[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 29.091506] kauditd_printk_skb: 8 callbacks suppressed [ 29.091519] audit: type=1800 audit(1544577729.310:29): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 29.125127] audit: type=1800 audit(1544577729.320:30): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.131' (ECDSA) to the list of known hosts. 2018/12/12 01:22:20 fuzzer started 2018/12/12 01:22:22 dialing manager at 10.128.0.26:34565 2018/12/12 01:22:23 syscalls: 1 2018/12/12 01:22:23 code coverage: enabled 2018/12/12 01:22:23 comparison tracing: enabled 2018/12/12 01:22:23 setuid sandbox: enabled 2018/12/12 01:22:23 namespace sandbox: enabled 2018/12/12 01:22:23 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/12 01:22:23 fault injection: enabled 2018/12/12 01:22:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/12 01:22:23 net packet injection: enabled 2018/12/12 01:22:23 net device setup: enabled 01:25:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000240)=0x7, 0x4) recvmmsg(r0, &(0x7f0000002e00), 0x4000000000000ea, 0x22, 0x0) syzkaller login: [ 226.146067] IPVS: ftp: loaded support on port[0] = 21 01:25:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) syz_open_dev$adsp(0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 226.379975] IPVS: ftp: loaded support on port[0] = 21 01:25:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x14400) mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) poll(&(0x7f0000000480), 0x0, 0x0) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6", 0x1c}], 0x1}], 0x1, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000500)={0x4000}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x105001, 0x0) sendmsg$nl_generic(r5, 0x0, 0x4) getegid() dup2(r0, r4) syz_emit_ethernet(0x0, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000040)={0x6e}, 0x8) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000180)=0x6) [ 226.817364] IPVS: ftp: loaded support on port[0] = 21 01:25:27 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r1, &(0x7f0000000400)="b63db85e1e8d020000000000003ef0011dcc6075ed69d2bc7037cebc9bc2feffffffffffffffe26c9b160096aa1fae1a", 0x30) [ 227.348525] IPVS: ftp: loaded support on port[0] = 21 [ 227.595914] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.622778] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.630230] device bridge_slave_0 entered promiscuous mode 01:25:27 executing program 4: syz_open_dev$usbmon(0x0, 0x0, 0x44001) socket$inet6(0xa, 0xf, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20004000, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3f, &(0x7f00000002c0)=0xc4, 0x4) shutdown(r0, 0x1) [ 227.701478] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.728164] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.749230] device bridge_slave_1 entered promiscuous mode [ 227.916499] IPVS: ftp: loaded support on port[0] = 21 [ 227.924645] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.996713] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.010645] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.025058] device bridge_slave_0 entered promiscuous mode [ 228.060247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.152233] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.158710] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.171405] device bridge_slave_1 entered promiscuous mode 01:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x1000) stat(&(0x7f00000003c0)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000466ce656d316e6f246576656d310000000000000000000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f00040000000000000000000000000000000000000000"], 0x90) [ 228.338938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.473564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.510749] IPVS: ftp: loaded support on port[0] = 21 [ 228.571261] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.729584] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.802570] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.816250] ip (6267) used greatest stack depth: 15032 bytes left [ 228.900067] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.031360] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.038461] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.046897] device bridge_slave_0 entered promiscuous mode [ 229.161306] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.181129] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.189246] device bridge_slave_1 entered promiscuous mode [ 229.199158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.212638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.372155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.404078] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.411749] team0: Port device team_slave_0 added [ 229.522610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.597661] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.606189] team0: Port device team_slave_0 added [ 229.631106] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.646654] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.682639] device bridge_slave_0 entered promiscuous mode [ 229.690745] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.701945] team0: Port device team_slave_1 added [ 229.733222] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.742601] team0: Port device team_slave_1 added [ 229.829114] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.836373] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.846898] device bridge_slave_1 entered promiscuous mode [ 229.856165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.892624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.902826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.912607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.926156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.963150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.018339] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.115910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.134391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.155026] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.165420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.187944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.210904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.231250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.252334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.260902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.268836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.302297] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.324449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.342985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.363022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.370518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.390912] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.406508] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.423284] device bridge_slave_0 entered promiscuous mode [ 230.437124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.448727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.462698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.489206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.514516] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.520914] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.537065] device bridge_slave_1 entered promiscuous mode [ 230.551630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.561623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.606433] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.718199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.782414] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.802325] team0: Port device team_slave_0 added [ 230.811875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.852082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.945662] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.953091] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.960462] device bridge_slave_0 entered promiscuous mode [ 230.986388] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 231.007014] team0: Port device team_slave_1 added [ 231.111358] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.132881] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.140269] device bridge_slave_1 entered promiscuous mode [ 