0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r1, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x40000000000004, 0x1101002) fstat(r0, &(0x7f0000000380)) 07:58:26 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000010c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000400)=0x2) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000f00)={0x0, 0x2, 0x1, r0}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, 0x0) clock_gettime(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1fe, 0xf0d8, 0x80000000, 0x80000000000000, 0xa5}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x200, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x0, "a11fd9bb777ed6d2de013aa84c1780812dde64019c3679140f98742d991c188999137e2c0c273c01ce5ee4a98e9a5f9621977495adc63b5e42cfed5f869c9b9c3762653da39cff6f836d3d8c2f820218e7f36d69edfe4f612f003ba171580d5d229a27995ec89a2ae6ea35537a994f882cb14b30ea1e81f4ffce42d406d795b1667439abc3912178aa17fed740c80915b5df43ad2e40db2e0c07023314ebb582148f97bf4b7f329a3f160dfa8dc19707f955096b143bd08da435072e87ba883dfc7fec35c82353166a54e432bd274068adc33e99bed553bae5b0410241e3d969c47980bfb66acc42eae3297dadf62b3f5d48f2bbbae626416b7f89ba77f540b4", 0xb9, 0x4, 0xffc0000000000000, 0x2, 0x100000000, 0x0, 0x3}, r2}}, 0x128) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x18080080}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b80)={0x3, &(0x7f0000000b40)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000c00)={r3, 0x3}) syz_genetlink_get_family_id$tipc(&(0x7f0000000c80)='TIPC\x00') stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000cc0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000d40)) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48001}, 0x40) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[0x0, &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x293f58b3a5493162}, 0xc, &(0x7f00000004c0)={&(0x7f00000008c0)=ANY=[@ANYRES16=r4, @ANYBLOB="00022abd7000ffdbdf2505000000280003001400020076657468305f746f5f7465616d0800ff00000008000500ac1414bb08000600f8ffffff0000000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x8ee87c6d936b8a40) truncate(&(0x7f0000000bc0)='./file0\x00', 0x7ff) [ 406.844620][T14312] FAULT_INJECTION: forcing a failure. [ 406.844620][T14312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.858672][T14312] CPU: 1 PID: 14312 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 406.866849][T14312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.876947][T14312] Call Trace: [ 406.880321][T14312] dump_stack+0x191/0x1f0 [ 406.884857][T14312] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 07:58:27 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r1, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x40000000000004, 0x1101002) [ 406.890921][T14312] should_fail+0xa3f/0xa50 [ 406.895422][T14312] should_fail_alloc_page+0x1fb/0x270 [ 406.900868][T14312] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 406.906510][T14312] ? __alloc_pages_nodemask+0x142d/0x5fa0 [ 406.912295][T14312] ? __module_address+0x68/0x5e0 [ 406.917305][T14312] ? is_bpf_text_address+0x3c5/0x4b0 [ 406.922662][T14312] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 406.928802][T14312] ? is_bpf_text_address+0x47d/0x4b0 [ 406.934218][T14312] ? __kernel_text_address+0x24f/0x350 [ 406.939764][T14312] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 406.945804][T14312] ? alloc_pages_current+0x412/0x9a0 [ 406.951164][T14312] alloc_pages_current+0x68d/0x9a0 [ 406.956362][T14312] pte_alloc_one+0x59/0x1a0 [ 406.960946][T14312] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 406.967025][T14312] __pte_alloc+0x6d/0x460 [ 406.971430][T14312] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 406.977482][T14312] copy_page_range+0x3296/0x43a0 [ 406.982490][T14312] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 406.988704][T14312] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 406.994767][T14312] ? init_admin_reserve+0x160/0x160 [ 407.000076][T14312] dup_mmap+0x1510/0x1d60 [ 407.004506][T14312] dup_mm+0x1f2/0x710 [ 407.008564][T14312] copy_process+0x3d50/0x8e30 [ 407.013315][T14312] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 407.019478][T14312] _do_fork+0x25c/0xeb0 [ 407.023695][T14312] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 407.029828][T14312] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 407.035870][T14312] __se_sys_clone+0x32a/0x370 [ 407.040627][T14312] __x64_sys_clone+0x62/0x80 [ 407.045272][T14312] do_syscall_64+0xbc/0xf0 [ 407.049761][T14312] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 407.055692][T14312] RIP: 0033:0x459829 [ 407.059639][T14312] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.079293][T14312] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 407.087764][T14312] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:58:27 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc4c85512, &(0x7f0000000600)={{0xb, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 407.095775][T14312] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 407.103785][T14312] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 407.111810][T14312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 407.119824][T14312] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:27 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semctl$IPC_RMID(0x0, 0x0, 0x0) 07:58:27 executing program 1 (fault-call:1 fault-nth:34): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 407.596860][T14336] FAULT_INJECTION: forcing a failure. [ 407.596860][T14336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 407.610211][T14336] CPU: 0 PID: 14336 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 407.618186][T14336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.628332][T14336] Call Trace: [ 407.631653][T14336] dump_stack+0x191/0x1f0 [ 407.636014][T14336] should_fail+0xa3f/0xa50 [ 407.640483][T14336] should_fail_alloc_page+0x1fb/0x270 [ 407.645885][T14336] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 407.651372][T14336] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 407.657581][T14336] ? kernel_poison_pages+0x40/0x360 [ 407.662819][T14336] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 407.668984][T14336] ? prep_new_page+0x792/0x9b0 [ 407.673770][T14336] ? kmsan_get_metadata_or_null+0x208/0x290 [ 407.679695][T14336] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 407.685781][T14336] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 407.691783][T14336] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 407.698220][T14336] kmsan_alloc_page+0x7a/0xf0 [ 407.702920][T14336] __alloc_pages_nodemask+0x142d/0x5fa0 [ 407.708493][T14336] ? __alloc_pages_nodemask+0x142d/0x5fa0 [ 407.714219][T14336] ? __module_address+0x68/0x5e0 [ 407.719166][T14336] ? is_bpf_text_address+0x3c5/0x4b0 [ 407.724468][T14336] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 407.730551][T14336] ? is_bpf_text_address+0x47d/0x4b0 [ 407.735921][T14336] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 407.741913][T14336] ? alloc_pages_current+0x412/0x9a0 [ 407.747212][T14336] alloc_pages_current+0x68d/0x9a0 [ 407.752353][T14336] pte_alloc_one+0x59/0x1a0 [ 407.756877][T14336] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 407.762876][T14336] __pte_alloc+0x6d/0x460 [ 407.767225][T14336] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 407.773227][T14336] copy_page_range+0x3296/0x43a0 [ 407.778189][T14336] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 407.784359][T14336] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 407.790385][T14336] ? init_admin_reserve+0x160/0x160 [ 407.795644][T14336] dup_mmap+0x1510/0x1d60 [ 407.800030][T14336] dup_mm+0x1f2/0x710 [ 407.804042][T14336] copy_process+0x3d50/0x8e30 [ 407.808751][T14336] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 407.814889][T14336] _do_fork+0x25c/0xeb0 [ 407.819054][T14336] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 407.825148][T14336] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 407.831151][T14336] __se_sys_clone+0x32a/0x370 [ 407.835875][T14336] __x64_sys_clone+0x62/0x80 [ 407.840474][T14336] do_syscall_64+0xbc/0xf0 [ 407.844912][T14336] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 407.850816][T14336] RIP: 0033:0x459829 [ 407.854722][T14336] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.874332][T14336] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 407.882750][T14336] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 07:58:27 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r1, 0x0, 0x0) [ 407.890725][T14336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 407.898703][T14336] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 407.906679][T14336] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 407.914649][T14336] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:28 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc4c85512, &(0x7f0000000600)={{0xb, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 07:58:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:30 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) connect$packet(r0, &(0x7f00000001c0)={0x11, 0xd, 0x0, 0x1, 0x4, 0x6, @dev={[], 0x18}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:30 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semctl$IPC_RMID(0x0, 0x0, 0x0) 07:58:30 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) r3 = socket$inet(0x2, 0x3, 0x29) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 07:58:30 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:30 executing program 1 (fault-call:1 fault-nth:35): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 410.030468][T14362] FAULT_INJECTION: forcing a failure. [ 410.030468][T14362] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 410.043738][T14362] CPU: 0 PID: 14362 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 410.051721][T14362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.061783][T14362] Call Trace: [ 410.065099][T14362] dump_stack+0x191/0x1f0 [ 410.069463][T14362] should_fail+0xa3f/0xa50 [ 410.075396][T14362] should_fail_alloc_page+0x1fb/0x270 [ 410.080810][T14362] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 410.086297][T14362] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 410.092489][T14362] ? kernel_poison_pages+0x40/0x360 [ 410.097726][T14362] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 410.103894][T14362] ? prep_new_page+0x792/0x9b0 [ 410.108723][T14362] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 410.114819][T14362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.120830][T14362] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 410.127266][T14362] kmsan_alloc_page+0x7a/0xf0 [ 410.131965][T14362] __alloc_pages_nodemask+0x142d/0x5fa0 [ 410.137536][T14362] ? __alloc_pages_nodemask+0x142d/0x5fa0 [ 410.143268][T14362] ? __module_address+0x68/0x5e0 [ 410.148230][T14362] ? is_bpf_text_address+0x3c5/0x4b0 [ 410.153541][T14362] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 410.160885][T14362] ? is_bpf_text_address+0x47d/0x4b0 [ 410.166287][T14362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.172293][T14362] ? alloc_pages_current+0x412/0x9a0 [ 410.177604][T14362] alloc_pages_current+0x68d/0x9a0 [ 410.184024][T14362] pte_alloc_one+0x59/0x1a0 [ 410.188552][T14362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.194559][T14362] __pte_alloc+0x6d/0x460 [ 410.198915][T14362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.204934][T14362] copy_page_range+0x3296/0x43a0 [ 410.209906][T14362] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 410.216082][T14362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.222162][T14362] ? init_admin_reserve+0x160/0x160 [ 410.227433][T14362] dup_mmap+0x1510/0x1d60 [ 410.231843][T14362] dup_mm+0x1f2/0x710 [ 410.235870][T14362] copy_process+0x3d50/0x8e30 [ 410.240587][T14362] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 410.246732][T14362] _do_fork+0x25c/0xeb0 [ 410.250905][T14362] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 410.256999][T14362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.262999][T14362] __se_sys_clone+0x32a/0x370 [ 410.267716][T14362] __x64_sys_clone+0x62/0x80 [ 410.272324][T14362] do_syscall_64+0xbc/0xf0 [ 410.276757][T14362] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 410.282681][T14362] RIP: 0033:0x459829 [ 410.286583][T14362] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.306189][T14362] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 410.314616][T14362] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 410.322590][T14362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:58:30 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) semget(0x0, 0x4, 0x210) 07:58:30 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xd1, &(0x7f000079bffc), &(0x7f0000000080)=0x4) [ 410.330559][T14362] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 410.338560][T14362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 410.346537][T14362] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:30 executing program 1 (fault-call:1 fault-nth:36): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:30 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semctl$IPC_RMID(0x0, 0x0, 0x0) 07:58:30 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xfc, &(0x7f000079bffc), &(0x7f0000000080)=0x4) [ 410.822628][T14387] FAULT_INJECTION: forcing a failure. [ 410.822628][T14387] name failslab, interval 1, probability 0, space 0, times 0 [ 410.835410][T14387] CPU: 1 PID: 14387 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 410.843565][T14387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.853655][T14387] Call Trace: [ 410.857027][T14387] dump_stack+0x191/0x1f0 [ 