) ioctl$TCFLSH(r1, 0x540b, 0x2) 03:05:33 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6(0xa, 0x803, 0x100000001) getsockopt(r1, 0xff, 0x0, &(0x7f0000000240), &(0x7f0000000000)) 03:05:33 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x18002, 0x0) connect(r0, &(0x7f0000000200)=@generic={0x2, "9f1d5643e89944d2294ef78de0047ed9a8597158a24684d786edafbdd68982bad7bd62db9d02ff4356eb5811ef6ab7ebb1c1bcc5e1a176d66bcb460bb428f8068e7039fa9cb108f607c6e60cf72a786a1d180284d6f04763f383861f23dd4408b93b6cd38d95746056c71c3f9389b96f3193d3fef261344f144ec3e25abd"}, 0x80) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0xfffffffffffffe00, 0x200000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, &(0x7f0000000280)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000300)=0x80, 0x80800) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@local, 0x1a, r2}) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0003030001c000000075a40b62ff9de49a844dc4e011bf14157f288df6b220fbdb24a79d912067008765a9815f659b197fd0a1311caea385c8d0b9f00e042fd75049a1cd5539ccb9cde54459bc5d318a9164384b4ea79b298d8621a8836994252fe6a1906c3d9b3564f1babd69f15f0cf0a6af4ed3019111ff1911c36c9813"], 0x7f, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r3 = socket$inet6(0xa, 0x1, 0x3) getsockopt$inet6_buf(r3, 0x29, 0x4c, &(0x7f0000c86000), &(0x7f0000000000)=0x284ea92c5e2cee3a) 03:05:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fadvise64(r0, 0xfffffff4, 0x3, 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x4000, 0x4) 03:05:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x0, 0x0, 0x0, 0x5}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000140)='smaps_rollup\x00') mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) pread64(r3, &(0x7f00000000c0), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fgetxattr(r2, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000200)={r4, 0x3}, &(0x7f0000000400)=0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0), &(0x7f0000000900)=0x10) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_PIT2(r7, 0x4040ae77, &(0x7f0000000100)={0x0, [0x0, 0x500000000000000]}) dup2(r2, r7) r8 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) 03:05:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x101800) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'hwsim0\x00', 0x400}) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/sockstat6\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) 03:05:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @initdev}, &(0x7f00000004c0)=0xc) sendto$packet(r3, &(0x7f0000000380)="478ea3efbfd048c3f57b094ba0e024c3aa5382403f4cfe167da8e7b64c496c7c9875692eb0691f9dd44c6957c43a4c60aaf79bf6727ac48e76f68adee80117eb4822857a865f93379dafbc585d37facc3207f4eff7ea61e7febce881fee49783a8c4df80803ca7cea2bca90a8ff72cf993", 0x71, 0x0, &(0x7f0000000500)={0x11, 0x1c, r4, 0x1, 0x8, 0x6, @random="094014c14295"}, 0x14) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x220380, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r5, 0xc010641d, &(0x7f00000000c0)={r6, &(0x7f0000000200)=""/170}) prctl$PR_SET_SECUREBITS(0x1c, 0x20) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="07010000", @ANYRES16=r2, @ANYBLOB="0d0200000000000000000f000000240007000c000300000000000000000008000100080000000c0004000000000000000000"], 0x38}}, 0x0) [ 238.142596] bond0: Releasing backup interface bond_slave_1 03:05:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) [ 238.502378] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:05:34 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1100000000000000, 0x1100, 0xaa, 0x80fe}, 0x80, 0x0}, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xff, 0x101840) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="c8000400fcd98dae1a1032c3e022e210fc55175e868dc0ad5b077fc63dfe93cb2ca55fff7db8ab4ab6771b3205bf27dec0403b6dc0c522d47962e52b26867998bd620c0e862052524339d0322ce9527505a3e54abed72855c27e7cf55d3f8e0336012d1a6c6db6f3599899954ec189274626dde6f2d509307b2c4b45f9ec", @ANYRES16=r1, @ANYBLOB="08012abd7000fbdbdf25020000003000020014000100fe8000000000000000000000000000aa0800080003000000080005000008000008000b000200000008000400ff7f00006c00020008000400060000000800080002010000080004000600000008000600fdffffff14000100fe88000000000000000000000000010108000400d0ea0000080005000600000014000100ac1e0001000000000000000000000000080005000200000008000500ffffffff08000600030000000800060001000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x800) sched_setscheduler(0x0, 0x0, 0x0) r2 = gettid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000340)=0x5) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r2) r3 = socket$inet(0x10, 0x3, 0x0) process_vm_readv(r2, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/58, 0x3a}, {&(0x7f0000000500)=""/226, 0xe2}, {&(0x7f0000000200)=""/120, 0x78}, {&(0x7f0000000600)=""/70, 0x46}, {&(0x7f0000000680)=""/163, 