231.178087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.195901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.223006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.257826] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.276142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.342248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.349725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.362852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.400178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.416483] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.464228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.471385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.482676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.502027] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.517266] team0: Port device team_slave_0 added [ 231.524413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.533297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.600203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.622763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.630786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.667260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.681915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.694836] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 231.713766] team0: Port device team_slave_1 added [ 231.840187] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.865934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.000838] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.010538] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.017076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.024110] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.030486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.038612] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.053619] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.059986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.066711] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.073113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.117879] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.132589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.141321] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.151147] team0: Port device team_slave_0 added [ 232.180372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.190447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.203630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.210787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.221422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.275961] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.289709] team0: Port device team_slave_1 added [ 232.318408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.343387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.364893] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.375375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.394898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.434705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.467019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.478653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.598429] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.618761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.641401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.747531] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.754980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.765695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.791910] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.801020] team0: Port device team_slave_0 added [ 232.865632] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.887303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.904301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.935599] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.942952] team0: Port device team_slave_1 added [ 233.068713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.108154] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.114587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.121241] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.127679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.138179] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.162741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.192501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.292723] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.314296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.332396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.418676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.450992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.461106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.892759] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.899156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.905890] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.912292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.949653] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.203342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.301172] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.307667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.314387] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.320776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.342778] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.879925] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.886420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.893145] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.899505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.922606] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.241928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.262690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.565836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.597636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.032688] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.112974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.184813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.537565] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.545049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.560828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.592522] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.714567] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.731914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.749288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.029636] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.106472] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.121597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.131401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.177135] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.235570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.307071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.574494] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.740365] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.828062] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.263355] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.273100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.282771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.305385] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.319710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.332424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.350224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.794571] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.821972] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.831453] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.344289] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.350508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.362451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.805392] 8021q: adding VLAN 0 to HW filter on device team0 01:25:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='io\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 242.118853] hrtimer: interrupt took 31858 ns 01:25:42 executing program 0: 01:25:42 executing program 1: 01:25:42 executing program 1: 01:25:42 executing program 0: 01:25:42 executing program 1: 01:25:42 executing program 0: [ 242.495244] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 01:25:42 executing program 1: 01:25:43 executing