410.861420][T14387] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.867591][T14387] should_fail+0xa3f/0xa50 [ 410.872093][T14387] __should_failslab+0x264/0x280 [ 410.877088][T14387] should_failslab+0x29/0x70 [ 410.881736][T14387] kmem_cache_alloc+0xd6/0xd10 [ 410.886572][T14387] ? dup_mmap+0xb6e/0x1d60 [ 410.891057][T14387] ? dup_mmap+0xb2a/0x1d60 [ 410.895539][T14387] dup_mmap+0xb6e/0x1d60 [ 410.899878][T14387] dup_mm+0x1f2/0x710 [ 410.903930][T14387] copy_process+0x3d50/0x8e30 [ 410.908683][T14387] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 410.914844][T14387] _do_fork+0x25c/0xeb0 [ 410.919051][T14387] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 410.925184][T14387] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 410.931229][T14387] __se_sys_clone+0x32a/0x370 [ 410.936002][T14387] __x64_sys_clone+0x62/0x80 [ 410.940650][T14387] do_syscall_64+0xbc/0xf0 [ 410.945136][T14387] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 410.951064][T14387] RIP: 0033:0x459829 [ 410.955032][T14387] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.974677][T14387] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 410.983144][T14387] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 410.991165][T14387] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 410.999174][T14387] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 411.007185][T14387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 411.015193][T14387] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:33 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) connect$packet(r0, &(0x7f00000001c0)={0x11, 0xd, 0x0, 0x1, 0x4, 0x6, @dev={[], 0x18}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) semget(0x0, 0x4, 0x210) 07:58:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x9adb, 0xc281], 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'team_slave_0\x00'}, 0x18) 07:58:33 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) r1 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r1, 0x0, 0x0) 07:58:33 executing program 1 (fault-call:1 fault-nth:37): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) semget(0x0, 0x4, 0x210) [ 413.365117][T14406] FAULT_INJECTION: forcing a failure. [ 413.365117][T14406] name failslab, interval 1, probability 0, space 0, times 0 [ 413.377998][T14406] CPU: 1 PID: 14406 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 413.386033][T14406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.396130][T14406] Call Trace: [ 413.399499][T14406] dump_stack+0x191/0x1f0 [ 413.403906][T14406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 413.409961][T14406] should_fail+0xa3f/0xa50 [ 413.414469][T14406] __should_failslab+0x264/0x280 [ 413.419481][T14406] should_failslab+0x29/0x70 [ 413.424142][T14406] kmem_cache_alloc+0xd6/0xd10 [ 413.428977][T14406] ? anon_vma_clone+0x167/0xcb0 [ 413.434053][T14406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 413.440113][T14406] anon_vma_clone+0x167/0xcb0 [ 413.444878][T14406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 413.450925][T14406] anon_vma_fork+0xe8/0xb00 [ 413.455500][T14406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 413.461542][T14406] ? vma_dup_policy+0xf9/0x190 [ 413.466369][T14406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 413.472537][T14406] dup_mmap+0xd8f/0x1d60 [ 413.476878][T14406] dup_mm+0x1f2/0x710 [ 413.480931][T14406] copy_process+0x3d50/0x8e30 [ 413.485695][T14406] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 413.492207][T14406] _do_fork+0x25c/0xeb0 [ 413.496638][T14406] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 413.502778][T14406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 413.508822][T14406] __se_sys_clone+0x32a/0x370 [ 413.513588][T14406] __x64_sys_clone+0x62/0x80 [ 413.518237][T14406] do_syscall_64+0xbc/0xf0 [ 413.522725][T14406] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 413.528691][T14406] RIP: 0033:0x459829 [ 413.532646][T14406] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.552304][T14406] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:58:33 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) r1 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r1, 0x0, 0x0) [ 413.560786][T14406] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 413.568811][T14406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 413.576834][T14406] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 413.584856][T14406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 413.592872][T14406] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:33 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x803, 0x3) r0 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:33 executing program 1 (fault-call:1 fault-nth:38): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:33 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x88}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 07:58:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 414.053847][T14428] FAULT_INJECTION: forcing a failure. [ 414.053847][T14428] name failslab, interval 1, probability 0, space 0, times 0 [ 414.066783][T14428] CPU: 1 PID: 14428 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 414.075652][T14428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.085748][T14428] Call Trace: [ 414.089107][T14428] dump_stack+0x191/0x1f0 [ 414.093497][T14428] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 414.099547][T14428] should_fail+0xa3f/0xa50 [ 414.104051][T14428] __should_failslab+0x264/0x280 [ 414.109090][T14428] should_failslab+0x29/0x70 [ 414.113754][T14428] kmem_cache_alloc+0xd6/0xd10 [ 414.118588][T14428] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 414.124799][T14428] ? anon_vma_clone+0x167/0xcb0 [ 414.129766][T14428] anon_vma_clone+0x167/0xcb0 [ 414.134537][T14428] anon_vma_fork+0xe8/0xb00 [ 414.139097][T14428] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 414.145128][T14428] ? vma_dup_policy+0xf9/0x190 [ 414.149953][T14428] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 414.156007][T14428] dup_mmap+0xd8f/0x1d60 [ 414.160345][T14428] dup_mm+0x1f2/0x710 [ 414.164406][T14428] copy_process+0x3d50/0x8e30 [ 414.169148][T14428] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 414.175330][T14428] _do_fork+0x25c/0xeb0 [ 414.179556][T14428] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 414.187240][T14428] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 414.193288][T14428] __se_sys_clone+0x32a/0x370 [ 414.198059][T14428] __x64_sys_clone+0x62/0x80 [ 414.202706][T14428] do_syscall_64+0xbc/0xf0 [ 414.207191][T14428] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 414.213118][T14428] RIP: 0033:0x459829 [ 414.217069][T14428] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.236805][T14428] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 414.245269][T14428] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 414.253276][T14428] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 414.261297][T14428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 414.269305][T14428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 414.277314][T14428] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:36 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) connect$packet(r0, &(0x7f00000001c0)={0x11, 0xd, 0x0, 0x1, 0x4, 0x6, @dev={[], 0x18}}, 0x14) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:36 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) chmod(&(0x7f0000000300)='./file0/file0\x00', 0x153) 07:58:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:36 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:36 executing program 1 (fault-call:1 fault-nth:39): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 416.356708][T14445] FAULT_INJECTION: forcing a failure. [ 416.356708][T14445] name failslab, interval 1, probability 0, space 0, times 0 [ 416.370129][T14445] CPU: 1 PID: 14445 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 416.378252][T14445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.388345][T14445] Call Trace: [ 416.391710][T14445] dump_stack+0x191/0x1f0 [ 416.396112][T14445] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 416.402156][T14445] should_fail+0xa3f/0xa50 07:58:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 416.406657][T14445] __should_failslab+0x264/0x280 [ 416.411762][T14445] should_failslab+0x29/0x70 [ 416.416423][T14445] kmem_cache_alloc+0xd6/0xd10 [ 416.421281][T14445] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 416.427505][T14445] ? anon_vma_clone+0x167/0xcb0 [ 416.432439][T14445] anon_vma_clone+0x167/0xcb0 [ 416.437208][T14445] anon_vma_fork+0xe8/0xb00 [ 416.441774][T14445] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 416.447815][T14445] ? vma_dup_policy+0xf9/0x190 [ 416.452649][T14445] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 416.458699][T14445] dup_mmap+0xd8f/0x1d60 [ 416.463061][T14445] dup_mm+0x1f2/0x710 [ 416.467121][T14445] copy_process+0x3d50/0x8e30 [ 416.471872][T14445] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 416.478045][T14445] _do_fork+0x25c/0xeb0 [ 416.482267][T14445] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 416.488400][T14445] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 416.494441][T14445] __se_sys_clone+0x32a/0x370 [ 416.499202][T14445] __x64_sys_clone+0x62/0x80 [ 416.503847][T14445] do_syscall_64+0xbc/0xf0 [ 416.508332][T14445] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 416.514294][T14445] RIP: 0033:0x459829 [ 416.518242][T14445] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.537889][T14445] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 416.546353][T14445] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:58:36 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r0, 0x0, 0x0) [ 416.554356][T14445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 416.562359][T14445] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 416.570369][T14445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 416.578410][T14445] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x20ff, &(0x7f0000000380)=0x0) sendmsg$alg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000001480)="799f4a29048d70a1933d848d8c7ada32df19f7e881174a1dec0a9479ff4d78476f5e37202e2d089a5e3a85cfec54ee053edc561dc0387b2b3fe94b224bef45990dcfbcce8492ef977464aaf6525fdf51268f9b3ae3d5c1edeb633a5974574a175aee741a3e04b5403ff917797195f55f", 0x70}], 0x1}, 0x0) io_submit(r2, 0x27f, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0xfdef}]) 07:58:36 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) connect$packet(r0, &(0x7f00000001c0)={0x11, 0xd, 0x0, 0x1, 0x4, 0x6, @dev={[], 0x18}}, 0x14) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:36 executing program 1 (fault-call:1 fault-nth:40): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:36 executing program 2: r0 = semget(0x0, 0x4, 0x210) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:37 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:37 executing program 0: [ 417.101429][T14476] FAULT_INJECTION: forcing a failure. [ 417.101429][T14476] name failslab, interval 1, probability 0, space 0, times 0 [ 417.114532][T14476] CPU: 1 PID: 14476 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 417.122566][T14476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.132666][T14476] Call Trace: [ 417.136045][T14476] dump_stack+0x191/0x1f0 [ 417.140474][T14476] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 417.146532][T14476] should_fail+0xa3f/0xa50 [ 417.151049][T14476] __should_failslab+0x264/0x280 [ 417.156068][T14476] should_failslab+0x29/0x70 [ 417.160740][T14476] kmem_cache_alloc+0xd6/0xd10 [ 417.165571][T14476] ? anon_vma_fork+0x1fe/0xb00 [ 417.170424][T14476] anon_vma_fork+0x1fe/0xb00 [ 417.175087][T14476] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 417.181129][T14476] ? vma_dup_policy+0xf9/0x190 [ 417.185965][T14476] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 417.192033][T14476] dup_mmap+0xd8f/0x1d60 [ 417.196433][T14476] dup_mm+0x1f2/0x710 [ 417.200508][T14476] copy_process+0x3d50/0x8e30 [ 417.205276][T14476] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 417.211453][T14476] _do_fork+0x25c/0xeb0 [ 417.215673][T14476] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 417.221810][T14476] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 417.227854][T14476] __se_sys_clone+0x32a/0x370 [ 417.232611][T14476] __x64_sys_clone+0x62/0x80 [ 417.237258][T14476] do_syscall_64+0xbc/0xf0 [ 417.241735][T14476] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 417.247671][T14476] RIP: 0033:0x459829 [ 417.251615][T14476] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.271262][T14476] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 417.279727][T14476] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 417.287732][T14476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 417.295738][T14476] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 417.303745][T14476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 417.311751][T14476] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:37 executing program 2: r0 = semget(0x0, 0x0, 0x210) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:37 executing program 0: 07:58:37 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:37 executing program 0: 07:58:37 executing program 1 (fault-call:1 fault-nth:41): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:37 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 417.722302][T14496] FAULT_INJECTION: forcing a failure. [ 417.722302][T14496] name failslab, interval 1, probability 0, space 0, times 0 [ 417.735183][T14496] CPU: 0 PID: 14496 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 