0xa3}], 0x5, &(0x7f0000000d40)=[{&(0x7f00000007c0)=""/234, 0xea}, {&(0x7f0000000280)=""/20, 0x14}, {&(0x7f00000008c0)=""/167, 0xa7}, {&(0x7f0000000980)=""/84, 0x54}, {&(0x7f0000000a00)=""/209, 0xd1}, {&(0x7f0000000b00)=""/84, 0x54}, {&(0x7f0000000b80)=""/56, 0x38}, {&(0x7f0000000bc0)=""/178, 0xb2}, {&(0x7f0000000c80)=""/191, 0xbf}], 0x9, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_flags=0x2}) 03:05:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x2, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0xf69e, 0x8000000000000, 0x8, 0x1, 0x0, 0x7fff, 0x10, 0x1, 0x2, 0xffffffff, 0x400, 0x3, 0x80, 0x5, 0x0, 0x7fffffff, 0x7, 0x0, 0x7de, 0x2, 0x7, 0x10001, 0x1, 0x6, 0x100000000, 0x80000000, 0x4, 0x4, 0x8001, 0x5, 0x2de, 0xa793, 0xaf7, 0x7fffffff, 0x3, 0x7, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffff97, 0x1}, 0x1028, 0x8, 0x9700000000000000, 0x4, 0x9e8, 0x40, 0x80000001}, r3, 0x4, r1, 0x2) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) 03:05:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000440)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:pam_console_exec_t:s0\x00', 0x28, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r1, 0x0, 0x3e, &(0x7f0000000200)='.+\\system&[wlan0loproc:posix_acl_accesscgroupbdev\'+#^vboxnet0\x00'}, 0x30) getpgid(r2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) getpgrp(0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000011c0)={0x0, 0x0, 0x2080}) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r3, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r3, &(0x7f0000000080), 0x0) write$UHID_DESTROY(r3, &(0x7f0000000040), 0x4) 03:05:34 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='pagemap\x00') exit(0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x8, 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 03:05:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x0, 0x0, 0x0, 0x5}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000140)='smaps_rollup\x00') mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) pread64(r3, &(0x7f00000000c0), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fgetxattr(r2, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000200)={r4, 0x3}, &(0x7f0000000400)=0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0), &(0x7f0000000900)=0x10) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_PIT2(r7, 0x4040ae77, &(0x7f0000000100)={0x0, [0x0, 0x500000000000000]}) dup2(r2, r7) r8 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) [ 238.860865] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:05:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='.\x00'}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x0, 0x0, 0x0, 0x5}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000140)='smaps_rollup\x00') mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) pread64(r3, &(0x7f00000000c0), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fgetxattr(r2, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000200)={r4, 0x3}, &(0x7f0000000400)=0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0), &(0x7f0000000900)=0x10) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_PIT2(r7, 0x4040ae77, &(0x7f0000000100)={0x0, [0x0, 0x500000000000000]}) dup2(r2, r7) r8 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) 03:05:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) [ 238.936279] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 239.003321] bond0: Releasing backup interface bond_slave_1 03:05:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) [ 239.170662] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:05:35 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, 0x0, 0xfffffffffffffc74) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440), 0x10, 0x0, 0xfffffffffffffd8a, &(0x7f00000008c0)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=0x0, @ANYRESOCT=r1, @ANYBLOB="49a49a1660ee5ad102b5b898bc8c7faf429f410d3f8a3def3b7603c6491ede1aa671200776e1208652199b74f6a6786e9ad16ecbc8d5176c43a98a1c95ee7d18251b4a555fe9c2ad59c26496411b600eff6ce358aad5b3872a527c69471e4992982893cd78e766f0347e74c67db59f72c79d8bf78fd495c5c8f38c9bd970d52198178eebd1ec16797a999e211050a86e09166849e5f7b6c1510d1dfc1b4883a52395fcbef91bc0e9f0e5d663568ca90509dc5e0f77a2fc07c1680d86680edddd0d1e6cb2c89ae4404e5ed4fcf352536d3412940e8a45c86125f004ef9a73a362f0010917e204ee6daa37987c360a", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESDEC=r0, @ANYRESHEX, @ANYBLOB="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", @ANYRESOCT], @ANYRESHEX=r0, @ANYRES64=r1, @ANYRESHEX=r0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR, @ANYRES32=r0, @ANYRES16=r0, @ANYPTR, @ANYPTR64], @ANYBLOB="f6ce25d410a76c7383e36e3ce1df30e32f0b2f528c8f60d4dd1157c5b30dd36b162373f9a4070c43bbece65b512ff7d0b39d460816fa9834ad9f83c95f71588a88db8f2e66a4c7e8dd0a52f2ef8f4182b8597ba1c1e11710eec6d008469e696eb33182dabfd24d363c2cd11acd2077389455ac130c95", @ANYRES64=0x0, @ANYRES32], @ANYBLOB="7a6efd19ec60fe7a257be929fed58310043e3ef002c5f36811d71ed98871d6066c0b39475471e3be4dc62611715cdbf22962527d2241fd44be5c96a068ee15a68813de3320928a5154faab9ab4c2a6e22a8bdb5a8c670f774af07f1dd71670", @ANYRES16=0x0, @ANYPTR64, @ANYRESDEC=r0, @ANYRESOCT=r0], 