program 2: 01:25:43 executing program 3: 01:25:43 executing program 0: 01:25:44 executing program 4: 01:25:44 executing program 1: 01:25:44 executing program 0: 01:25:44 executing program 2: 01:25:44 executing program 5: 01:25:44 executing program 3: 01:25:44 executing program 3: 01:25:44 executing program 0: 01:25:44 executing program 1: 01:25:44 executing program 2: 01:25:44 executing program 4: 01:25:44 executing program 0: 01:25:44 executing program 3: 01:25:45 executing program 5: 01:25:45 executing program 2: 01:25:45 executing program 4: 01:25:45 executing program 1: 01:25:45 executing program 0: 01:25:45 executing program 4: 01:25:45 executing program 5: 01:25:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x33, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 01:25:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0x5) shutdown(r1, 0x10000400000002) 01:25:45 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x20026, 0x0) 01:25:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x1fc, 0x0) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) preadv(r0, &(0x7f0000000cc0)=[{&(0x7f0000000680)=""/244, 0xf4}], 0x1, 0x0) 01:25:45 executing program 5: 01:25:45 executing program 4: 01:25:45 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000600000000000a00000000000004000000000000000000000021000000000001000000000000020001000100000000000002007d000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40002ee, 0x0) 01:25:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x1fc, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) preadv(r0, &(0x7f0000000cc0)=[{&(0x7f0000000680)=""/244, 0xf4}], 0x1, 0x0) 01:25:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffff3e, &(0x7f0000000180)=0x9) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x1000000) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) 01:25:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x10100a) write$evdev(r0, &(0x7f00006f7fe8)=[{{}, 0x1, 0x40000000000003c, 0x400000002}], 0x271) 01:25:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/199, 0xc7, 0x12000, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r2) sendmsg$netlink(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x20, 0x1, 0x1, [r5, r0, r2, r3]}], 0x20}, 0x0) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r9 = dup2(r8, r7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) r10 = getpgid(0x0) sched_setscheduler(r10, 0x2, &(0x7f0000000100)=0x7) fcntl$setown(r6, 0x8, r10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue1\x00'}) 01:25:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) 01:25:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) 01:25:45 executing program 0: syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 01:25:45 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb6, &(0x7f0000000080)) 01:25:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0x9b2) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 01:25:46 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000a00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x12000, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = memfd_create(0x0, 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(r5, r4) sched_setscheduler(0x0, 0x2, &(0x7f0000000100)) 01:25:46 executing program 4: r0 = epoll_create(0x4) close(r0) socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, 0x0, 0x0) 01:25:46 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) 01:25:46 executing program 5: r0 = getpgrp(0x0) migrate_pages(r0, 0x1ff, 0x0, &(0x7f0000000100)=0x1) 01:25:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/199, 0xc7, 0x12000, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r2) sendmsg$netlink(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x20, 0x1, 0x1, [r5, r0, r2, r3]}], 0x20}, 0x0) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r9 = dup2(r8, r7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) r10 = getpgid(0x0) sched_setscheduler(r10, 0x2, &(0x7f0000000100)=0x7) fcntl$setown(r6, 0x8, r10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue1\x00'}) 01:25:46 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)='vw', 0x2, 0x20000045, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x70}}, {{0x0, 0x0, &(0x7f0000002840), 0x177, &(0x7f00000028c0)=""/87, 0x57}}], 0x2, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = gettid() tkill(r1, 0x16) 01:25:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 01:25:46 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 01:25:46 executing program 0: mkdir(&(0x7f0000001340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000380)='proc\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 01:25:46 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000080)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000100)=@random={'security.', '*-]}self\x00'}) 01:25:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000180)="9bea77e53e5f") getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:25:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0x8000) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x1000000) 01:25:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)="8c5c847837e9159dc5235abb46bbe5032456c95976cdd86a1825f6c00ed9e75c3883a1b96d9a48aef5c83877ccc8") mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 01:25:46 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) 01:25:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f00040000000000000000000000000000000000000000"], 0x90) read$FUSE(r0, 0x0, 0x0) [ 246.489100] overlayfs: filesystem on './file0' not supported as upperdir [ 246.629450] FS-Cache: Duplicate cookie detected [ 246.634283] FS-Cache: O-cookie c=00000000c3d19d34 [p=000000008cca43a3 fl=222 nc=0 na=1] [ 246.642606] FS-Cache: O-cookie d=00000000e046965b n=00000000ed51cfa1 [ 246.649109] FS-Cache: O-key=[10] '02000200200002000000' [ 246.654570] FS-Cache: N-cookie c=00000000420436f0 [p=000000008cca43a3 fl=2 nc=0 na=1] [ 246.662596] FS-Cache: N-cookie d=00000000e046965b n=0000000065c750f1 [ 246.669093] FS-Cache: N-key=[10] '02000200200002000000' 01:25:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) memfd_create(0x0, 0x7) 01:25:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)="8c5c847837e9159dc5235abb46bbe5032456c95976cdd86a1825f6c00ed9e75c3883a1b96d9a48aef5c83877ccc8") mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 01:25:47 executing program 1: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/199, 0xc7, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r3) sendmsg$netlink(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x30, 0x1, 0x1, [r6, r1, r6, r0, r3, r4, r0]}, @rights={0x18, 0x1, 0x1, [r2]}], 0x48}, 0x0) recvmmsg(r4, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r9 = dup2(r8, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) r10 = getpgid(0x0) fcntl$setown(r7, 0x8, r10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue1\x00'}) 01:25:47 executing program 3: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r2, 0x8007ffc) sendfile(r2, r2, 0x0, 0x101) sendfile(r0, r2, 0x0, 0x400008bca) 01:25:47 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") ioctl$KVM_RUN(r3, 0xae80, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ed5e683e4aff75573525928ec56ee3b5b639cb05d129112eac4216ea3ef2c86e003b8f1048ad68d3b3c6cc15ebb90ded100f2f4adfcd18bb2826e6ecbeb68e7ca2222e58ec1707640af76bdd6870c93188b083e037fe99a1117fcd", 0x5b, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000000000c00800000005000000070000000200000000100000000000800000000000000000000000000000000080000000010000000000000010000000001000000400000000"]) 01:25:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)="8c5c847837e9159dc5235abb46bbe5032456c95976cdd86a1825f6c00ed9e75c3883a1b96d9a48aef5c83877ccc8") mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 01:25:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 01:25:47 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x3, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) r1 = accept$alg(r0, 0x0, 0x0) msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000400), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)="8c5c847837e9159dc5235abb46bbe5032456c95976cdd86a1825f6c00ed9e75c3883a1b96d9a48aef5c83877ccc8") mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 01:25:47 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") ioctl$KVM_RUN(r3, 0xae80, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ed5e683e4aff75573525928ec56ee3b5b639cb05d129112eac4216ea3ef2c86e003b8f1048ad68d3b3c6cc15ebb90ded100f2f4adfcd18bb2826e6ecbeb68e7ca2222e58ec1707640af76bdd6870c93188b083e037fe99a1117fcd", 