417.743202][T14496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.753295][T14496] Call Trace: [ 417.756660][T14496] dump_stack+0x191/0x1f0 [ 417.761060][T14496] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 417.767111][T14496] should_fail+0xa3f/0xa50 [ 417.771618][T14496] __should_failslab+0x264/0x280 [ 417.776644][T14496] should_failslab+0x29/0x70 [ 417.781304][T14496] kmem_cache_alloc+0xd6/0xd10 [ 417.786132][T14496] ? anon_vma_fork+0x33a/0xb00 [ 417.790978][T14496] anon_vma_fork+0x33a/0xb00 [ 417.795635][T14496] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 417.801670][T14496] ? vma_dup_policy+0xf9/0x190 [ 417.806527][T14496] dup_mmap+0xd8f/0x1d60 [ 417.810880][T14496] dup_mm+0x1f2/0x710 [ 417.814937][T14496] copy_process+0x3d50/0x8e30 [ 417.819689][T14496] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 417.825850][T14496] _do_fork+0x25c/0xeb0 [ 417.830060][T14496] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 417.836366][T14496] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 417.842407][T14496] __se_sys_clone+0x32a/0x370 [ 417.847163][T14496] __x64_sys_clone+0x62/0x80 [ 417.851804][T14496] do_syscall_64+0xbc/0xf0 [ 417.856287][T14496] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 417.862214][T14496] RIP: 0033:0x459829 [ 417.866157][T14496] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.885808][T14496] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 417.894276][T14496] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 417.902280][T14496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 417.910286][T14496] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 417.918298][T14496] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 417.926307][T14496] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:39 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:39 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:39 executing program 0: 07:58:39 executing program 2: r0 = semget(0x0, 0x0, 0x210) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:39 executing program 1 (fault-call:1 fault-nth:42): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 419.894594][T14507] FAULT_INJECTION: forcing a failure. [ 419.894594][T14507] name failslab, interval 1, probability 0, space 0, times 0 [ 419.907551][T14507] CPU: 1 PID: 14507 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 419.915581][T14507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.925686][T14507] Call Trace: [ 419.929064][T14507] dump_stack+0x191/0x1f0 [ 419.933461][T14507] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 419.939543][T14507] should_fail+0xa3f/0xa50 [ 419.944054][T14507] __should_failslab+0x264/0x280 [ 419.949066][T14507] should_failslab+0x29/0x70 [ 419.953729][T14507] kmem_cache_alloc+0xd6/0xd10 [ 419.958559][T14507] ? dup_mmap+0xb6e/0x1d60 [ 419.963074][T14507] dup_mmap+0xb6e/0x1d60 [ 419.967413][T14507] dup_mm+0x1f2/0x710 [ 419.971463][T14507] copy_process+0x3d50/0x8e30 [ 419.976207][T14507] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 419.982373][T14507] _do_fork+0x25c/0xeb0 [ 419.986602][T14507] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 419.992745][T14507] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 419.998792][T14507] __se_sys_clone+0x32a/0x370 [ 420.003733][T14507] __x64_sys_clone+0x62/0x80 [ 420.008379][T14507] do_syscall_64+0xbc/0xf0 [ 420.012863][T14507] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 420.018796][T14507] RIP: 0033:0x459829 [ 420.022767][T14507] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.042428][T14507] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 420.050898][T14507] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 420.058910][T14507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 420.066931][T14507] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 420.075911][T14507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 420.083936][T14507] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:40 executing program 2: r0 = semget(0x0, 0x0, 0x210) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:40 executing program 0: 07:58:40 executing program 2: r0 = semget(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:40 executing program 1 (fault-call:1 fault-nth:43): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:40 executing program 0: [ 420.468849][T14531] FAULT_INJECTION: forcing a failure. [ 420.468849][T14531] name failslab, interval 1, probability 0, space 0, times 0 [ 420.481839][T14531] CPU: 1 PID: 14531 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 420.489865][T14531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.499954][T14531] Call Trace: [ 420.503326][T14531] dump_stack+0x191/0x1f0 [ 420.507729][T14531] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 420.513780][T14531] should_fail+0xa3f/0xa50 [ 420.518288][T14531] __should_failslab+0x264/0x280 [ 420.523301][T14531] should_failslab+0x29/0x70 [ 420.527965][T14531] kmem_cache_alloc+0xd6/0xd10 [ 420.532805][T14531] ? dup_mmap+0xb6e/0x1d60 [ 420.537308][T14531] ? dup_mmap+0xb2a/0x1d60 [ 420.541788][T14531] dup_mmap+0xb6e/0x1d60 [ 420.546131][T14531] dup_mm+0x1f2/0x710 [ 420.550269][T14531] copy_process+0x3d50/0x8e30 [ 420.555033][T14531] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 420.561219][T14531] _do_fork+0x25c/0xeb0 [ 420.565429][T14531] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 420.571562][T14531] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 420.577608][T14531] __se_sys_clone+0x32a/0x370 [ 420.582369][T14531] __x64_sys_clone+0x62/0x80 [ 420.587029][T14531] do_syscall_64+0xbc/0xf0 [ 420.591511][T14531] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 420.597444][T14531] RIP: 0033:0x459829 [ 420.601393][T14531] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.621052][T14531] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 420.629533][T14531] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 420.637590][T14531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 420.645603][T14531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 420.653617][T14531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 420.661629][T14531] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:43 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:43 executing program 0: 07:58:43 executing program 2: r0 = semget(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:43 executing program 1 (fault-call:1 fault-nth:44): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 423.016296][T14546] FAULT_INJECTION: forcing a failure. [ 423.016296][T14546] name failslab, interval 1, probability 0, space 0, times 0 [ 423.029684][T14546] CPU: 0 PID: 14546 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 423.037704][T14546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.047795][T14546] Call Trace: [ 423.051171][T14546] dump_stack+0x191/0x1f0 [ 423.055572][T14546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.061619][T14546] should_fail+0xa3f/0xa50 07:58:43 executing program 0: [ 423.066114][T14546] __should_failslab+0x264/0x280 [ 423.071126][T14546] should_failslab+0x29/0x70 [ 423.076315][T14546] kmem_cache_alloc+0xd6/0xd10 [ 423.081141][T14546] ? anon_vma_clone+0x167/0xcb0 [ 423.086040][T14546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.092096][T14546] anon_vma_clone+0x167/0xcb0 [ 423.096843][T14546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.102877][T14546] anon_vma_fork+0xe8/0xb00 [ 423.107436][T14546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.113471][T14546] ? vma_dup_policy+0xf9/0x190 [ 423.118300][T14546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.124342][T14546] dup_mmap+0xd8f/0x1d60 [ 423.128679][T14546] dup_mm+0x1f2/0x710 [ 423.132737][T14546] copy_process+0x3d50/0x8e30 [ 423.137485][T14546] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 423.143658][T14546] _do_fork+0x25c/0xeb0 [ 423.147868][T14546] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 423.154007][T14546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.160050][T14546] __se_sys_clone+0x32a/0x370 [ 423.164813][T14546] __x64_sys_clone+0x62/0x80 [ 423.169457][T14546] do_syscall_64+0xbc/0xf0 [ 423.173950][T14546] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 423.179877][T14546] RIP: 0033:0x459829 [ 423.183828][T14546] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 423.203472][T14546] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 423.211938][T14546] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 423.219973][T14546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 423.227999][T14546] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 423.236013][T14546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 423.244023][T14546] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:43 executing program 2: r0 = semget(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 07:58:43 executing program 2: semget(0x0, 0x4, 0x210) semctl$IPC_RMID(0x0, 0x0, 0x0) 07:58:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:43 executing program 0: 07:58:43 executing program 1 (fault-call:1 fault-nth:45): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 423.777744][T14572] FAULT_INJECTION: forcing a failure. [ 423.777744][T14572] name failslab, interval 1, probability 0, space 0, times 0 [ 423.790623][T14572] CPU: 1 PID: 14572 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 423.798653][T14572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.808736][T14572] Call Trace: [ 423.812092][T14572] dump_stack+0x191/0x1f0 [ 423.816479][T14572] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.822519][T14572] should_fail+0xa3f/0xa50 [ 423.827043][T14572] __should_failslab+0x264/0x280 [ 423.832045][T14572] should_failslab+0x29/0x70 [ 423.836697][T14572] kmem_cache_alloc+0xd6/0xd10 [ 423.841520][T14572] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 423.847726][T14572] ? anon_vma_clone+0x167/0xcb0 [ 423.852652][T14572] anon_vma_clone+0x167/0xcb0 [ 423.857457][T14572] anon_vma_fork+0xe8/0xb00 [ 423.862019][T14572] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.868051][T14572] ? vma_dup_policy+0xf9/0x190 [ 423.872877][T14572] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.878920][T14572] dup_mmap+0xd8f/0x1d60 [ 423.883339][T14572] dup_mm+0x1f2/0x710 [ 423.887392][T14572] copy_process+0x3d50/0x8e30 [ 423.892148][T14572] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 423.898306][T14572] _do_fork+0x25c/0xeb0 [ 423.902562][T14572] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 423.908693][T14572] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 423.914735][T14572] __se_sys_clone+0x32a/0x370 [ 423.919525][T14572] __x64_sys_clone+0x62/0x80 [ 423.924176][T14572] do_syscall_64+0xbc/0xf0 [ 423.928663][T14572] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 423.934596][T14572] RIP: 0033:0x459829 [ 423.938544][T14572] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 423.958189][T14572] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 423.966652][T14572] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 423.974659][T14572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 423.982674][T14572] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 423.990681][T14572] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 423.998692][T14572] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:46 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:46 executing program 2: semget(0x0, 0x4, 0x210) semctl$IPC_RMID(0x0, 0x0, 0x0) 07:58:46 executing program 0: 07:58:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:46 executing program 1 (fault-call:1 fault-nth:46): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 426.116529][T14582] FAULT_INJECTION: forcing a failure. [ 426.116529][T14582] name failslab, interval 1, probability 0, space 0, times 0 [ 426.129775][T14582] CPU: 0 PID: 14582 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 426.137811][T14582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.147909][T14582] Call Trace: [ 426.151277][T14582] dump_stack+0x191/0x1f0 [ 426.155671][T14582] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 426.161724][T14582] should_fail+0xa3f/0xa50 [ 426.166229][T14582] __should_failslab+0x264/0x280 [ 426.171242][T14582] should_failslab+0x29/0x70 [ 426.175909][T14582] kmem_cache_alloc+0xd6/0xd10 [ 426.181444][T14582] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 426.187632][T14582] ? anon_vma_clone+0x167/0xcb0 [ 426.192560][T14582] anon_vma_clone+0x167/0xcb0 [ 426.197316][T14582] anon_vma_fork+0xe8/0xb00 [ 426.201871][T14582] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 426.207896][T14582] ? vma_dup_policy+0xf9/0x190 [ 426.212732][T14582] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 426.218794][T14582] dup_mmap+0xd8f/0x1d60 [ 426.223145][T14582] dup_mm+0x1f2/0x710 [ 426.227209][T14582] copy_process+0x3d50/0x8e30 [ 426.231991][T14582] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 426.238167][T14582] _do_fork+0x25c/0xeb0 [ 426.242398][T14582] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 426.248578][T14582] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 426.254625][T14582] __se_sys_clone+0x32a/0x370 [ 426.259387][T14582] __x64_sys_clone+0x62/0x80 [ 426.264039][T14582] do_syscall_64+0xbc/0xf0 [ 426.268539][T14582] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 426.274469][T14582] RIP: 0033:0x459829 [ 426.278426][T14582] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.298073][T14582] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 426.306544][T14582] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:58:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:46 executing program 2: semget(0x0, 0x4, 0x210) semctl$IPC_RMID(0x0, 0x0, 0x0) [ 