0x1cf}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000ac0)='/dev/dmmidi#\x00', 0x2, 0x400400) accept4$inet6(r2, &(0x7f0000000b00)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000b40)=0x1c, 0x800) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x40, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)={0x84, r4, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffff7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6c}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x90}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000015c0)='ns/pid\x00') syz_open_dev$binder(&(0x7f0000001500)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r6 = dup2(r5, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r6, 0xc0845658, &(0x7f0000000340)={0x0, @reserved}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[0x0, &(0x7f0000000140)='ppp1proc\x00'], &(0x7f00000003c0)) lstat(0x0, &(0x7f0000001640)) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000001540)=""/23) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000001580)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x24, 0x0, [0x9, 0x4, 0x9, 0x1, 0x20, 0x6, 0x5feb, 0x2, 0xfffffffffffffffa, 0x3, 0xffffffffffffda6c, 0x80, 0x9, 0x8, 0x1, 0xffffffff]}, {0x22, 0x0, [0x3, 0x8, 0x800, 0x5, 0xe456, 0x3, 0x0, 0x3, 0x4, 0x2f40, 0x100000001, 0x24d, 0x400000, 0x1, 0x401, 0x80]}], 0xffffffffffffffff, 0x1, 0x1, 0x90}}, 0x20) setrlimit(0xf, &(0x7f0000000b80)={0x9, 0x2}) [ 239.248759] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:05:35 executing program 4: r0 = socket$inet6(0xa, 0x2020000000000001, 0x3fc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xe200, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x23}, 0x27e2}}, 0x0, 0xfffffffffffffff7, 0x0, "6cdbcbf6729c2531480b0e2b4446fb8f00985ea457f1e5bd47dea56e1b17ba6e0289f36d63eb76aa2c04396b32030adea7a0d1c041548ef74718818c1f1381b73e1d341057f0f214ea5e7789303ac027"}, 0xd8) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', @ifru_settings={0x712000, 0x0, @sync=0x0}}) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 03:05:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:35 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_TIMERSLACK(0x1d, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000002, 0x4000000031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x2800, 0x0) 03:05:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000480)='\xfe\x92\xcbc\x11\xab\xfc\x04\x00\x00\x00\xe0X\x04p0x0}, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r0, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x8, 0x0, 0x991c0, 0x3f}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000180)=0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000000100)=0x80) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x3}) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000280)=""/231) read$eventfd(r1, &(0x7f0000000000), 0x8) 03:05:35 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x142, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') splice(r0, &(0x7f0000000200), r2, &(0x7f00000001c0), 0x3, 0x4) syncfs(r1) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 03:05:36 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x800) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) close(r3) 03:05:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040)="a161d0304454e3d4a1c0f48d3302873e2b3615ffe44a50e3844fe0d68abb5770436a01b6edb067d432b97b8a2a19a7402caddd1c53b2edc3e70d1dd77d2538d1c1dcbd50908dacec74a6405f95e8ffcab8b2d72273ab899fb955d9bbe41a6dcf24575bf88dea88f46339dadfa186f1a49ea8cc1e2a72f10c519b95e42cc7bab7", &(0x7f00000000c0)="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"}}, &(0x7f00009b1ffc)) tkill(r0, 0x1000000000015) 03:05:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TCFLSH(r0, 0x80047456, 0x5) 03:05:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2040, 0x0) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f00000000c0)=0xc5) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8008b) 03:05:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000480)='\xfe\x92\xcbc\x11\xab\xfc\x04\x00\x00\x00\xe0X\x04p0x0}, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r0, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x8, 0x0, 0x991c0, 0x3f}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000180)=0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000000100)=0x80) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x3}) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000280)=""/231) read$eventfd(r1, &(0x7f0000000000), 0x8) 03:05:36 executing program 5: r0 = memfd_create(&(0x7f00000005c0)='W1.S\xca\xb7\xef\xfdN0\x99\xb2\xcd\xa4Q\xff&\xe4\x97\xfd\xdc\xd0\xc6\'\x93\xb2\xfe\x85\xf1q~\xe6S#\x1d\xa8;f\x15\x8a[\xc6\x1a\x90b\x1c\x14\xa3\xecL\x16f!