0x5b, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000000000c00800000005000000070000000200000000100000000000800000000000000000000000000000000080000000010000000000000010000000001000000400000000"]) 01:25:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 01:25:47 executing program 4: r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000240)=0x7, 0x4) recvmmsg(r0, &(0x7f0000002e00), 0x4000000000000ea, 0x0, 0x0) 01:25:47 executing program 0: ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x1000000) 01:25:48 executing program 1: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/199, 0xc7, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r3) sendmsg$netlink(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x30, 0x1, 0x1, [r6, r1, r6, r0, r3, r4, r0]}, @rights={0x18, 0x1, 0x1, [r2]}], 0x48}, 0x0) recvmmsg(r4, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r9 = dup2(r8, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) r10 = getpgid(0x0) fcntl$setown(r7, 0x8, r10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue1\x00'}) 01:25:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3c, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}]}) 01:25:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000002, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPHYS(r0, 0x40084504, &(0x7f0000000140)=""/208) 01:25:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c643a85593a7df8ddf9daffc23adee9687e9599fba8cabe20000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 01:25:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="230000001a000700e4050c00e69be20180a0d6f5c00fea0c73dd4a33a0a2aa0a223bdc", 0x23}], 0x1}, 0x0) 01:25:48 executing program 0: [ 248.002521] binder: BINDER_SET_CONTEXT_MGR already set [ 248.007993] binder: 7928:7933 ioctl 40046207 0 returned -16 [ 248.015522] binder_alloc: binder_alloc_mmap_handler: 7928 20001000-20004000 already mapped failed -16 01:25:48 executing program 4: [ 248.102473] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 248.120239] binder: release 7928:7930 transaction 2 out, still active [ 248.130987] binder: unexpected work type, 4, not freed 01:25:48 executing program 0: [ 248.151700] binder: undelivered TRANSACTION_COMPLETE 01:25:48 executing program 5: 01:25:48 executing program 2: [ 248.192376] binder: send failed reply for transaction 2, target dead 01:25:48 executing program 4: 01:25:48 executing program 0: 01:25:48 executing program 1: 01:25:48 executing program 3: 01:25:48 executing program 2: 01:25:48 executing program 5: 01:25:48 executing program 4: 01:25:48 executing program 0: 01:25:48 executing program 3: 01:25:48 executing program 4: 01:25:48 executing program 2: 01:25:48 executing program 5: 01:25:48 executing program 1: 01:25:48 executing program 0: 01:25:48 executing program 4: 01:25:48 executing program 2: 01:25:48 executing program 3: 01:25:49 executing program 5: 01:25:49 executing program 1: 01:25:49 executing program 3: 01:25:49 executing program 0: 01:25:49 executing program 4: 01:25:49 executing program 1: 01:25:49 executing program 2: 01:25:49 executing program 5: 01:25:49 executing program 3: 01:25:49 executing program 4: 01:25:49 executing program 0: 01:25:49 executing program 5: 01:25:49 executing program 1: 01:25:49 executing program 2: 01:25:49 executing program 3: 01:25:49 executing program 4: 01:25:49 executing program 1: 01:25:49 executing program 0: 01:25:49 executing program 5: 01:25:49 executing program 0: 01:25:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x2c8) fcntl$getown(0xffffffffffffffff, 0x9) 01:25:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x1000085) r1 = memfd_create(&(0x7f0000000080)="00100000000300faddaa10006400", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) add_key$user(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) sendfile(r0, r1, 0x0, 0x200140000) socket$netlink(0x10, 0x3, 0x1f) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000000)) 01:25:49 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) signalfd(r0, &(0x7f0000000200)={0x40}, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x101]}, 0x5c) socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) getpeername(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000100)=0x80) 01:25:49 executing program 1: socket$netlink(0x10, 0x3, 0x0) sync() 01:25:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000280)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) 01:25:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x1000085) r1 = memfd_create(&(0x7f0000000080)="00100000000300faddaa10006400", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) sendfile(r0, r1, 0x0, 0x200140000) socket$netlink(0x10, 0x3, 0x1f) sync() ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000000)) [ 249.421754] IPVS: ftp: loaded support on port[0] = 21 [ 249.439115] kernel msg: ebtables bug: please report to author: Valid hook without chain 01:25:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060107031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 01:25:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') [ 249.493626] kernel msg: ebtables bug: please report to author: Valid hook without chain 01:25:49 executing program 1: syz_genetlink_get_family_id$fou(0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) mkdir(0x0, 0x0) getgroups(0x2, &(0x7f00000004c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$jfs(&(0x7f0000000400)='jfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x2000) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x14200, 0x0) [ 249.597858] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 01:25:49 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@nat={"6e617400ff003f000000000000000000000000000000000000000a00", 0x19, 0x1, 0x1d0, [0x20000080, 0x2000000000000000, 0x0, 0x200000b0, 0x20000220], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]}, 0x248) 01:25:49 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x1, 0x130, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x200002c0], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r1, &(0x7f0000000500), 0x1, 0x0) 01:25:50 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) fsetxattr(r1, 0x0, 0x0, 0x0, 0x1) [ 249.908362] xt_nfacct: accounting object `syz1' does not exists [ 250.378648] IPVS: ftp: loaded support on port[0] = 21 01:25:50 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000080)="1f0000001e0007f17ff554daf7180000000000040000dd00000003cd8d0417", 0x1f) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 01:25:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c65300a8f8b65c1a9679076b4ca8102f83535bf2b7b068f2d3fd8977a9a3f2103fe7e414324a29f00718c7a2560a884980c8a348887148fbb89841e5c3a00040000d8da953e01413553efe94296d4f1d996b4cfb9b31eed509fe301597dd2a84442ac1c02d21942c440d558cba9358b32d28bfb895c76c29d6bf53562f98824d76fcd9ddf09"], 0x8d) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15}) 01:25:50 executing program 1: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="557d3a9d422f24df162a2038b53f382d", 0x10) 01:25:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000240)=0x7, 0x4) recvmmsg(r0, &(0x7f0000002e00), 0x4000000000000ba, 0x22, 0x0) 01:25:50 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)="8c5c847837e9159dc5235abb46bbe5032456c95976cdd86a1825f6c00ed9e75c3883a1b96d9a48aef5c83877ccc8e15ac535") mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 250.716524] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 01:25:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x1, 0x11e, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x200002c0], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x196) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x807}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x18) ioctl$sock_ifreq(r2, 0x400000008914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) [ 250.784460] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 01:25:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x4480, 0x0) io_setup(0x0, &(0x7f0000000400)=0x0) io_getevents(r3, 0x7, 0x6, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000440)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r4 = gettid() clone(0x2e828903, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000040)) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x8000000000000014) wait4(r4, &(0x7f0000000040), 0x0, &(0x7f0000000780)) r5 = shmget$private(0x0, 0x2000, 0x7c000180, &(0x7f0000ffc000/0x2000)=nil) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000300)=0xe000000000000000) shmctl$IPC_STAT(r5, 0x2, &(0x7f0000000200)=""/241) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000640)=""/89, 0x59) r6 = msgget$private(0x0, 0x0) mknodat(r1, &(0x7f00000001c0)='./file0\x00', 0x408, 0x8) setxattr$security_smack_entry(&(0x7f0000000500)='.