426.314555][T14582] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 426.322561][T14582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 426.330571][T14582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 426.338590][T14582] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:46 executing program 0: 07:58:46 executing program 2: 07:58:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000540)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) 07:58:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:49 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:49 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045017, 0x0) 07:58:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'yam\x00\x00\x10\x00', 0x2}) ioctl$TUNSETNOCSUM(r0, 0x800454dd, 0x70e000) 07:58:49 executing program 1 (fault-call:1 fault-nth:47): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 429.246038][T14621] FAULT_INJECTION: forcing a failure. [ 429.246038][T14621] name failslab, interval 1, probability 0, space 0, times 0 [ 429.259207][T14621] CPU: 0 PID: 14621 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 429.267237][T14621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.277332][T14621] Call Trace: [ 429.280700][T14621] dump_stack+0x191/0x1f0 [ 429.285096][T14621] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 429.291142][T14621] should_fail+0xa3f/0xa50 07:58:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 429.295640][T14621] __should_failslab+0x264/0x280 [ 429.300647][T14621] should_failslab+0x29/0x70 [ 429.305303][T14621] kmem_cache_alloc+0xd6/0xd10 [ 429.310141][T14621] ? anon_vma_fork+0x1fe/0xb00 [ 429.315016][T14621] anon_vma_fork+0x1fe/0xb00 [ 429.319673][T14621] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 429.325711][T14621] ? vma_dup_policy+0xf9/0x190 [ 429.330540][T14621] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 429.336588][T14621] dup_mmap+0xd8f/0x1d60 [ 429.340926][T14621] dup_mm+0x1f2/0x710 [ 429.345068][T14621] copy_process+0x3d50/0x8e30 [ 429.349814][T14621] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 429.355973][T14621] _do_fork+0x25c/0xeb0 [ 429.360189][T14621] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 429.366324][T14621] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 429.372365][T14621] __se_sys_clone+0x32a/0x370 [ 429.377123][T14621] __x64_sys_clone+0x62/0x80 [ 429.381774][T14621] do_syscall_64+0xbc/0xf0 [ 429.386255][T14621] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 429.392192][T14621] RIP: 0033:0x459829 [ 429.396148][T14621] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.415801][T14621] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 429.424265][T14621] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 429.432276][T14621] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 429.440284][T14621] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 429.448309][T14621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 429.456320][T14621] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:49 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000000000500e, 0x0) 07:58:49 executing program 1 (fault-call:1 fault-nth:48): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:49 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xe, &(0x7f000079bffc), &(0x7f0000000080)=0x4) 07:58:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 430.039363][T14649] FAULT_INJECTION: forcing a failure. [ 430.039363][T14649] name failslab, interval 1, probability 0, space 0, times 0 [ 430.052717][T14649] CPU: 1 PID: 14649 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 430.060746][T14649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.070835][T14649] Call Trace: [ 430.074944][T14649] dump_stack+0x191/0x1f0 [ 430.079347][T14649] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 430.085390][T14649] should_fail+0xa3f/0xa50 [ 430.089984][T14649] __should_failslab+0x264/0x280 [ 430.095025][T14649] should_failslab+0x29/0x70 [ 430.099677][T14649] kmem_cache_alloc+0xd6/0xd10 [ 430.104586][T14649] ? anon_vma_fork+0x33a/0xb00 [ 430.109455][T14649] anon_vma_fork+0x33a/0xb00 [ 430.114102][T14649] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 430.120131][T14649] ? vma_dup_policy+0xf9/0x190 [ 430.124968][T14649] dup_mmap+0xd8f/0x1d60 [ 430.129319][T14649] dup_mm+0x1f2/0x710 [ 430.133388][T14649] copy_process+0x3d50/0x8e30 [ 430.138138][T14649] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 430.144296][T14649] _do_fork+0x25c/0xeb0 [ 430.148514][T14649] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 430.154651][T14649] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 430.160695][T14649] __se_sys_clone+0x32a/0x370 [ 430.165460][T14649] __x64_sys_clone+0x62/0x80 [ 430.170107][T14649] do_syscall_64+0xbc/0xf0 [ 430.174601][T14649] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 430.182059][T14649] RIP: 0033:0x459829 [ 430.186036][T14649] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.205682][T14649] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 430.214148][T14649] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 430.222157][T14649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 430.230165][T14649] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 430.238174][T14649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 430.246186][T14649] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:52 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r2, 0x3, 0x0, 0x8001) fallocate(r2, 0x0, 0x0, 0xfff3) sendfile(r1, r1, 0x0, 0xa198) 07:58:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:58:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:52 executing program 1 (fault-call:1 fault-nth:49): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 432.337767][T14661] FAULT_INJECTION: forcing a failure. [ 432.337767][T14661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 432.351476][T14661] CPU: 0 PID: 14661 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 432.359533][T14661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.369628][T14661] Call Trace: [ 432.372997][T14661] dump_stack+0x191/0x1f0 [ 432.377389][T14661] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 432.383468][T14661] should_fail+0xa3f/0xa50 [ 432.387992][T14661] should_fail_alloc_page+0x1fb/0x270 [ 432.393453][T14661] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 432.399004][T14661] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 432.405149][T14661] ? __module_address+0x68/0x5e0 [ 432.410171][T14661] ? is_bpf_text_address+0x3c5/0x4b0 [ 432.415530][T14661] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 432.421652][T14661] ? is_bpf_text_address+0x47d/0x4b0 [ 432.427048][T14661] ? __kernel_text_address+0x24f/0x350 [ 432.432588][T14661] ? unwind_get_return_address+0x8c/0x130 [ 432.438371][T14661] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 432.444407][T14661] ? alloc_pages_current+0x412/0x9a0 [ 432.449745][T14661] alloc_pages_current+0x68d/0x9a0 [ 432.454913][T14661] ? stack_trace_save+0x128/0x1b0 [ 432.460029][T14661] pte_alloc_one+0x59/0x1a0 [ 432.464585][T14661] ? anon_vma_fork+0x33a/0xb00 [ 432.469399][T14661] ? dup_mmap+0xd8f/0x1d60 [ 432.473898][T14661] __pte_alloc+0x6d/0x460 [ 432.478291][T14661] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 432.484335][T14661] copy_page_range+0x3296/0x43a0 [ 432.489340][T14661] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 432.495570][T14661] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 432.501352][T14661] ? init_admin_reserve+0x160/0x160 [ 432.506652][T14661] dup_mmap+0x1510/0x1d60 [ 432.511076][T14661] dup_mm+0x1f2/0x710 [ 432.515131][T14661] copy_process+0x3d50/0x8e30 [ 432.519873][T14661] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 432.526038][T14661] _do_fork+0x25c/0xeb0 [ 432.530249][T14661] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 432.536381][T14661] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 432.542435][T14661] __se_sys_clone+0x32a/0x370 [ 432.547235][T14661] __x64_sys_clone+0x62/0x80 [ 432.551884][T14661] do_syscall_64+0xbc/0xf0 [ 432.556367][T14661] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 432.562297][T14661] RIP: 0033:0x459829 [ 432.566239][T14661] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.585880][T14661] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 432.594338][T14661] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 432.602342][T14661] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 432.610362][T14661] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 432.618373][T14661] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 432.626379][T14661] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x140, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0xc, 0x0, @u64}, @generic="0f33e877c866d3ece75da19ac6ad552ffd2d1fed8ecc2b45f6b0c88ca47e100dafab480e3efadb9c320a882f195a9978f62a8f7bddd460906165f077f5e862df3c7fe074f0ba71d3374918f91b403646d254e7772dbcd776b9b46f2cce7c0ccf7831b5d09e64a1a5edd0afe8e91b2e923adf7653732b791a172ee47f6a7fdeb1f9f3e7155a4dcb8400e157922f29a3765a71074bd81479de659e6f9530883b4e21114e08df04e96d709c4a29b5dbc01a00d469fe065b4930", @nested={0x64, 0x0, [@generic="9620b84842b969ca91cd0613e00a7bf53c41ba40dc73943cbfa8ca284f2a78cc014d9beb9ea16df09e8579ac21bb632f4cceb95bda92cdf655c0816ffacf160167b38c4d34d9b58971beee9a24c104e2a5b7dabc662f54dbb6bfe77fc4"]}, @generic='T']}, 0x140}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:58:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:52 executing program 1 (fault-call:1 fault-nth:50): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 433.063747][T14681] FAULT_INJECTION: forcing a failure. [ 433.063747][T14681] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 433.077495][T14681] CPU: 0 PID: 14681 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 433.085482][T14681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.095550][T14681] Call Trace: [ 433.098877][T14681] dump_stack+0x191/0x1f0 [ 433.103254][T14681] should_fail+0xa3f/0xa50 [ 433.107727][T14681] should_fail_alloc_page+0x1fb/0x270 [ 433.113117][T14681] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 433.118592][T14681] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 433.124774][T14681] ? kernel_poison_pages+0x40/0x360 [ 433.130001][T14681] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 433.136169][T14681] ? prep_new_page+0x792/0x9b0 [ 433.140983][T14681] ? kmsan_get_metadata_or_null+0x208/0x290 [ 433.146907][T14681] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 433.152990][T14681] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 433.158989][T14681] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 433.165423][T14681] kmsan_alloc_page+0x7a/0xf0 [ 433.170124][T14681] __alloc_pages_nodemask+0x142d/0x5fa0 [ 433.175689][T14681] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 433.181766][T14681] ? __module_address+0x68/0x5e0 [ 433.186716][T14681] ? is_bpf_text_address+0x3c5/0x4b0 [ 433.192021][T14681] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 433.198096][T14681] ? is_bpf_text_address+0x47d/0x4b0 [ 433.203425][T14681] ? unwind_get_return_address+0x8c/0x130 [ 433.209174][T14681] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 433.215164][T14681] ? alloc_pages_current+0x412/0x9a0 [ 433.220463][T14681] alloc_pages_current+0x68d/0x9a0 [ 433.225586][T14681] ? stack_trace_save+0x128/0x1b0 [ 433.230646][T14681] pte_alloc_one+0x59/0x1a0 [ 433.235160][T14681] ? anon_vma_fork+0x33a/0xb00 [ 433.239929][T14681] ? dup_mmap+0xd8f/0x1d60 [ 433.244361][T14681] __pte_alloc+0x6d/0x460 [ 433.248707][T14681] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 433.254712][T14681] copy_page_range+0x3296/0x43a0 [ 433.259675][T14681] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 433.265860][T14681] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 433.271603][T14681] ? init_admin_reserve+0x160/0x160 [ 433.276863][T14681] dup_mmap+0x1510/0x1d60 [ 433.281247][T14681] dup_mm+0x1f2/0x710 [ 433.285264][T14681] copy_process+0x3d50/0x8e30 [ 433.289971][T14681] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 433.296097][T14681] _do_fork+0x25c/0xeb0 [ 433.300259][T14681] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 433.306350][T14681] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 433.312376][T14681] __se_sys_clone+0x32a/0x370 [ 433.317092][T14681] __x64_sys_clone+0x62/0x80 [ 433.321695][T14681] do_syscall_64+0xbc/0xf0 [ 433.326132][T14681] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 433.332031][T14681] RIP: 0033:0x459829 [ 433.335933][T14681] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.355538][T14681] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:58:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000380)=0x2400a) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) 07:58:53 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 433.363961][T14681] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 433.371940][T14681] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 433.379917][T14681] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 433.387892][T14681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 433.395870][T14681] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r2, 0x3, 0x0, 0x8001) fallocate(r2, 0x0, 0x5e89, 0xfff3) sendfile(r1, r1, 0x0, 0xa198) 07:58:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:55 executing program 1 (fault-call:1 fault-nth:51): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:55 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:55 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:55 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) dup2(r0, r1) [ 435.729615][T14705] FAULT_INJECTION: forcing a failure. [ 435.729615][T14705] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 435.742882][T14705] CPU: 0 PID: 14705 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 435.750870][T14705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.760929][T14705] Call Trace: [ 435.764269][T14705] dump_stack+0x191/0x1f0 [ 435.768640][T14705] should_fail+0xa3f/0xa50 [ 435.773102][T14705] should_fail_alloc_page+0x1fb/0x270 [ 435.778520][T14705] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 435.784008][T14705] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 435.790186][T14705] ? kernel_poison_pages+0x40/0x360 [ 435.795429][T14705] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 435.801596][T14705] ? prep_new_page+0x792/0x9b0 [ 435.806422][T14705] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 435.812543][T14705] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 435.818561][T14705] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 435.825002][T14705] kmsan_alloc_page+0x7a/0xf0 07:58:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000003000/0x3000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 435.829716][T14705] __alloc_pages_nodemask+0x142d/0x5fa0 [ 435.835289][T14705] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 435.841373][T14705] ? __module_address+0x68/0x5e0 [ 435.846347][T14705] ? is_bpf_text_address+0x3c5/0x4b0 [ 435.851645][T14705] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 435.857721][T14705] ? is_bpf_text_address+0x47d/0x4b0 [ 435.863066][T14705] ? unwind_get_return_address+0x8c/0x130 [ 435.868822][T14705] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 435.874814][T14705] ? alloc_pages_current+0x412/0x9a0 [ 435.880116][T14705] alloc_pages_current+0x68d/0x9a0 [ 435.885236][T14705] ? stack_trace_save+0x128/0x1b0 [ 435.890292][T14705] pte_alloc_one+0x59/0x1a0 [ 435.894808][T14705] ? anon_vma_fork+0x33a/0xb00 [ 435.899580][T14705] ? dup_mmap+0xd8f/0x1d60 [ 435.904010][T14705] __pte_alloc+0x6d/0x460 [ 435.908356][T14705] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 435.914359][T14705] copy_page_range+0x3296/0x43a0 [ 435.919318][T14705] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 435.925506][T14705] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 435.931258][T14705] ? init_admin_reserve+0x160/0x160 [ 435.936542][T14705] dup_mmap+0x1510/0x1d60 [ 435.940930][T14705] dup_mm+0x1f2/0x710 [ 435.944941][T14705] copy_process+0x3d50/0x8e30 [ 435.949648][T14705] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 435.955768][T14705] _do_fork+0x25c/0xeb0 [ 435.959938][T14705] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 435.966034][T14705] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 435.982107][T14705] __se_sys_clone+0x32a/0x370 [ 435.986826][T14705] __x64_sys_clone+0x62/0x80 [ 435.991430][T14705] do_syscall_64+0xbc/0xf0 [ 435.995868][T14705] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 436.001765][T14705] RIP: 0033:0x459829 [ 436.005676][T14705] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.025294][T14705] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 436.033710][T14705] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 436.041682][T14705] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 436.049663][T14705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 436.057637][T14705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 436.065609][T14705] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:56 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:56 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00), 0x400034b, 0x24000004) 07:58:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 436.340008][T14724] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:58:56 executing program 1 (fault-call:1 fault-nth:52): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:56 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:56 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 436.572189][T14738] FAULT_INJECTION: forcing a failure. [ 436.572189][T14738] name failslab, interval 1, probability 0, space 0, times 0 [ 436.585026][T14738] CPU: 1 PID: 14738 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 436.593046][T14738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.603138][T14738] Call Trace: [ 436.606534][T14738] dump_stack+0x191/0x1f0 [ 436.610937][T14738] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 436.616983][T14738] should_fail+0xa3f/0xa50 [ 436.621502][T14738] __should_failslab+0x264/0x280 [ 436.626505][T14738] should_failslab+0x29/0x70 [ 436.631151][T14738] kmem_cache_alloc+0xd6/0xd10 [ 436.635992][T14738] ? dup_mmap+0xb6e/0x1d60 [ 436.640480][T14738] ? dup_mmap+0xb2a/0x1d60 [ 436.644960][T14738] dup_mmap+0xb6e/0x1d60 [ 436.649305][T14738] dup_mm+0x1f2/0x710 [ 436.653364][T14738] copy_process+0x3d50/0x8e30 [ 436.658119][T14738] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 436.664279][T14738] _do_fork+0x25c/0xeb0 [ 436.668500][T14738] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 436.674637][T14738] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 436.680676][T14738] __se_sys_clone+0x32a/0x370 [ 436.685439][T14738] __x64_sys_clone+0x62/0x80 [ 436.690090][T14738] do_syscall_64+0xbc/0xf0 [ 436.694575][T14738] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 436.700504][T14738] RIP: 0033:0x459829 [ 436.704450][T14738] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.724091][T14738] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 436.732549][T14738] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 436.740559][T14738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 436.748568][T14738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 436.756575][T14738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 436.764607][T14738] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:58 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:58 executing program 0: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 07:58:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1100, 0x0, 0x0, 0x0) 07:58:58 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:58 executing program 1 (fault-call:1 fault-nth:53): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 438.828582][T14751] FAULT_INJECTION: forcing a failure. [ 438.828582][T14751] name failslab, interval 1, probability 0, space 0, times 0 [ 438.841389][T14751] CPU: 1 PID: 14751 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 438.849420][T14751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.859515][T14751] Call Trace: [ 438.862879][T14751] dump_stack+0x191/0x1f0 [ 438.867280][T14751] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 438.873326][T14751] should_fail+0xa3f/0xa50 [ 438.877825][T14751] __should_failslab+0x264/0x280 [ 438.882834][T14751] should_failslab+0x29/0x70 [ 438.887498][T14751] kmem_cache_alloc+0xd6/0xd10 [ 438.892340][T14751] ? anon_vma_clone+0x167/0xcb0 [ 438.897257][T14751] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 438.903324][T14751] anon_vma_clone+0x167/0xcb0 [ 438.908089][T14751] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 438.914141][T14751] anon_vma_fork+0xe8/0xb00 [ 438.918709][T14751] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 438.924747][T14751] ? vma_dup_policy+0xf9/0x190 [ 438.929581][T14751] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 438.935637][T14751] dup_mmap+0xd8f/0x1d60 [ 438.939984][T14751] dup_mm+0x1f2/0x710 [ 438.944065][T14751] copy_process+0x3d50/0x8e30 [ 438.948833][T14751] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 438.955003][T14751] _do_fork+0x25c/0xeb0 [ 438.959219][T14751] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 438.965355][T14751] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 438.971397][T14751] __se_sys_clone+0x32a/0x370 [ 438.976156][T14751] __x64_sys_clone+0x62/0x80 [ 438.980798][T14751] do_syscall_64+0xbc/0xf0 [ 438.985278][T14751] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 438.991208][T14751] RIP: 0033:0x459829 [ 438.995161][T14751] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.014812][T14751] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:58:58 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) [ 439.023271][T14751] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 439.031283][T14751] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 439.039290][T14751] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 439.047299][T14751] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 439.055306][T14751] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:59 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:58:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004000), 0x3fffffffffffdb9, 0x2002, 0x0) 07:58:59 executing program 1 (fault-call:1 fault-nth:54): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:58:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x48) 07:58:59 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:58:59 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 439.527461][T14778] FAULT_INJECTION: forcing a failure. [ 439.527461][T14778] name failslab, interval 1, probability 0, space 0, times 0 [ 439.540251][T14778] CPU: 0 PID: 14778 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 439.548283][T14778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.558368][T14778] Call Trace: [ 439.561742][T14778] dump_stack+0x191/0x1f0 [ 439.566143][T14778] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 439.572198][T14778] should_fail+0xa3f/0xa50 [ 439.576690][T14778] __should_failslab+0x264/0x280 [ 439.581690][T14778] should_failslab+0x29/0x70 [ 439.586354][T14778] kmem_cache_alloc+0xd6/0xd10 [ 439.591188][T14778] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 439.597419][T14778] ? anon_vma_clone+0x167/0xcb0 [ 439.602356][T14778] anon_vma_clone+0x167/0xcb0 [ 439.607147][T14778] anon_vma_fork+0xe8/0xb00 [ 439.611745][T14778] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 439.617784][T14778] ? vma_dup_policy+0xf9/0x190 07:58:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x2fb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001840)=ANY=[@ANYBLOB="5e1bccd3dabb1f00000014150f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 439.622606][T14778] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 439.628657][T14778] dup_mmap+0xd8f/0x1d60 [ 439.633017][T14778] dup_mm+0x1f2/0x710 [ 439.637081][T14778] copy_process+0x3d50/0x8e30 [ 439.641841][T14778] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 439.648017][T14778] _do_fork+0x25c/0xeb0 [ 439.652285][T14778] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 439.658455][T14778] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 439.664524][T14778] __se_sys_clone+0x32a/0x370 [ 439.669333][T14778] __x64_sys_clone+0x62/0x80 [ 439.673977][T14778] do_syscall_64+0xbc/0xf0 [ 439.678456][T14778] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 439.684388][T14778] RIP: 0033:0x459829 [ 439.688334][T14778] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.707977][T14778] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 439.716442][T14778] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 439.724476][T14778] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 439.732521][T14778] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 439.740532][T14778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 439.748542][T14778] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:58:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:58:59 executing program 1 (fault-call:1 fault-nth:55): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:00 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:00 executing program 3: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:00 executing program 3: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 440.475347][T14811] FAULT_INJECTION: forcing a failure. [ 440.475347][T14811] name failslab, interval 1, probability 0, space 0, times 0 [ 440.488204][T14811] CPU: 1 PID: 14811 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 440.496231][T14811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.506328][T14811] Call Trace: [ 440.509694][T14811] dump_stack+0x191/0x1f0 [ 440.514096][T14811] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 440.520147][T14811] should_fail+0xa3f/0xa50 [ 440.524645][T14811] __should_failslab+0x264/0x280 [ 440.529661][T14811] should_failslab+0x29/0x70 [ 440.534323][T14811] kmem_cache_alloc+0xd6/0xd10 [ 440.539157][T14811] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 440.545374][T14811] ? anon_vma_clone+0x167/0xcb0 [ 440.550314][T14811] anon_vma_clone+0x167/0xcb0 [ 440.555090][T14811] anon_vma_fork+0xe8/0xb00 [ 440.559659][T14811] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 440.565698][T14811] ? vma_dup_policy+0xf9/0x190 [ 440.570529][T14811] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 440.576585][T14811] dup_mmap+0xd8f/0x1d60 [ 440.580933][T14811] dup_mm+0x1f2/0x710 [ 440.585002][T14811] copy_process+0x3d50/0x8e30 [ 440.589775][T14811] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 440.595948][T14811] _do_fork+0x25c/0xeb0 [ 440.600177][T14811] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 440.606329][T14811] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 440.612400][T14811] __se_sys_clone+0x32a/0x370 [ 440.617172][T14811] __x64_sys_clone+0x62/0x80 [ 440.621836][T14811] do_syscall_64+0xbc/0xf0 [ 440.626346][T14811] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 440.632289][T14811] RIP: 0033:0x459829 [ 440.636250][T14811] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.655901][T14811] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 