\xf3\xa3\x11q\x1bX\xc8U\xcd\xdf\xd0\xddG\xc7P\x86\xaaOex\xc5A;\xf8\xfbok\xe1\xacb{\xc9\xc5[\xa3j\xdbT\xfd\xa3\xc3\a\xee\xfe', 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x51, r0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x4, 0x80100) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x4, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x1c\x00\x00\x00\x00\x00\x00\x1c\x9e\x00\x02\x00', 0x811}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000280)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000680)={0x2, 0x3, 0x8}) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000740)=0x2) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) socket$can_raw(0x1d, 0x3, 0x1) fremovexattr(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000001c9e0002"]) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000000c0)=0x1) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(r5, &(0x7f0000000040)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340), &(0x7f0000000380)=0x8) sendfile(r2, r5, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x10001) creat(&(0x7f0000000200)='./bus\x00', 0x0) 03:05:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) ioctl$BLKPG(r0, 0x1269, &(0x7f00000002c0)={0x800, 0x7, 0x0, &(0x7f0000000280)}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=""/38, 0x26}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x6940000}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) getsockname$packet(r1, 0x0, &(0x7f0000000280)=0xfffffffffffffe4a) write$binfmt_elf64(r0, &(0x7f0000000e00)={{0x7f, 0x45, 0x4c, 0x46, 0x7ff, 0x8001, 0x7ff, 0x31, 0x8000, 0x3, 0x3e, 0x8, 0x2e4, 0x40, 0x3aa, 0x3f, 0x8, 0x38, 0x2, 0x8000, 0x1ef7, 0x2}, [{0x2, 0x7f, 0xfffffffffffffffd, 0x6a66, 0x1, 0xfff, 0x0, 0x9}, {0x4, 0x3, 0x1, 0xbcb6, 0x6f06, 0x7fffffff, 0x8, 0x6}], "933dc9982bbe2e9b3baa91d624b4fcbee47b4c712945a86fefa58002eae99186d88eea3d7eb6fb7eb4e55fb5215c49b7d99eb3ce0fa68302895691b646bb8a", [[], []]}, 0x2ef) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000080)) geteuid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xe8) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000b80)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000580)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000bc0)={0xb, 0x10, 0xfa00, {&(0x7f0000000ac0), r5, 0xfffffffffffffffd}}, 0x18) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000180)={0x10f004, 0xd000, 0x8, 0xd9}) fsetxattr$system_posix_acl(r2, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02200008", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040005000000000008000700", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000060000000000"], 0x5c, 0x0) sendmsg$xdp(r2, &(0x7f00000005c0)={&(0x7f0000000300)={0x2c, 0x1, r4, 0x23}, 0x10, &(0x7f0000000a40)=[{&(0x7f0000000340)="6949314a289463733c0dee3a0f62d4b0f449a972adc0ff102ad34bdd22330cf2178984c2cd4bea7e0a7f4cb0523a11f0d10c0eb0f3398532654edb517e3bfe2b55ef5fb28ab99b1eb7aa534c899c120b210e4ffbb79cb9c142220f9239ce37614b", 0x61}, {&(0x7f00000003c0)="a036577c602f04aa56b9f157154f9ebf8fef7fe3e151b5259850948bec0e0a93530e732308be5eed088cff703fc056d3e227299617230e9c11d8c3deb474079e4375200d054930c303dff914eed3f239a4ecd3d7b45edede2a2661aa3ab725e0c52903f6fec8f39a1da2f7b82ae63664c0a186d2ea5699120d4b3955efed30462e7a845dfb3208339d2bc507a1f159035ee3acc17088a57d115a240d53a96aa8d98a6c0ab67c", 0xa6}, {&(0x7f0000000480)="ac304f09063e19728ae1138ed2b18fd305220b0406abcc8b637c40d025b9a691d481b35c4e46b43453d21997cb2943c7a79137beba7e9e6e1ec184058e4c073b6147e8b4fb6ac66172135c7710b1305c250237dc51a105053f3f3eed7881a64354451b0efb0048711637c5d45cdaacfc9ee0c85d465dce1cedc5e50b4422fcd3aca4e517e0569af4cff2355f05b205034677d4797c04c3722910a71fded8c39d222b7c5bdc359e7e3c896527f8cfbbf8f027e47b633ec16f14c620ff0504d0dc65d1a23f278394", 0xc7}, {&(0x7f00000007c0)="1228949a0ddb23ef33814ceef1b28bc2374461362acaddd5691692a1a5cedddc779cd977a04d0cac7de22028424d412aa7b3d8089fdb8229aa2e2991ed0bfec8f3a9c2a3873efe4af772ed0fa2820f64e0bcadcb116ab16be0018a0d5159db75a3c92bd9cc7fd235635cfd0958de3f820cd8262ce05f6b91567520c8f3a60508ac18def1cd757fc3b032e646935bc4e64f69664ac19331d6f68186c44ec5045069123955a3da4f465ca592bdce945b944245210c2ce70e8eb1d56bf75108a1202a34e696a138d2d7f9d4", 0xca}, {&(0x7f0000000580)}, {&(0x7f00000008c0)="a9dfb2523ba2155299e3c878bb602cea52c92f711191d4847776eb83d6d5d6b8e9952ca32674e9483d341922cdb1eef8a872b52b9c2070f1bdb14abad6a2b485d3d18782a399da932ff3d71fd018dc21d95b53fd48038dbb8add1e31e41aefeae2c0cc9c7b8046209b50d559cd2f2019de0592b632c63d2d6461540a56170ef5c6bb9c5dc02a36b674dea951d04409e24e3656bfd95ca4065bcd32d03bccde3870d6d15e76f745dad755b501673b8b00f2957da43e3b8478e500dfc8a27e1210bf29443eb87aa5cfcdb77100b81d3dd874221af51ec6b63cdafc2c524fb14144208fccdfe6775c03a3aaec46f2", 