\x00', &(0x7f0000000540)='security.SMACK64\x00', &(0x7f0000000580)='wlan0%\\eth0((\x00', 0xe, 0x2) msgrcv(r6, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) [ 250.890275] kernel msg: ebtables bug: please report to author: entries_size too small 01:25:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x101000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000180)="9bea77e53e5f28") ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000740)={[0xcc, 0x0, 0x0, 0x400, 0x0, 0x9, 0x0, 0x100000001, 0x0, 0xe21a, 0x800, 0x0, 0x0, 0xfa, 0x0, 0x100], 0x0, 0x4000}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x13, r3, 0x0) 01:25:51 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00002c5fe8)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001180)={{&(0x7f0000013000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0x40045402, &(0x7f0000013000)) r3 = dup(r2) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, 0x0) dup3(r1, r0, 0x0) [ 251.058751] kernel msg: ebtables bug: please report to author: entries_size too small 01:25:51 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:51 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:51 executing program 2: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={"6c6f0000002400000000000008000011", 0xff}) [ 251.704317] syz-executor1 (8139) used greatest stack depth: 13160 bytes left 01:25:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x101000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000180)="9bea77e53e5f28") ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000740)={[0xcc, 0x0, 0x0, 0x400, 0x0, 0x9, 0x0, 0x100000001, 0x0, 0xe21a, 0x800, 0x0, 0x0, 0xfa, 0x0, 0x100], 0x0, 0x4000}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x13, r3, 0x0) 01:25:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = timerfd_create(0x1000000000009, 0x0) close(r1) 01:25:52 executing program 3: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x0, 0x0, 0x8000) 01:25:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9) 01:25:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) lsetxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 01:25:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0xaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x6, 0x7, 0x9, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000000c0), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000000c0)}, 0x10) 01:25:54 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sysfs$2(0x2, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) r2 = accept$alg(r1, 0x0, 0x0) msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x1b0) r2 = dup2(r0, r0) write$P9_RXATTRWALK(r2, &(0x7f0000000040)={0xf}, 0xf) 01:25:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0x8) setresuid(0x0, r1, 0x0) 01:25:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget(0x2, 0x1000, 0x408, &(0x7f0000ffd000/0x1000)=nil) 01:25:54 executing program 3: 01:25:54 executing program 2: 01:25:54 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x12c, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) 01:25:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "8f8b65c1a9679076b4ca8102f83535bf2b7b068f2d3fd8977a9a3f2103fe7e414324a29f00718c7a2560a884980c8a348887148fbb89841e5c3a69383c56d8da953e01413553efe94296d4f1d996b4cfb9b31eed509fe301597dd2a84442ac1c02d21942c440d558cba9358b32d28bfb895c76b37677a060bf8c53044141c29d6bf53562f98824d76fcd9ddf09"}, 0x98) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15}) [ 253.970379] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure 01:25:54 executing program 1: 01:25:54 executing program 5: 01:25:54 executing program 0: 01:25:54 executing program 1: 01:25:54 executing program 4: 01:25:54 executing program 5: 01:25:54 executing program 2: 01:25:54 executing program 1: 01:25:54 executing program 0: 01:25:54 executing program 3: 01:25:54 executing program 4: 01:25:54 executing program 3: 01:25:54 executing program 2: 01:25:54 executing program 0: 01:25:54 executing program 5: 01:25:54 executing program 1: 01:25:54 executing program 1: 01:25:54 executing program 2: 01:25:54 executing program 4: 01:25:54 executing program 5: 01:25:54 executing program 3: 01:25:54 executing program 0: 01:25:54 executing program 1: 01:25:54 executing program 5: 01:25:55 executing program 0: 01:25:55 executing program 4: 01:25:55 executing program 3: 01:25:55 executing program 2: 01:25:55 executing program 5: 01:25:55 executing program 1: 01:25:55 executing program 2: 01:25:55 executing program 0: 01:25:55 executing program 4: 01:25:55 executing program 3: 01:25:55 executing program 5: 01:25:55 executing program 1: 01:25:55 executing program 0: 01:25:55 executing program 3: 01:25:55 executing program 4: 01:25:55 executing program 5: 01:25:55 executing program 2: 01:25:55 executing program 1: 01:25:55 executing program 0: 01:25:55 executing program 4: 01:25:55 executing program 2: 01:25:55 executing program 3: 01:25:55 executing program 5: 01:25:55 executing program 1: 01:25:55 executing program 5: 01:25:55 executing program 0: 01:25:55 executing program 2: 01:25:55 executing program 4: 01:25:55 executing program 3: 01:25:55 executing program 1: 01:25:55 executing program 0: 01:25:55 executing program 5: 01:25:55 executing program 3: 01:25:55 executing program 2: 01:25:55 executing program 0: 01:25:55 executing program 1: 01:25:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000300)="3642096433ff67f2440f34ffc4a2ebf717c4de7d3f1800672ef043811fde4d2d24f2416fa163ad489efe7fd400f34f5555f20fa11c39ce44c0d1eabbf5161622c5aa717ae567d8b00836d1ce4c") 01:25:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) 01:25:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f00040000000000000000000000000000000000000000"], 0x90) 01:25:56 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(0x0, 0x0) tkill(r0, 0x11) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 01:25:56 executing program 2: 01:25:56 executing program 0: 01:25:56 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)="6e667300eff16117129ed0598aa8d4", 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:25:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r2 = getpgrp(r1) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7b, 0x4) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x4e23, @multicast1}, 0x29) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getxattr(0x0, 0x0, 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.evm\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="05030200002000800099c8317c23c95b800dfd57b82677b9388fbc0012a4cc3240e7adafb876f54e288e2bd0f03beee68f70e5bb3b3ddf92d7fad97193bd896ec519f69e9ca5e4aa9bbf582a5ae0b0793cabd873ca9d31ba3f112e05e049886820ab9c2235eca25dbd2623010007cb5ec8e4014e8901d59440606b6c402fbfe673555ec3e86ada932d556f00a5c45f27e09f0cbaf3868f3dadc8f4cfbcc3a2dac7bdd54a1af967cd914998055d1cf38d18b48105762c8c7f7af6dd8227bb6a2c7614e4c4ae8258ab9753bfa8362997ea9c6b5ada4b67f1f423c0b98dad00b572c56618288a927b1e33fccb3b9666419c8ef8c2f2e3f8b45f1385cd1d935c4c176092adc9656c9672e26b7eb474d197143c09f1b816aa377114a7e925d1b9544fb0d9053f4983a0d5ebb7d0bd83862cd6bb577941d0d83e6f84847c586e0000000000000000000000"], 0x1, 0x2) sendmsg(r4, &(0x7f00000000c0)={&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x519}], 0x1, 0x0, 0x0, 0x800}, 0x44804) readahead(r3, 0xffffffff, 0x6) write(r3, &(0x7f0000000b80)="411dc00ed79e9dd7ecbd2f6c422434de13189612424e5a04abb8f5cf56b960a1628bea0f9b3682cac225512596c0f3340c887935ccd76c25384e6aeb961316f80434077a6f40dab741ff262489551814dc", 0x51) bind$inet(r3, &(0x7f0000000b40)={0x2, 0x4e24, @multicast1}, 0x10) sendmsg(r3, &(0x7f0000005b40)={&(0x7f0000003800)=@sco={0x1f, {0x0, 0x0, 0x0, 0x1000, 0xe4, 0xfc2}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x80) bind$inet(r4, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) lsetxattr(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="75ab2b"], 0x0, 0x0, 0x1) getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000036c0)=""/218, 0x0) read(0xffffffffffffffff, 0x0, 0x0) shutdown(r4, 0x1) recvmmsg(r4, &(0x7f0000003540)=[{{&(0x7f0000000e40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}, {&(0x7f0000000fc0)=""/29, 