440.664409][T14811] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 440.672420][T14811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 440.680457][T14811] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 440.688526][T14811] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 440.696550][T14811] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 07:59:04 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:04 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:04 executing program 3: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:04 executing program 1 (fault-call:1 fault-nth:56): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 444.711436][T14818] FAULT_INJECTION: forcing a failure. [ 444.711436][T14818] name failslab, interval 1, probability 0, space 0, times 0 [ 444.724307][T14818] CPU: 1 PID: 14818 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 444.732329][T14818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.742429][T14818] Call Trace: [ 444.745799][T14818] dump_stack+0x191/0x1f0 [ 444.750223][T14818] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 444.756266][T14818] should_fail+0xa3f/0xa50 [ 444.760764][T14818] __should_failslab+0x264/0x280 [ 444.765770][T14818] should_failslab+0x29/0x70 [ 444.770433][T14818] kmem_cache_alloc+0xd6/0xd10 [ 444.775270][T14818] ? anon_vma_fork+0x1fe/0xb00 [ 444.780129][T14818] anon_vma_fork+0x1fe/0xb00 [ 444.784797][T14818] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 444.790841][T14818] ? vma_dup_policy+0xf9/0x190 [ 444.795665][T14818] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 444.801713][T14818] dup_mmap+0xd8f/0x1d60 [ 444.806066][T14818] dup_mm+0x1f2/0x710 [ 444.810117][T14818] copy_process+0x3d50/0x8e30 [ 444.814866][T14818] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 444.821033][T14818] _do_fork+0x25c/0xeb0 [ 444.825245][T14818] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 444.831426][T14818] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 444.837482][T14818] __se_sys_clone+0x32a/0x370 [ 444.842246][T14818] __x64_sys_clone+0x62/0x80 [ 444.846890][T14818] do_syscall_64+0xbc/0xf0 [ 444.851369][T14818] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 444.857299][T14818] RIP: 0033:0x459829 [ 444.861243][T14818] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.880915][T14818] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 444.889377][T14818] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 444.897382][T14818] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:59:04 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) [ 444.905388][T14818] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 444.913397][T14818] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 444.921401][T14818] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x48) 07:59:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:05 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:05 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:05 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:05 executing program 1 (fault-call:1 fault-nth:57): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:05 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:59:05 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:05 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:05 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:05 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) [ 445.998504][T14866] FAULT_INJECTION: forcing a failure. [ 445.998504][T14866] name failslab, interval 1, probability 0, space 0, times 0 [ 446.011476][T14866] CPU: 0 PID: 14866 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 446.019539][T14866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.029628][T14866] Call Trace: [ 446.032981][T14866] dump_stack+0x191/0x1f0 [ 446.037366][T14866] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 446.043434][T14866] should_fail+0xa3f/0xa50 [ 446.047920][T14866] __should_failslab+0x264/0x280 [ 446.052918][T14866] should_failslab+0x29/0x70 [ 446.057574][T14866] kmem_cache_alloc+0xd6/0xd10 [ 446.062394][T14866] ? anon_vma_fork+0x33a/0xb00 [ 446.067258][T14866] anon_vma_fork+0x33a/0xb00 [ 446.071904][T14866] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 446.079393][T14866] ? vma_dup_policy+0xf9/0x190 [ 446.084234][T14866] dup_mmap+0xd8f/0x1d60 [ 446.088599][T14866] dup_mm+0x1f2/0x710 [ 446.092659][T14866] copy_process+0x3d50/0x8e30 [ 446.097424][T14866] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.103599][T14866] _do_fork+0x25c/0xeb0 [ 446.107805][T14866] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 446.113942][T14866] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 446.119978][T14866] __se_sys_clone+0x32a/0x370 [ 446.124738][T14866] __x64_sys_clone+0x62/0x80 [ 446.129385][T14866] do_syscall_64+0xbc/0xf0 [ 446.133866][T14866] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 446.139793][T14866] RIP: 0033:0x459829 [ 446.143740][T14866] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.164231][T14866] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 446.172694][T14866] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 446.181146][T14866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 446.189133][T14866] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 446.197138][T14866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 446.205145][T14866] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:06 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:06 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:06 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:06 executing program 1 (fault-call:1 fault-nth:58): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0x138, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@dev, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-avx2\x00'}}}]}, 0x138}}, 0x0) [ 446.742649][T14909] FAULT_INJECTION: forcing a failure. [ 446.742649][T14909] name failslab, interval 1, probability 0, space 0, times 0 [ 446.756034][T14909] CPU: 0 PID: 14909 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 446.764064][T14909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.774160][T14909] Call Trace: [ 446.777539][T14909] dump_stack+0x191/0x1f0 [ 446.781940][T14909] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 446.787996][T14909] should_fail+0xa3f/0xa50 [ 446.792499][T14909] __should_failslab+0x264/0x280 [ 446.797513][T14909] should_failslab+0x29/0x70 [ 446.802179][T14909] kmem_cache_alloc+0xd6/0xd10 [ 446.807022][T14909] ? dup_mmap+0xb6e/0x1d60 [ 446.811518][T14909] ? dup_mmap+0xb2a/0x1d60 [ 446.816021][T14909] dup_mmap+0xb6e/0x1d60 [ 446.820366][T14909] dup_mm+0x1f2/0x710 [ 446.824431][T14909] copy_process+0x3d50/0x8e30 [ 446.829191][T14909] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.835357][T14909] _do_fork+0x25c/0xeb0 07:59:06 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 446.839619][T14909] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 446.845770][T14909] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 446.851822][T14909] __se_sys_clone+0x32a/0x370 [ 446.856602][T14909] __x64_sys_clone+0x62/0x80 [ 446.861266][T14909] do_syscall_64+0xbc/0xf0 [ 446.865775][T14909] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 446.871717][T14909] RIP: 0033:0x459829 [ 446.875681][T14909] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.895336][T14909] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 446.903802][T14909] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 446.911813][T14909] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 446.919821][T14909] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 446.927831][T14909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 446.935842][T14909] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 07:59:07 executing program 1 (fault-call:1 fault-nth:59): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 447.229763][T14926] FAULT_INJECTION: forcing a failure. [ 447.229763][T14926] name failslab, interval 1, probability 0, space 0, times 0 [ 447.243117][T14926] CPU: 1 PID: 14926 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 447.251145][T14926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.261251][T14926] Call Trace: [ 447.264655][T14926] dump_stack+0x191/0x1f0 [ 447.269054][T14926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 447.275099][T14926] should_fail+0xa3f/0xa50 [ 447.279591][T14926] __should_failslab+0x264/0x280 [ 447.284589][T14926] should_failslab+0x29/0x70 [ 447.289240][T14926] kmem_cache_alloc+0xd6/0xd10 [ 447.294067][T14926] ? anon_vma_clone+0x167/0xcb0 [ 447.298969][T14926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 447.305032][T14926] anon_vma_clone+0x167/0xcb0 [ 447.309788][T14926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 447.315836][T14926] anon_vma_fork+0xe8/0xb00 [ 447.320395][T14926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 447.326421][T14926] ? vma_dup_policy+0xf9/0x190 [ 447.331251][T14926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 447.337297][T14926] dup_mmap+0xd8f/0x1d60 [ 447.341648][T14926] dup_mm+0x1f2/0x710 [ 447.345704][T14926] copy_process+0x3d50/0x8e30 [ 447.350455][T14926] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 447.356620][T14926] _do_fork+0x25c/0xeb0 [ 447.360833][T14926] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 447.366966][T14926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 447.373028][T14926] __se_sys_clone+0x32a/0x370 [ 447.377792][T14926] __x64_sys_clone+0x62/0x80 [ 447.382434][T14926] do_syscall_64+0xbc/0xf0 [ 447.386916][T14926] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 447.392848][T14926] RIP: 0033:0x459829 [ 447.396794][T14926] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 447.416446][T14926] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 447.424909][T14926] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 447.432918][T14926] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 447.440927][T14926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 447.448937][T14926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 447.456943][T14926] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:09 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:09 executing program 2: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:09 executing program 0: syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:59:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:09 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:09 executing program 1 (fault-call:1 fault-nth:60): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 449.000102][T14935] FAULT_INJECTION: forcing a failure. [ 449.000102][T14935] name failslab, interval 1, probability 0, space 0, times 0 [ 449.012874][T14935] CPU: 0 PID: 14935 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 449.020891][T14935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.030983][T14935] Call Trace: [ 449.034351][T14935] dump_stack+0x191/0x1f0 [ 449.038748][T14935] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.044802][T14935] should_fail+0xa3f/0xa50 [ 449.049338][T14935] __should_failslab+0x264/0x280 [ 449.054368][T14935] should_failslab+0x29/0x70 [ 449.059032][T14935] kmem_cache_alloc+0xd6/0xd10 [ 449.063863][T14935] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 449.070083][T14935] ? anon_vma_clone+0x167/0xcb0 [ 449.075059][T14935] anon_vma_clone+0x167/0xcb0 [ 449.079829][T14935] anon_vma_fork+0xe8/0xb00 [ 449.084403][T14935] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.090455][T14935] ? vma_dup_policy+0xf9/0x190 [ 449.095291][T14935] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.101433][T14935] dup_mmap+0xd8f/0x1d60 [ 449.105779][T14935] dup_mm+0x1f2/0x710 [ 449.109844][T14935] copy_process+0x3d50/0x8e30 [ 449.114605][T14935] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 449.120781][T14935] _do_fork+0x25c/0xeb0 [ 449.125002][T14935] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 449.131137][T14935] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.137274][T14935] __se_sys_clone+0x32a/0x370 [ 449.142056][T14935] __x64_sys_clone+0x62/0x80 07:59:09 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 449.146714][T14935] do_syscall_64+0xbc/0xf0 [ 449.151204][T14935] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 449.157304][T14935] RIP: 0033:0x459829 [ 449.161296][T14935] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.181599][T14935] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 449.190065][T14935] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 449.198074][T14935] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 449.206093][T14935] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 449.214106][T14935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 449.222116][T14935] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:09 executing program 2: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:09 executing program 1 (fault-call:1 fault-nth:61): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:09 executing program 2: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:09 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 449.645471][T14965] FAULT_INJECTION: forcing a failure. [ 449.645471][T14965] name failslab, interval 1, probability 0, space 0, times 0 [ 449.658906][T14965] CPU: 0 PID: 14965 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 449.666931][T14965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.677022][T14965] Call Trace: [ 449.680385][T14965] dump_stack+0x191/0x1f0 [ 449.684778][T14965] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.690824][T14965] should_fail+0xa3f/0xa50 [ 449.695321][T14965] __should_failslab+0x264/0x280 [ 449.700328][T14965] should_failslab+0x29/0x70 [ 449.704990][T14965] kmem_cache_alloc+0xd6/0xd10 [ 449.709829][T14965] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 449.716048][T14965] ? anon_vma_clone+0x167/0xcb0 [ 449.720991][T14965] anon_vma_clone+0x167/0xcb0 [ 449.725757][T14965] anon_vma_fork+0xe8/0xb00 [ 449.730326][T14965] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.736373][T14965] ? vma_dup_policy+0xf9/0x190 [ 449.741207][T14965] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.747265][T14965] dup_mmap+0xd8f/0x1d60 [ 449.751626][T14965] dup_mm+0x1f2/0x710 [ 449.755706][T14965] copy_process+0x3d50/0x8e30 [ 449.760462][T14965] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 449.766620][T14965] _do_fork+0x25c/0xeb0 [ 449.770841][T14965] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 449.776987][T14965] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 449.783040][T14965] __se_sys_clone+0x32a/0x370 [ 449.787827][T14965] __x64_sys_clone+0x62/0x80 [ 449.792489][T14965] do_syscall_64+0xbc/0xf0 [ 449.797218][T14965] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 449.803178][T14965] RIP: 0033:0x459829 [ 449.807132][T14965] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.826781][T14965] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 449.835244][T14965] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:59:09 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) [ 449.843254][T14965] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 449.851261][T14965] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 449.859269][T14965] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 449.867278][T14965] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:12 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:12 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:12 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:12 executing program 1 (fault-call:1 fault-nth:62): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:12 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000000100)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='\f', 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000005bc0)=[{{&(0x7f00000023c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) [ 452.119219][T14988] FAULT_INJECTION: forcing a failure. [ 452.119219][T14988] name failslab, interval 1, probability 0, space 0, times 0 [ 452.132611][T14988] CPU: 0 PID: 14988 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 452.140637][T14988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.150728][T14988] Call Trace: [ 452.154096][T14988] dump_stack+0x191/0x1f0 [ 452.158497][T14988] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 452.164563][T14988] should_fail+0xa3f/0xa50 [ 452.169066][T14988] __should_failslab+0x264/0x280 [ 452.174076][T14988] should_failslab+0x29/0x70 [ 452.178730][T14988] kmem_cache_alloc+0xd6/0xd10 [ 452.184196][T14988] ? anon_vma_fork+0x1fe/0xb00 [ 452.189037][T14988] anon_vma_fork+0x1fe/0xb00 [ 452.193702][T14988] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 452.199738][T14988] ? vma_dup_policy+0xf9/0x190 [ 452.204604][T14988] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 452.210656][T14988] dup_mmap+0xd8f/0x1d60 [ 452.215005][T14988] dup_mm+0x1f2/0x710 [ 452.219116][T14988] copy_process+0x3d50/0x8e30 [ 452.223885][T14988] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 452.230062][T14988] _do_fork+0x25c/0xeb0 [ 452.234285][T14988] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 452.240438][T14988] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 452.246498][T14988] __se_sys_clone+0x32a/0x370 [ 452.251307][T14988] __x64_sys_clone+0x62/0x80 [ 452.255967][T14988] do_syscall_64+0xbc/0xf0 [ 452.260462][T14988] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 452.266404][T14988] RIP: 0033:0x459829 [ 452.270349][T14988] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 452.289993][T14988] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 452.298452][T14988] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 452.306465][T14988] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:59:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 452.314502][T14988] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 452.322517][T14988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 452.330537][T14988] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:12 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="01"]) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 07:59:12 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2) 07:59:12 executing program 1 (fault-call:1 fault-nth:63): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:12 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x2, 0x4) recvmmsg(r0, &(0x7f0000006500), 0x1ce, 0x40010000, &(0x7f0000006700)={0x0, 0x1c9c380}) [ 452.887476][T15023] FAULT_INJECTION: forcing a failure. [ 452.887476][T15023] name failslab, interval 1, probability 0, space 0, times 0 [ 452.900382][T15023] CPU: 1 PID: 15023 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 452.908406][T15023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.918501][T15023] Call Trace: [ 452.921865][T15023] dump_stack+0x191/0x1f0 [ 452.926254][T15023] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 452.932641][T15023] should_fail+0xa3f/0xa50 [ 452.937134][T15023] __should_failslab+0x264/0x280 [ 452.942138][T15023] should_failslab+0x29/0x70 [ 452.946788][T15023] kmem_cache_alloc+0xd6/0xd10 [ 452.951608][T15023] ? anon_vma_fork+0x33a/0xb00 [ 452.956443][T15023] anon_vma_fork+0x33a/0xb00 [ 452.961093][T15023] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 452.967150][T15023] ? vma_dup_policy+0xf9/0x190 [ 452.971998][T15023] dup_mmap+0xd8f/0x1d60 [ 452.976348][T15023] dup_mm+0x1f2/0x710 [ 452.980401][T15023] copy_process+0x3d50/0x8e30 [ 452.985325][T15023] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 452.991486][T15023] _do_fork+0x25c/0xeb0 [ 452.995701][T15023] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 453.001847][T15023] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 453.007892][T15023] __se_sys_clone+0x32a/0x370 [ 453.012657][T15023] __x64_sys_clone+0x62/0x80 [ 453.017303][T15023] do_syscall_64+0xbc/0xf0 [ 453.021788][T15023] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 453.027720][T15023] RIP: 0033:0x459829 [ 453.031665][T15023] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.060265][T15023] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 453.068736][T15023] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 453.076743][T15023] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 453.084750][T15023] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 453.092761][T15023] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 453.100776][T15023] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:15 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, 0x0, 0x0) 07:59:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:15 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:15 executing program 1 (fault-call:1 fault-nth:64): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0xd3a0f466961b7523) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 455.275201][T15033] FAULT_INJECTION: forcing a failure. [ 455.275201][T15033] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 455.288669][T15033] CPU: 0 PID: 15033 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 455.296693][T15033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.306785][T15033] Call Trace: [ 455.310189][T15033] dump_stack+0x191/0x1f0 [ 455.314599][T15033] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 455.320655][T15033] should_fail+0xa3f/0xa50 [ 455.325156][T15033] should_fail_alloc_page+0x1fb/0x270 [ 455.330598][T15033] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 455.336124][T15033] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 455.342261][T15033] ? __module_address+0x68/0x5e0 [ 455.347272][T15033] ? is_bpf_text_address+0x3c5/0x4b0 [ 455.352714][T15033] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 455.358849][T15033] ? is_bpf_text_address+0x47d/0x4b0 [ 455.364266][T15033] ? __kernel_text_address+0x24f/0x350 [ 455.369820][T15033] ? unwind_get_return_address+0x8c/0x130 [ 455.375624][T15033] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 455.381665][T15033] ? alloc_pages_current+0x412/0x9a0 [ 455.387049][T15033] alloc_pages_current+0x68d/0x9a0 [ 455.392264][T15033] ? stack_trace_save+0x128/0x1b0 [ 455.397465][T15033] pte_alloc_one+0x59/0x1a0 [ 455.402057][T15033] ? anon_vma_fork+0x33a/0xb00 [ 455.406869][T15033] ? dup_mmap+0xd8f/0x1d60 [ 455.411355][T15033] __pte_alloc+0x6d/0x460 [ 455.415743][T15033] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 455.421785][T15033] copy_page_range+0x3296/0x43a0 [ 455.426814][T15033] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 455.432629][T15033] ? init_admin_reserve+0x160/0x160 [ 455.437929][T15033] dup_mmap+0x1510/0x1d60 [ 455.442358][T15033] dup_mm+0x1f2/0x710 [ 455.446424][T15033] copy_process+0x3d50/0x8e30 [ 455.451188][T15033] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 455.457383][T15033] _do_fork+0x25c/0xeb0 [ 455.461595][T15033] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 455.467729][T15033] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 455.473774][T15033] __se_sys_clone+0x32a/0x370 [ 455.478539][T15033] __x64_sys_clone+0x62/0x80 [ 455.483184][T15033] do_syscall_64+0xbc/0xf0 [ 455.487668][T15033] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 455.493622][T15033] RIP: 0033:0x459829 [ 455.497585][T15033] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.517264][T15033] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:59:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 455.525732][T15033] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 455.533738][T15033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 455.541748][T15033] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 455.549767][T15033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 455.557787][T15033] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:15 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, 0x0, 0x0) 07:59:15 executing program 1 (fault-call:1 fault-nth:65): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 455.945961][T15052] FAULT_INJECTION: forcing a failure. [ 455.945961][T15052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 455.959242][T15052] CPU: 1 PID: 15052 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 455.967233][T15052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.977318][T15052] Call Trace: [ 455.980642][T15052] dump_stack+0x191/0x1f0 [ 455.985007][T15052] should_fail+0xa3f/0xa50 [ 455.989483][T15052] should_fail_alloc_page+0x1fb/0x270 [ 455.994900][T15052] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 456.000393][T15052] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 456.006582][T15052] ? kernel_poison_pages+0x40/0x360 [ 456.011826][T15052] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 456.018003][T15052] ? prep_new_page+0x792/0x9b0 [ 456.022821][T15052] ? kmsan_get_metadata_or_null+0x208/0x290 [ 456.028767][T15052] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 456.034872][T15052] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 456.040893][T15052] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 456.047342][T15052] kmsan_alloc_page+0x7a/0xf0 [ 456.052061][T15052] __alloc_pages_nodemask+0x142d/0x5fa0 [ 456.057647][T15052] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 456.063850][T15052] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 456.069863][T15052] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 456.077149][T15052] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 456.083166][T15052] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 456.089291][T15052] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 456.095285][T15052] ? alloc_pages_current+0x412/0x9a0 [ 456.100605][T15052] alloc_pages_current+0x68d/0x9a0 [ 456.105766][T15052] pte_alloc_one+0x59/0x1a0 [ 456.110302][T15052] __pte_alloc+0x6d/0x460 [ 456.114662][T15052] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 456.120674][T15052] copy_page_range+0x3296/0x43a0 [ 456.125681][T15052] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 456.131444][T15052] ? init_admin_reserve+0x160/0x160 [ 456.136724][T15052] dup_mmap+0x1510/0x1d60 [ 456.141171][T15052] dup_mm+0x1f2/0x710 [ 456.145203][T15052] copy_process+0x3d50/0x8e30 [ 456.149921][T15052] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 456.156057][T15052] _do_fork+0x25c/0xeb0 [ 456.160236][T15052] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 456.166338][T15052] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 456.172344][T15052] __se_sys_clone+0x32a/0x370 [ 456.177104][T15052] __x64_sys_clone+0x62/0x80 [ 456.183352][T15052] do_syscall_64+0xbc/0xf0 [ 456.187792][T15052] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 456.193697][T15052] RIP: 0033:0x459829 [ 456.197604][T15052] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.217238][T15052] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 456.225661][T15052] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 456.233646][T15052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:59:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, 0x0, 0x0) 07:59:16 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 456.241631][T15052] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 456.249609][T15052] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 456.257585][T15052] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:18 executing