0xed}, {&(0x7f00000009c0)="2c0e6f65d3d479464d6b530a666fca2526b881edd1037fbb8cf53f3df45467ec65b991e3ae61a44d2fea84ce7efb9f6ad8cb4ad6b466d6f092727634f5ed0d9c8c466fd9a0c454b2a58391e83fbb76d403ed95b1ff49c556089e07e4afa594eae5d8838c85e911ae0dacf89b92f9288341b833179b", 0x75}], 0x7, 0x0, 0x0, 0x40000}, 0x4008000) 03:05:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4800) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendfile(r1, r0, &(0x7f0000000180), 0x10000011c) 03:05:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) 03:05:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$vnet(r1, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/230, 0xe6, &(0x7f00000001c0)=""/125, 0x1, 0x4}}, 0x68) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xffffff0c, 0x0, 0x0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x400002, 0x0) getpeername$netlink(r3, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000003c0)={0x79, 0x0, [0x0, 0x10000, 0x0, 0xc66]}) [ 240.687532] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 240.718410] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:05:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000140)=ANY=[@ANYBLOB="0f29cc"]) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0xf000, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x8, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4851}, 0x20000800) [ 240.863475] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:05:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x2000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8240, 0x0) syz_open_pts(r0, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000280)={"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"}) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:shadow_t:s0\x00', 0x1da, 0x3) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x582, 0x1) [ 241.098529] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 241.224040] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:05:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x4, 0x40) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000140)={0x7, 0x100000000, 0x5, 'queue0\x00', 0xfc}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x10f, 0x0, &(0x7f00000004c0), 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) pipe2(&(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) r6 = gettid() getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={r6, r7, r8}, 0xc) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f00000000c0)) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) 03:05:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) 03:05:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) 03:05:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) 03:05:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) 03:05:39 executing program 5: r0 = memfd_create(&(0x7f00000005c0)='W1.S\xca\xb7\xef\xfdN0\x99\xb2\xcd\xa4Q\xff&\xe4\x97\xfd\xdc\xd0\xc6\'\x93\xb2\xfe\x85\xf1q~\xe6S#\x1d\xa8;f\x15\x8a[\xc6\x1a\x90b\x1c\x14\xa3\xecL\x16f!\xf3\xa3\x11q\x1bX\xc8U\xcd\xdf\xd0\xddG\xc7P\x86\xaaOex\xc5A;\xf8\xfbok\xe1\xacb{\xc9\xc5[\xa3j\xdbT\xfd\xa3\xc3\a\xee\xfe', 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x51, r0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x4, 0x80100) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x4, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x1c\x00\x00\x00\x00\x00\x00\x1c\x9e\x00\x02\x00', 0x811}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000280)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000680)={0x2, 0x3, 0x8}) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000740)=0x2) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) socket$can_raw(0x1d, 0x3, 0x1) fremovexattr(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000001c9e0002"]) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000000c0)=0x1) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000000)) write$P9_RSETATTR(r5, &(0x7f0000000040)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340), &(0x7f0000000380)=0x8) sendfile(r2, r5, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x10001) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 243.245926] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 243.256567] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 243.282525] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 243.415134] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:05:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) 03:05:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) [ 243.543340] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:05:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@ipv6_getaddr={0x17, 