0x1d}, {&(0x7f0000001000)=""/201, 0xc9}], 0x3, &(0x7f0000001140)=""/192, 0xc0, 0x7}, 0xfffffffffffff0e1}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001200)=""/147, 0x93}, {&(0x7f00000012c0)=""/250, 0xfa}, {&(0x7f00000013c0)=""/19, 0x13}, {&(0x7f0000001400)=""/1, 0x1}], 0x4, &(0x7f0000001840)=""/4096, 0x1000, 0x8001}, 0x7fffffff}, {{&(0x7f0000001480)=@alg, 0x80, &(0x7f0000002840)=[{&(0x7f0000001500)=""/126, 0x7e}, {&(0x7f0000001580)=""/207, 0xcf}, {&(0x7f0000001680)=""/58, 0x3a}, {&(0x7f00000016c0)=""/216, 0xd8}, {&(0x7f00000017c0)=""/34, 0x22}], 0x5, &(0x7f00000028c0)=""/168, 0xa8}, 0xcd}, {{&(0x7f0000002980)=@hci, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002a00)=""/44, 0x2c}, {&(0x7f0000002a40)=""/91, 0x5b}, {&(0x7f0000002ac0)=""/242, 0xf2}, {&(0x7f0000002bc0)=""/9, 0x9}, {&(0x7f0000002c00)=""/248, 0xf8}, {&(0x7f0000002d00)=""/207, 0xcf}, {&(0x7f0000002e00)=""/180, 0xb4}], 0x7, &(0x7f0000002f40)=""/93, 0x5d, 0xb0}, 0x7}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002fc0)=""/117, 0x75}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/77, 0x4d}, {0x0}], 0x4, &(0x7f0000003240)=""/236, 0xec, 0x9}, 0x2}, {{&(0x7f0000003340)=@sco, 0x80, &(0x7f0000003400)=[{&(0x7f00000033c0)=""/32, 0x20}], 0x1, &(0x7f0000003440)=""/232, 0xe8, 0x4}, 0x6205cde9}], 0x6, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, &(0x7f0000000440), 0x0, 0x20000004, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) 01:25:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x17, 0x0, 0x2, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x18) 01:25:56 executing program 0: clone(0x8002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x19d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 01:25:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x14400) mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) poll(&(0x7f0000000480), 0x0, 0x0) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x105001, 0x0) sendmsg$nl_generic(r5, 0x0, 0x4) getegid() dup2(r0, r4) syz_emit_ethernet(0x0, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000040)={0x6e}, 0x8) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000180)=0x6) 01:25:56 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil], 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2842, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/47, 0x2f}], 0xf, 0x0) 01:25:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x4480, 0x0) io_setup(0x0, &(0x7f0000000400)=0x0) io_getevents(r3, 0x7, 0x6, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000440)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r4 = gettid() clone(0x2e828903, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000040)) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x8000000000000014) wait4(r4, &(0x7f0000000040), 0x0, &(0x7f0000000780)) r5 = shmget$private(0x0, 0x2000, 0x7c000180, &(0x7f0000ffc000/0x2000)=nil) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000300)=0xe000000000000000) shmctl$IPC_STAT(r5, 0x2, &(0x7f0000000200)=""/241) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000640)=""/89, 0x59) r6 = msgget$private(0x0, 0x0) mknodat(r1, &(0x7f00000001c0)='./file0\x00', 0x408, 0x8) setxattr$security_smack_entry(&(0x7f0000000500)='.\x00', &(0x7f0000000540)='security.SMACK64\x00', &(0x7f0000000580)='wlan0%\\eth0((\x00', 0xe, 0x2) msgrcv(r6, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000340)={0x20, 0xffffffffffffffff, 0x3}) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) 01:25:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)="6d656d00017937737761532e63757289c942abe3fa72656e74001a77b7c342eff0d5f3347c982e853759ab5b64fa83dfc6f3b5abbb9879e7ff876fb2fed09d9a89fec41d927c7abc0a6c25972c23ab3361455718413340940525", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) pkey_mprotect(&(0x7f00005b4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 01:25:57 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {0x0}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0), 0xffffffffffffff05) socketpair(0x7, 0x80003, 0x9, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) 01:25:57 executing program 1: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) write$UHID_INPUT(r0, 0x0, 0x0) 01:25:57 executing program 0: lstat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) getgroups(0x0, 0x0) stat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r0, r1, 0x0, 0x7fff) 01:25:57 executing program 2: 01:25:57 executing program 1: 01:25:57 executing program 3: 01:25:57 executing program 2: 01:25:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r0, r1, 0x0, 0x7fff) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) 01:25:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000010001900000007000000068100022b0506000100010100ff3ffe58", 0x1f}], 0x1) 01:25:57 executing program 4: 01:25:57 executing program 2: 01:25:58 executing program 3: 01:25:58 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {0x0}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:58 executing program 2: 01:25:58 executing program 4: 01:25:58 executing program 0: lstat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) getgroups(0x0, 0x0) stat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r0, r1, 0x0, 0x7fff) 01:25:58 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {0x0}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:58 executing program 2: 01:25:58 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fcntl$dupfd(r0, 0x406, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 258.024941] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 01:25:58 executing program 1: 01:25:58 executing program 3: 01:25:58 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) 01:25:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$vcsa(0x0, 0x0, 0x0) 01:25:58 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 01:25:58 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/111, 0x6f}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {0x0}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000, 0x5}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/69) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:25:59 executing program 3: 01:25:59 executing program 1: 01:25:59 executing program 4: 01:25:59 executing program 1: 01:25:59 executing program 3: 01:25:59 executing program 0: 01:25:59 executing program 4: 01:25:59 executing program 0: 01:25:59 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x80000000000201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) dup(r0) dup2(0xffffffffffffffff, r1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) 01:25:59 executing program 3: 01:25:59 executing program 0: 01:25:59 executing program 5: 01:25:59 executing program 1: 01:25:59 executing program 4: 01:25:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r2 = fcntl$dupfd(r1, 0x0, r1) dup2(r0, r1) r3 = dup2(r1, r2) sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) 01:25:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x8000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x100, &(0x7f0000000400)=@file={0x0, './file1\x00'}, 0x6e) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)="8c5c847837e9159dc5235abb46bbe5032456c95976cdd86a1825f6c00ed9e75c3883a1b96d9a48aef5c83877ccc8e15ac5350f9ebdba08eca9f544f17694b2ada902631490d88961368eab6afaf2") mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2, 0x80}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x14200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000200)) 01:25:59 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004111, &(0x7f0000000140)="d1650ef60e4b9ca00c1a7f6ef3") 01:25:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x7f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0xa48204) 01:25:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) mount$fuse(0x0, &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f00040000000000000000000000000000000000000000"], 0x90) 01:26:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c0000002f0029080017457c660000000200000018000000040001000400000005007a000000000000000001a42de01c59a417464cc02288a9af34da3af3f71b1eb9b35a3a501f490accc3983891b873ec4d0eec2e15c8a031b8ccef5328f48ff428d2e973fa983c4d8c73c9bb9a3dcd7b"], 0x1}}, 0x0) 01:26:00 executing program 0: socket$inet(0x2, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffb6, &(0x7f0000000080)) 01:26:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x1000) creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) preadv(r0, &(0x7f0000000cc0)=[{&(0x7f0000000680)=""/244, 0xf4}], 0x1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f00040000000000000000000000000000000000000000"], 0x90) 01:26:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) 01:26:00 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={"0000000000000000000000000200", 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x2e0, &(0x7f0000000300)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="4e8121007d"], 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r3, 0x2007fff) sendfile(r0, r3, &(0x7f0000d83ff8)=0x2, 0x800000000024) 01:26:00 executing program 3: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 01:26:00 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x10100a) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$evdev(r0, &(0x7f00006f7fe8)=[{{}, 0x1, 0x400000000000038, 0x400000002}], 0xfdd0) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000100), 0x0, 0x0) 01:26:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) poll(0x0, 0x0, 0x7f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0xa48204) [ 260.601350] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.620567] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:26:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x1000) stat(&(0x7f00000003c0)='./file0/file0\x00', 0x0) lstat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000466ce656d316e6f246576656d310000000000000000000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f00040000000000000000000000000000000000000000"], 0x90) 01:26:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") 01:26:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) 01:26:01 executing program 2: syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x7, 0x0, 0x70cd00}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 261.373809] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:26:01 executing program 0: rt_sigprocmask(0x0, &(0x7f000078b000)={0xfffffffffffffffa}, 0x0, 0x8) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:26:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) 01:26:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x7, 0x0, 0x70cd00}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:26:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200a000) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000000035) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 01:26:03 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) 01:26:03 executing program 5: 01:26:03 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000240), 0x4) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) inotify_init() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:03 executing program 3: 01:26:03 executing program 2: 01:26:03 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) r1 = accept4$unix(r0, &(0x7f0000000640)=@abs, &(0x7f0000000740)=0x6e, 0x0) ioctl(r1, 0x0, 0x0) r2 = creat(0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000500)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000380)) ioctl(r4, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r5 = socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={"6c6f00ecff00000000000000f9ff00"}) prlimit64(r3, 0xc, &(0x7f0000000440)={0x50}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, 0x0) getresuid(&(0x7f0000000300), &(0x7f00000003c0)=0x0, &(0x7f0000000540)) fchown(r5, r6, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x1) r7 = socket$inet(0x10, 0x4000000000002, 0x0) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f0000001c000367ffffff000d0000000200000001000000000003c91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 01:26:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x81, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) unlink(0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 01:26:03 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) 01:26:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x2, &(0x7f0000000040)=""/84, 0x54) r1 = gettid() rt_tgsigqueueinfo(r1, r1, 0x31, &(0x7f0000000000)) readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000728000)=""/145, 0x91) [ 262.950351] ================================================================== [ 262.958052] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 262.964590] Read of size 8 at addr ffff8881cd7ffdb0 by task syz-executor4/8664 [ 262.964604] [ 262.964624] CPU: 1 PID: 8664 Comm: syz-executor4 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 262.964635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.964648] Call Trace: [ 262.964734] dump_stack+0x244/0x39d [ 262.997892] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.003170] ? printk+0xa7/0xcf [ 263.006477] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 263.011302] print_address_description.cold.4+0x9/0x1ff [ 263.016753] ? __list_add_valid+0x8f/0xac [ 263.020931] kasan_report.cold.5+0x1b/0x39 [ 263.025194] ? __list_add_valid+0x8f/0xac [ 263.029366] ? __list_add_valid+0x8f/0xac [ 263.033539] __asan_report_load8_noabort+0x14/0x20 [ 263.038516] __list_add_valid+0x8f/0xac [ 263.042601] ___neigh_create+0x14b7/0x2600 [ 263.046894] ? lock_acquire+0x1ed/0x520 [ 263.050901] ? lock_release+0xa00/0xa00 [ 263.051621] IPVS: ftp: loaded support on port[0] = 21 [ 263.054905] ? neigh_remove_one+0x5a0/0x5a0 [ 263.054925] ? find_held_lock+0x36/0x1c0 [ 263.054947] ? mark_held_locks+0xc7/0x130 [ 263.054999] ? __local_bh_enable_ip+0x160/0x260 [ 263.055018] ? __local_bh_enable_ip+0x160/0x260 [ 263.082114] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 263.086739] ? trace_hardirqs_on+0xbd/0x310 [ 263.091092] ? neigh_lookup+0x586/0x7c0 [ 263.095097] ? trace_hardirqs_off_caller+0x310/0x310 [ 263.100285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.105851] ? check_preemption_disabled+0x48/0x280 [ 263.110896] ? neigh_lookup+0x553/0x7c0 [ 263.114895] ? neigh_lookup+0x553/0x7c0 [ 263.118892] ? __local_bh_enable_ip+0x160/0x260 [ 263.123601] ? neigh_lookup+0x586/0x7c0 [ 263.127603] ? refcount_dec_if_one+0x180/0x180 [ 263.132268] ? arp_hash+0xa0/0xa0 [ 263.135751] ? neigh_seq_start+0x770/0x770 [ 263.140064] ? memset+0x31/0x40 [ 263.143375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.148995] ? __nla_parse+0x12c/0x3e0 [ 263.152918] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.157967] neigh_add+0xbaa/0xd90 [ 263.161539] ? neigh_xmit+0xa50/0xa50 [ 263.165493] ? neigh_xmit+0xa50/0xa50 [ 263.169352] rtnetlink_rcv_msg+0x46a/0xc20 [ 263.173619] ? rtnl_fdb_dump+0xd00/0xd00 [ 263.177755] netlink_rcv_skb+0x172/0x440 [ 263.181842] ? rtnl_fdb_dump+0xd00/0xd00 [ 263.185927] ? netlink_ack+0xb80/0xb80 [ 263.189871] ? rcu_read_unlock_special+0x370/0x370 [ 263.194902] rtnetlink_rcv+0x1c/0x20 [ 263.198638] netlink_unicast+0x5a5/0x760 [ 263.202732] ? netlink_attachskb+0x9a0/0x9a0 [ 263.207200] ? aa_sk_perm+0x22b/0x8e0 [ 263.211029] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.216084] netlink_sendmsg+0xa18/0xfc0 [ 263.220180] ? netlink_unicast+0x760/0x760 [ 263.224479] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 263.229497] ? apparmor_socket_sendmsg+0x29/0x30 [ 263.234285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.239895] ? security_socket_sendmsg+0x94/0xc0 [ 263.244655] ? netlink_unicast+0x760/0x760 [ 263.248956] sock_sendmsg+0xd5/0x120 [ 263.252687] ___sys_sendmsg+0x7fd/0x930 [ 263.256671] ? copy_msghdr_from_user+0x580/0x580 [ 263.261501] ? __fget_light+0x2e9/0x430 [ 263.265515] ? fget_raw+0x20/0x20 [ 263.269049] ? __might_fault+0x12b/0x1e0 [ 263.273137] ? lock_downgrade+0x900/0x900 [ 263.277295] ? lock_release+0xa00/0xa00 [ 263.281440] ? perf_trace_sched_process_exec+0x860/0x860 [ 263.286928] ? posix_ktime_get_ts+0x15/0x20 [ 263.291259] ? trace_hardirqs_off_caller+0x310/0x310 [ 263.296530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.302205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.307741] ? sockfd_lookup_light+0xc5/0x160 [ 263.312237] __sys_sendmsg+0x11d/0x280 [ 263.316123] ? __ia32_sys_shutdown+0x80/0x80 [ 263.320529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.326115] ? put_timespec64+0x10f/0x1b0 [ 263.330340] ? finish_task_switch+0x1f4/0x910 [ 263.334877] ? do_syscall_64+0x9a/0x820 [ 263.338863] ? do_syscall_64+0x9a/0x820 [ 263.342842] ? trace_hardirqs_off_caller+0x310/0x310 [ 263.348023] __x64_sys_sendmsg+0x78/0xb0 [ 263.352106] do_syscall_64+0x1b9/0x820 [ 263.356022] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.361392] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.366322] ? trace_hardirqs_on_caller+0x310/0x310 [ 