0x16, 0x21, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0xa, @loopback}]}, 0x2c}}, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4400) 03:05:39 executing program 1: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x482002, 0x0) mremap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc5a2, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x0, {0x17, 0x36, 0xc, 0x11, 0x2, 0x5, 0x2, 0x17, 0x1}}) remap_file_pages(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x8, 0x0, 0x0) 03:05:39 executing program 2: socket$packet(0x11, 0x0, 0x300) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) readahead(r1, 0xdc75, 0xffffffffffff705b) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f00000000c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) 03:05:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) 03:05:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) [ 243.892546] mmap: syz-executor1 (8855) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 03:05:39 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x800) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x19, &(0x7f0000000040), 0x4) 03:05:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) prctl$PR_SET_FPEXC(0xc, 0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@rand_addr, 0x0, 0x0, 0xfb}, 0x20) 03:05:40 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) socketpair$unix(0x1, 0x10000000001, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={[], 0x400, 0x0, 0x0, 0x0, 0x1, r1}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) socketpair(0x0, 0x7, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f45594600b300000000403d5266aa0700000057030000000000000000"], 0x28) 03:05:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xa00, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffa8) ioctl$TCFLSH(r0, 0x5411, 0x709000) 03:05:40 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:40 executing program 3: r0 = creat(0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="9fc2"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) readv(r2, &(0x7f0000000580)=[{&(0x7f0000000200)=""/191, 0xbf}, {&(0x7f0000000300)=""/186, 0xba}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/142, 0x8e}, {&(0x7f0000000480)=""/248, 0xf8}, {&(0x7f0000000080)=""/24, 0x18}], 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:05:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='em1$\x00'}, 0xfffffffffffffffa) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:05:40 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x3, 0x7, 0x4}}, 0x30) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="200000e4330100", @ANYRES16=r2, @ANYBLOB="01070000000000000000130000000c00090008000200fffffff0"], 0x3}}, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x10001, @empty, 0x8000}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e21, 0x3d52, @rand_addr="75f8701303bda9d353d81893e393977e"}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e22, 0xfff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x9}, @in={0x2, 0x4e20, @rand_addr=0x5}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x90}], 0xc0) 03:05:40 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f00000000c0)="7b382d5ac9db76eeffa76f31fd29b7c6d7498740877a1a2584a0ba64fa62f4de2392f4a9a19e676953452de4075527d8fdc21202ee88fc40699e1ed951ad610eeb9026e35379cc6b5e90d2f7b1f6bd95ed35f2fb02facaad8ecfd1834b325dbb77ae7e3d0432db9dc4e0920b7441626882cf1b7be2eb752268abfb26685a9ca2910ea2f49f1a3bcdb35fbc195f", 0x8d, 0x4000, 0x0, 0x0) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:40 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f00000000c0)) ptrace(0x10, r0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ptrace$poke(0x5, r0, &(0x7f0000000000), 0x0) setpgid(r0, r0) 03:05:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) fcntl$setstatus(r2, 0x4, 0x2000) syz_open_procfs(0x0, &(0x7f0000000280)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00') setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0xa82, 0x4) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) 03:05:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:41 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x2e, &(0x7f0000001a40)=ANY=[@ANYBLOB="2b9e342f791173af428e82d606cd13fa6abbadc38355acd9b3d10303b80b4a5be8fb886a99b13bc789fb99e5472056eda5043d53a1044e147cd9289e8d7e59ce051528216bab4c3cc6c56fe90ebb782f410cc0a5b4b5e2dc4568ec242ca4d1cebe195e85fe548d1a5a30629b80e6841e08186f2da3c669aa0ea08bc7bf67738c76d9e1f59a00320a346df5619c4f4cf29216ad76bf9c83b99fc61d4c9985c7d35abcf4e7b295207c41bd3beb5929b3f9251558fcac118352fff5bf37cfbac1f1c7200ffed4ff31a708ad5a85c4ef3dd8f20000cfbcc230a4bcbd83e3838a71c2d099f2846583f3dc8c565509e3a1f58e29b080da72e02f9c3b1cac3839e325fe7027d8f5920e84993f94bd23e30364882d4add99ae784f0b3411e31ecfe0b6f0a2a00abc875706a4cd8f9a509db1e14d5a1db6109fe6efdd384f4ed4ad8b62b8ca76a4b8056fb5ce59ba8b8619d4429baf9520ae088a1a1167638a9a36f09c20deba94cabcfa15ff435dcf45c3ea9021"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x3, 0x19) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) openat$cgroup_subtree(r2, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000440)=""/67) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in=@dev, @in=@multicast2}}, {{@in=@broadcast}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f00000019c0)={@remote, 0x0}, &(0x7f0000001a00)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x1, 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x0, 0xb, 0x0, 0x0, 0x1000000000000000, 0xffffffffffffffff, [], r6}, 0x48) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-control\x00', 0xa00, 0x0) getpeername$packet(r7, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/24, &(0x7f0000001840)=0x18) 03:05:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc008561c, &(0x7f00000003c0)={0x980902, 0x210}) 03:05:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:41 executing program 3: r0 = creat(0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="9fc2"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000f80)=""/90, 0x5a}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) readv(r2, &(0x7f0000000580)=[{&(0x7f0000000200)=""/191, 0xbf}, {&(0x7f0000000300)=""/186, 0xba}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/142, 0x8e}, {&(0x7f0000000480)=""/248, 0xf8}, {&(0x7f0000000080)=""/24, 0x18}], 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:05:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x880, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001580)=""/124) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002380)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r1, 0x0, 0xfffffffffffffffc) accept4$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002900)=0xfffffea3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={&(0x7f0000001540), 0xffffff43, &(0x7f0000002ac0)={&(0x7f0000001600)=ANY=[@ANYBLOB="7c6893ca999ad2f2dfcb5c1f913535344e2823a58a363af0197f340d812f4a39020a62c0089a6b9dbb85d617b8494bac6538c0991587a27bdb5e8237553e86fb7975ac054adcc5b87562556af670faec0d9a5869bf71c85cf0d5df1d47b5807c0590c6873e808b6188ece8a452e9738008edc58fe042"], 0x1}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r4) sendmsg$rds(r5, &(0x7f0000001c00)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) 03:05:41 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) chdir(&(0x7f00000000c0)='./file0\x00') chdir(&(0x7f0000000080)='.\x00') sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00d175040f62b04a2b546fc54c1960b89c40ebb373585806dbb7d553b4a400000000000000000000000000000000000000", 0x39}], 0x1}, 0x0) [ 245.935890] kasan: CONFIG_KASAN_INLINE enabled [ 245.940702] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 245.948289] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 245.954546] CPU: 0 PID: 8954 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #22 [ 245.961679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.964412] kobject: 'loop2' (000000001083db1d): kobject_uevent_env [ 245.971142] RIP: 0010:__smc_diag_dump.isra.0+0x32a/0x2ba0 [ 245.971170] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 26 25 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 7f 20 49 8d 7f 0e 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 d2 [ 246.001958] RSP: 0018:ffff888050b8f120 EFLAGS: 00010203 [ 246.007315] RAX: dffffc0000000000 RBX: ffff8880964ea940 RCX: ffffc9000de4b000 [ 246.014574] RDX: 0000000000000001 RSI: ffffffff87b6cca2 RDI: 000000000000000e [ 246.021835] RBP: ffff888050b8f3e8 R08: ffff88808ef7a3c0 R09: ffff88804ecc15b4 [ 246.029093] R10: ffffed1009d982ac R11: ffff88804ecc1563 R12: ffff8880a4151060 [ 246.036351] R13: ffff88804ecc1564 R14: ffff8880964eada0 R15: 0000000000000000 [ 246.043616] FS: 00007f1dd96d6700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 246.051835] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 246.057720] CR2: 000000000073c000 CR3: 000000009e3d5000 CR4: 00000000001426f0 [ 246.064983] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 246.072239] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 246.079518] Call Trace: [ 246.082167] ? __kmalloc_reserve.isra.0+0x40/0xe0 [ 246.087072] ? netlink_dump+0x7c5/0x1070 [ 246.091148] ? smc_diag_handler_dump+0x350/0x350 [ 246.095958] ? ___sys_sendmsg+0x7ec/0x910 [ 246.100117] ? __sys_sendmsg+0x112/0x270 [ 246.104186] ? __x64_sys_sendmsg+0x78/0xb0 [ 246.108458] ? do_syscall_64+0x110/0x800 [ 246.112536] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.117928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.123468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.129033] ? check_preemption_disabled+0x48/0x290 [ 246.134090] ? __lock_is_held+0xb6/0x140 [ 246.138187] ? __kmalloc_node_track_caller+0x3d/0x70 [ 246.143293] ? lock_acquire+0x1db/0x570 [ 246.147264] ? smc_diag_dump_proto.isra.0+0xfb/0x3c0 [ 246.152384] ? lock_release+0xc40/0xc40 [ 246.156419] ? kasan_kmalloc+0x9/0x10 [ 246.160229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.165799] ? kasan_check_write+0x14/0x20 [ 246.170034] smc_diag_dump_proto.isra.0+0x2e7/0x3c0 [ 246.175049] ? __smc_diag_dump.isra.0+0x2ba0/0x2ba0 [ 246.180078] ? find_held_lock+0x35/0x120 [ 246.184165] smc_diag_dump+0x27/0x80 [ 246.187875] netlink_dump+0x5f2/0x1070 [ 246.191790] ? netlink_broadcast+0x50/0x50 [ 246.196027] __netlink_dump_start+0x5b4/0x7e0 [ 246.200554] smc_diag_handler_dump+0x2a7/0x350 [ 246.205134] ? smc_gid_be16_convert+0x2c0/0x2c0 [ 246.209820] ? lock_downgrade+0x910/0x910 [ 246.213976] ? smc_diag_dump_proto.isra.0+0x3c0/0x3c0 [ 246.219184] ? rcu_read_unlock_special+0x380/0x380 [ 246.224147] sock_diag_rcv_msg+0x322/0x410 [ 246.228383] netlink_rcv_skb+0x17d/0x410 [ 246.232444] ? sock_diag_bind+0x80/0x80 [ 246.236418] ? netlink_ack+0xba0/0xba0 [ 246.240309] sock_diag_rcv+0x2b/0x40 [ 246.244015] netlink_unicast+0x574/0x770 [ 246.248071] ? netlink_attachskb+0x980/0x980 [ 246.252467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.257995] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 246.263003] netlink_sendmsg+0xa05/0xf90 [ 246.267054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.272583] ? netlink_unicast+0x770/0x770 [ 246.276850] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 246.281721] ? apparmor_socket_sendmsg+0x2a/0x30 [ 246.286496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.292044] ? security_socket_sendmsg+0x93/0xc0 [ 246.296797] ? netlink_unicast+0x770/0x770 [ 246.301044] sock_sendmsg+0xdd/0x130 [ 246.304785] ___sys_sendmsg+0x7ec/0x910 [ 246.308787] ? copy_msghdr_from_user+0x570/0x570 [ 246.313674] ? iterate_fd+0x4b0/0x4b0 [ 246.317553] ? __might_fault+0x12b/0x1e0 [ 246.321609] ? find_held_lock+0x35/0x120 [ 246.325668] ? __might_fault+0x12b/0x1e0 [ 246.329774] ? __fget_light+0x2db/0x420 [ 246.333741] ? fget_raw+0x20/0x20 [ 246.337186] ? lock_release+0xc40/0xc40 [ 246.341206] ? trace_hardirqs_off_caller+0x300/0x300 [ 246.346313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.351849] ? __fdget+0x1b/0x20 [ 246.355207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.360756] ? sockfd_lookup_light+0xc2/0x160 [ 246.365267] __sys_sendmsg+0x112/0x270 [ 246.369153] ? __ia32_sys_shutdown+0x80/0x80 [ 246.373564] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.378921] ? trace_hardirqs_off_caller+0x300/0x300 [ 246.384027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 246.388795] __x64_sys_sendmsg+0x78/0xb0 [ 246.392859] do_syscall_64+0x1a3/0x800 [ 246.396748] ? syscall_return_slowpath+0x5f0/0x5f0 [ 246.401680] ? prepare_exit_to_usermode+0x232/0x3b0 [ 246.406699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.411561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.416745] RIP: 0033:0x457ec9 [ 246.419948] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.438850] RSP: 002b:00007f1dd96d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 246.446563] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 246.453835] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000007 [ 246.461100] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 246.468368] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1dd96d66d4 [ 246.475644] R13: 00000000004c52f9 R14: 00000000004d8d58 R15: 00000000ffffffff [ 246.482924] Modules linked in: [ 246.486217] ---[ end trace d4d4527a058a2ec4 ]--- [ 246.490987] RIP: 0010:__smc_diag_dump.isra.0+0x32a/0x2ba0 [ 246.496553] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 26 25 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 7f 20 49 8d 7f 0e 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 d2 [ 246.506499] kobject: 'loop2' (000000001083db1d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 246.515490] RSP: 0018:ffff888050b8f120 EFLAGS: 00010203 [ 246.515504] RAX: dffffc0000000000 RBX: ffff8880964ea940 RCX: ffffc9000de4b000 [ 246.515512] RDX: 0000000000000001 RSI: ffffffff87b6cca2 RDI: 000000000000000e [ 246.515525] RBP: ffff888050b8f3e8 R08: ffff88808ef7a3c0 R09: ffff88804ecc15b4 [ 246.552263] R10: ffffed1009d982ac R11: ffff88804ecc1563 R12: ffff8880a4151060 [ 246.559567] R13: ffff88804ecc1564 R14: ffff8880964eada0 R15: 0000000000000000 [ 246.566889] FS: 00007f1dd96d6700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 246.575164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 246.581042] CR2: 000000000073c000 CR3: 000000009e3d5000 CR4: 00000000001426f0 [ 246.588331] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 246.595614] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 246.602878] Kernel panic - not syncing: Fatal exception [ 246.609183] Kernel Offset: disabled [ 246.612808] Rebooting in 86400 seconds..