263.371348] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 263.376376] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 263.383050] ? __switch_to_asm+0x40/0x70 [ 263.387129] ? __switch_to_asm+0x34/0x70 [ 263.391202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.396109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.401294] RIP: 0033:0x457679 [ 263.404489] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.423476] RSP: 002b:00007fbf6f279c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 263.431178] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 263.438484] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 263.445760] RBP: 000000000072c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 263.453040] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf6f27a6d4 [ 263.460321] R13: 00000000004c3e7d R14: 00000000004d6cd0 R15: 00000000ffffffff [ 263.467670] [ 263.469296] Allocated by task 8654: [ 263.472924] save_stack+0x43/0xd0 [ 263.476373] kasan_kmalloc+0xcb/0xd0 [ 263.480094] __kmalloc+0x15d/0x760 [ 263.483655] ___neigh_create+0x13fc/0x2600 [ 263.487898] neigh_add+0xbaa/0xd90 [ 263.491434] rtnetlink_rcv_msg+0x46a/0xc20 [ 263.495675] netlink_rcv_skb+0x172/0x440 [ 263.499741] rtnetlink_rcv+0x1c/0x20 [ 263.503472] netlink_unicast+0x5a5/0x760 [ 263.507578] netlink_sendmsg+0xa18/0xfc0 [ 263.511652] sock_sendmsg+0xd5/0x120 [ 263.515359] ___sys_sendmsg+0x7fd/0x930 [ 263.519442] __sys_sendmsg+0x11d/0x280 [ 263.523325] __x64_sys_sendmsg+0x78/0xb0 [ 263.527386] do_syscall_64+0x1b9/0x820 [ 263.531271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.536454] [ 263.538098] Freed by task 8643: [ 263.541388] save_stack+0x43/0xd0 [ 263.544835] __kasan_slab_free+0x102/0x150 [ 263.549160] kasan_slab_free+0xe/0x10 [ 263.552970] kfree+0xcf/0x230 [ 263.556091] rcu_process_callbacks+0xd91/0x15f0 [ 263.560780] __do_softirq+0x308/0xb7e [ 263.564595] [ 263.566253] The buggy address belongs to the object at ffff8881cd7ffb40 [ 263.566253] which belongs to the cache kmalloc-1k of size 1024 [ 263.578903] The buggy address is located 624 bytes inside of [ 263.578903] 1024-byte region [ffff8881cd7ffb40, ffff8881cd7fff40) [ 263.590992] The buggy address belongs to the page: [ 263.595929] page:ffffea000735ff80 count:1 mapcount:0 mapping:ffff8881da800ac0 index:0x0 compound_mapcount: 0 [ 263.605918] flags: 0x2fffc0000010200(slab|head) [ 263.610615] raw: 02fffc0000010200 ffffea000735ec88 ffffea0007546b08 ffff8881da800ac0 [ 263.618524] raw: 0000000000000000 ffff8881cd7fe040 0000000100000007 0000000000000000 [ 263.626438] page dumped because: kasan: bad access detected [ 263.632158] [ 263.633794] Memory state around the buggy address: [ 263.638739] ffff8881cd7ffc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 263.646117] ffff8881cd7ffd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 263.653491] >ffff8881cd7ffd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 263.660862] ^ [ 263.665802] ffff8881cd7ffe00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 263.673169] ffff8881cd7ffe80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 263.680530] ================================================================== [ 263.687914] Disabling lock debugging due to kernel taint [ 263.697332] Kernel panic - not syncing: panic_on_warn set ... [ 263.703264] CPU: 1 PID: 8664 Comm: syz-executor4 Tainted: G B 4.20.0-rc6-next-20181210+ #164 [ 263.713154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.722514] Call Trace: [ 263.725102] dump_stack+0x244/0x39d [ 263.728737] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.733928] ? __list_add_valid+0x10/0xac [ 263.738150] panic+0x2ad/0x632 [ 263.741347] ? add_taint.cold.5+0x16/0x16 [ 263.745507] ? preempt_schedule+0x4d/0x60 [ 263.749657] ? ___preempt_schedule+0x16/0x18 [ 263.754118] ? trace_hardirqs_on+0xb4/0x310 [ 263.758565] ? __list_add_valid+0x8f/0xac [ 263.762710] end_report+0x47/0x4f [ 263.766157] kasan_report.cold.5+0xe/0x39 [ 263.770313] ? __list_add_valid+0x8f/0xac [ 263.774471] ? __list_add_valid+0x8f/0xac [ 263.778660] __asan_report_load8_noabort+0x14/0x20 [ 263.783654] __list_add_valid+0x8f/0xac [ 263.787637] ___neigh_create+0x14b7/0x2600 [ 263.791920] ? lock_acquire+0x1ed/0x520 [ 263.795891] ? lock_release+0xa00/0xa00 [ 263.799864] ? neigh_remove_one+0x5a0/0x5a0 [ 263.804179] ? find_held_lock+0x36/0x1c0 [ 263.808249] ? mark_held_locks+0xc7/0x130 [ 263.812424] ? __local_bh_enable_ip+0x160/0x260 [ 263.817114] ? __local_bh_enable_ip+0x160/0x260 [ 263.821805] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 263.826398] ? trace_hardirqs_on+0xbd/0x310 [ 263.830728] ? neigh_lookup+0x586/0x7c0 [ 263.834711] ? trace_hardirqs_off_caller+0x310/0x310 [ 263.839854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.845400] ? check_preemption_disabled+0x48/0x280 [ 263.850450] ? neigh_lookup+0x553/0x7c0 [ 263.854459] ? neigh_lookup+0x553/0x7c0 [ 263.858440] ? __local_bh_enable_ip+0x160/0x260 [ 263.863132] ? neigh_lookup+0x586/0x7c0 [ 263.867124] ? refcount_dec_if_one+0x180/0x180 [ 263.871706] ? arp_hash+0xa0/0xa0 [ 263.875155] ? neigh_seq_start+0x770/0x770 [ 263.879399] ? memset+0x31/0x40 [ 263.882697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.888253] ? __nla_parse+0x12c/0x3e0 [ 263.892165] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.897205] neigh_add+0xbaa/0xd90 [ 263.900764] ? neigh_xmit+0xa50/0xa50 [ 263.900781] IPVS: ftp: loaded support on port[0] = 21 [ 263.904601] ? neigh_xmit+0xa50/0xa50 [ 263.904617] rtnetlink_rcv_msg+0x46a/0xc20 [ 263.904633] ? rtnl_fdb_dump+0xd00/0xd00 [ 263.904655] netlink_rcv_skb+0x172/0x440 [ 263.925988] ? rtnl_fdb_dump+0xd00/0xd00 [ 263.930066] ? netlink_ack+0xb80/0xb80 [ 263.933948] ? rcu_read_unlock_special+0x370/0x370 [ 263.938880] rtnetlink_rcv+0x1c/0x20 [ 263.942593] netlink_unicast+0x5a5/0x760 [ 263.946660] ? netlink_attachskb+0x9a0/0x9a0 [ 263.951079] ? aa_sk_perm+0x22b/0x8e0 [ 263.954875] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.959885] netlink_sendmsg+0xa18/0xfc0 [ 263.963953] ? netlink_unicast+0x760/0x760 [ 263.968183] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 263.973109] ? apparmor_socket_sendmsg+0x29/0x30 [ 263.977859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.983392] ? security_socket_sendmsg+0x94/0xc0 [ 263.988189] ? netlink_unicast+0x760/0x760 [ 263.992429] sock_sendmsg+0xd5/0x120 [ 263.996151] ___sys_sendmsg+0x7fd/0x930 [ 264.000230] ? copy_msghdr_from_user+0x580/0x580 [ 264.005006] ? __fget_light+0x2e9/0x430 [ 264.008989] ? fget_raw+0x20/0x20 [ 264.012438] ? __might_fault+0x12b/0x1e0 [ 264.016497] ? lock_downgrade+0x900/0x900 [ 264.020644] ? lock_release+0xa00/0xa00 [ 264.024616] ? perf_trace_sched_process_exec+0x860/0x860 [ 264.030071] ? posix_ktime_get_ts+0x15/0x20 [ 264.034405] ? trace_hardirqs_off_caller+0x310/0x310 [ 264.039565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.045104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.050648] ? sockfd_lookup_light+0xc5/0x160 [ 264.055156] __sys_sendmsg+0x11d/0x280 [ 264.059059] ? __ia32_sys_shutdown+0x80/0x80 [ 264.063465] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.069009] ? put_timespec64+0x10f/0x1b0 [ 264.073165] ? finish_task_switch+0x1f4/0x910 [ 264.077657] ? do_syscall_64+0x9a/0x820 [ 264.081635] ? do_syscall_64+0x9a/0x820 [ 264.085620] ? trace_hardirqs_off_caller+0x310/0x310 [ 264.090730] __x64_sys_sendmsg+0x78/0xb0 [ 264.094805] do_syscall_64+0x1b9/0x820 [ 264.098701] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.104077] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.109016] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.114049] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.119073] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 264.125734] ? __switch_to_asm+0x40/0x70 [ 264.129997] ? __switch_to_asm+0x34/0x70 [ 264.134073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.138929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.144112] RIP: 0033:0x457679 [ 264.147301] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.166242] RSP: 002b:00007fbf6f279c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 264.173989] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 264.181264] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 264.188527] RBP: 000000000072c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 264.195818] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf6f27a6d4 [ 264.203225] R13: 00000000004c3e7d R14: 00000000004d6cd0 R15: 00000000ffffffff [ 264.211696] Kernel Offset: disabled [ 264.215332] Rebooting in 86400 seconds..