program 1 (fault-call:1 fault-nth:66): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:18 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:18 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:18 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) setsockopt$packet_buf(r0, 0x107, 0x10000000000000f, &(0x7f0000000100)="3bc01361", 0x4) bind(r0, &(0x7f0000000340)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000400006f000000ff00000000000000000000000000000008000000000000000529b9c0d16c05544383fd2a769bde7945dc77343ed2988d"], 0x38) 07:59:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 07:59:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 458.527963][T15082] FAULT_INJECTION: forcing a failure. [ 458.527963][T15082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 458.541313][T15082] CPU: 1 PID: 15082 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 458.549308][T15082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.559366][T15082] Call Trace: [ 458.562686][T15082] dump_stack+0x191/0x1f0 [ 458.567066][T15082] should_fail+0xa3f/0xa50 [ 458.571514][T15082] should_fail_alloc_page+0x1fb/0x270 [ 458.576888][T15082] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 458.582354][T15082] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 458.588507][T15082] ? kernel_poison_pages+0x40/0x360 [ 458.593730][T15082] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 458.599875][T15082] ? prep_new_page+0x792/0x9b0 [ 458.604653][T15082] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 458.610766][T15082] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 458.616790][T15082] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 458.623208][T15082] kmsan_alloc_page+0x7a/0xf0 [ 458.627887][T15082] __alloc_pages_nodemask+0x142d/0x5fa0 [ 458.633543][T15082] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 458.639624][T15082] ? __module_address+0x68/0x5e0 [ 458.644579][T15082] ? is_bpf_text_address+0x3c5/0x4b0 [ 458.649882][T15082] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 458.655963][T15082] ? is_bpf_text_address+0x47d/0x4b0 [ 458.661274][T15082] ? unwind_get_return_address+0x8c/0x130 [ 458.667014][T15082] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 458.673002][T15082] ? alloc_pages_current+0x412/0x9a0 [ 458.678298][T15082] alloc_pages_current+0x68d/0x9a0 [ 458.683421][T15082] ? stack_trace_save+0x128/0x1b0 [ 458.688487][T15082] pte_alloc_one+0x59/0x1a0 [ 458.692994][T15082] ? anon_vma_fork+0x33a/0xb00 [ 458.697750][T15082] ? dup_mmap+0xd8f/0x1d60 [ 458.702162][T15082] __pte_alloc+0x6d/0x460 [ 458.706500][T15082] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 458.712500][T15082] copy_page_range+0x3296/0x43a0 [ 458.717456][T15082] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 458.723181][T15082] ? init_admin_reserve+0x160/0x160 [ 458.728417][T15082] dup_mmap+0x1510/0x1d60 [ 458.732775][T15082] dup_mm+0x1f2/0x710 [ 458.736765][T15082] copy_process+0x3d50/0x8e30 [ 458.741443][T15082] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 458.747553][T15082] _do_fork+0x25c/0xeb0 [ 458.751716][T15082] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 458.757795][T15082] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 458.763772][T15082] __se_sys_clone+0x32a/0x370 [ 458.768473][T15082] __x64_sys_clone+0x62/0x80 [ 458.773288][T15082] do_syscall_64+0xbc/0xf0 [ 458.777720][T15082] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 458.783619][T15082] RIP: 0033:0x459829 [ 458.787540][T15082] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.807137][T15082] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 458.815534][T15082] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:59:18 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) [ 458.823493][T15082] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 458.831473][T15082] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 458.839447][T15082] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 458.847402][T15082] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 07:59:19 executing program 1 (fault-call:1 fault-nth:67): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 07:59:19 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 459.240230][T15095] FAULT_INJECTION: forcing a failure. [ 459.240230][T15095] name failslab, interval 1, probability 0, space 0, times 0 [ 459.253214][T15095] CPU: 0 PID: 15095 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 459.261239][T15095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.271338][T15095] Call Trace: [ 459.274714][T15095] dump_stack+0x191/0x1f0 [ 459.279141][T15095] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 459.285207][T15095] should_fail+0xa3f/0xa50 [ 459.289708][T15095] __should_failslab+0x264/0x280 [ 459.294720][T15095] should_failslab+0x29/0x70 [ 459.299391][T15095] kmem_cache_alloc+0xd6/0xd10 [ 459.304226][T15095] ? dup_mmap+0xb6e/0x1d60 [ 459.308723][T15095] ? dup_mmap+0xb2a/0x1d60 [ 459.313240][T15095] dup_mmap+0xb6e/0x1d60 [ 459.317602][T15095] dup_mm+0x1f2/0x710 [ 459.321669][T15095] copy_process+0x3d50/0x8e30 [ 459.326430][T15095] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 459.332612][T15095] _do_fork+0x25c/0xeb0 [ 459.336834][T15095] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 459.342982][T15095] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 459.349057][T15095] __se_sys_clone+0x32a/0x370 [ 459.353836][T15095] __x64_sys_clone+0x62/0x80 [ 459.358481][T15095] do_syscall_64+0xbc/0xf0 [ 459.362967][T15095] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 459.368899][T15095] RIP: 0033:0x459829 07:59:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 459.372846][T15095] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.392495][T15095] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 459.401001][T15095] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 459.409009][T15095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 459.417019][T15095] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 459.425027][T15095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 459.433038][T15095] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:21 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x2}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 07:59:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2) 07:59:21 executing program 1 (fault-call:1 fault-nth:68): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:21 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) [ 461.480207][T15117] FAULT_INJECTION: forcing a failure. [ 461.480207][T15117] name failslab, interval 1, probability 0, space 0, times 0 [ 461.493072][T15117] CPU: 0 PID: 15117 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 461.501099][T15117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.511206][T15117] Call Trace: [ 461.514576][T15117] dump_stack+0x191/0x1f0 [ 461.518969][T15117] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 461.525010][T15117] should_fail+0xa3f/0xa50 [ 461.529501][T15117] __should_failslab+0x264/0x280 [ 461.534503][T15117] should_failslab+0x29/0x70 [ 461.539161][T15117] kmem_cache_alloc+0xd6/0xd10 [ 461.543985][T15117] ? anon_vma_clone+0x167/0xcb0 [ 461.548890][T15117] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 461.554944][T15117] anon_vma_clone+0x167/0xcb0 [ 461.559698][T15117] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 461.565740][T15117] anon_vma_fork+0xe8/0xb00 [ 461.570299][T15117] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 461.576327][T15117] ? vma_dup_policy+0xf9/0x190 [ 461.581146][T15117] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 461.587213][T15117] dup_mmap+0xd8f/0x1d60 [ 461.591555][T15117] dup_mm+0x1f2/0x710 [ 461.595614][T15117] copy_process+0x3d50/0x8e30 [ 461.600359][T15117] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 461.606516][T15117] _do_fork+0x25c/0xeb0 [ 461.610737][T15117] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 461.616874][T15117] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 461.622917][T15117] __se_sys_clone+0x32a/0x370 [ 461.627678][T15117] __x64_sys_clone+0x62/0x80 [ 461.632323][T15117] do_syscall_64+0xbc/0xf0 [ 461.636809][T15117] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 461.642742][T15117] RIP: 0033:0x459829 [ 461.646689][T15117] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 461.666338][T15117] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 461.674802][T15117] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 461.682806][T15117] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 461.690817][T15117] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 461.698825][T15117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 461.706835][T15117] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2) 07:59:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1000000000001001, 0x10, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d7a0fe53d18bdeeaf9992a6274d1f133265339760875816f8e05f5017251c59ff1ecca3fb66748fcb04a12ee049abd681b2b1156dd996eca33158bed9e762dfe", "f9d8bea67fcc8c587e1c2dcc29a48bd5ed4ebd603f89ae9040c5ca8346fa5bac"}) 07:59:21 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) 07:59:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2) 07:59:22 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x84a5, 0x6}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000014c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto(0xffffffffffffffff, &(0x7f00000001c0)="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", 0xf84, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 07:59:22 executing program 1 (fault-call:1 fault-nth:69): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1) 07:59:22 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x210) [ 462.385661][T15152] FAULT_INJECTION: forcing a failure. [ 462.385661][T15152] name failslab, interval 1, probability 0, space 0, times 0 [ 462.399176][T15152] CPU: 1 PID: 15152 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 462.407240][T15152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.417346][T15152] Call Trace: [ 462.420708][T15152] dump_stack+0x191/0x1f0 [ 462.425107][T15152] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 462.431170][T15152] should_fail+0xa3f/0xa50 [ 462.435670][T15152] __should_failslab+0x264/0x280 [ 462.440676][T15152] should_failslab+0x29/0x70 [ 462.445336][T15152] kmem_cache_alloc+0xd6/0xd10 [ 462.450167][T15152] ? anon_vma_fork+0x1fe/0xb00 [ 462.455001][T15152] anon_vma_fork+0x1fe/0xb00 [ 462.459661][T15152] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 462.465705][T15152] ? vma_dup_policy+0xf9/0x190 [ 462.470535][T15152] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 462.476588][T15152] dup_mmap+0xd8f/0x1d60 [ 462.480934][T15152] dup_mm+0x1f2/0x710 07:59:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) [ 462.485027][T15152] copy_process+0x3d50/0x8e30 [ 462.489846][T15152] _do_fork+0x25c/0xeb0 [ 462.494079][T15152] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 462.500216][T15152] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 462.506263][T15152] __se_sys_clone+0x32a/0x370 [ 462.511055][T15152] __x64_sys_clone+0x62/0x80 [ 462.515739][T15152] do_syscall_64+0xbc/0xf0 [ 462.520221][T15152] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 462.526154][T15152] RIP: 0033:0x459829 [ 462.530104][T15152] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.549754][T15152] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 462.558220][T15152] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 462.566235][T15152] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 462.574267][T15152] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 462.582327][T15152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 462.590341][T15152] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:25 executing program 1 (fault-call:1 fault-nth:70): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:25 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 07:59:25 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x0, 0x210) 07:59:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:59:25 executing program 0: [ 465.046875][T15179] FAULT_INJECTION: forcing a failure. [ 465.046875][T15179] name failslab, interval 1, probability 0, space 0, times 0 [ 465.059856][T15179] CPU: 1 PID: 15179 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 465.067885][T15179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.077975][T15179] Call Trace: [ 465.081348][T15179] dump_stack+0x191/0x1f0 [ 465.085740][T15179] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.091782][T15179] should_fail+0xa3f/0xa50 07:59:25 executing program 0: [ 465.096278][T15179] __should_failslab+0x264/0x280 [ 465.101281][T15179] should_failslab+0x29/0x70 [ 465.105938][T15179] kmem_cache_alloc+0xd6/0xd10 [ 465.110765][T15179] ? anon_vma_fork+0x33a/0xb00 [ 465.115607][T15179] anon_vma_fork+0x33a/0xb00 [ 465.120258][T15179] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.126287][T15179] ? vma_dup_policy+0xf9/0x190 [ 465.131135][T15179] dup_mmap+0xd8f/0x1d60 [ 465.135484][T15179] dup_mm+0x1f2/0x710 [ 465.139551][T15179] copy_process+0x3d50/0x8e30 [ 465.144336][T15179] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 465.150528][T15179] _do_fork+0x25c/0xeb0 [ 465.154750][T15179] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 465.160896][T15179] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.166944][T15179] __se_sys_clone+0x32a/0x370 [ 465.171707][T15179] __x64_sys_clone+0x62/0x80 [ 465.176368][T15179] do_syscall_64+0xbc/0xf0 [ 465.181332][T15179] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 465.187266][T15179] RIP: 0033:0x459829 [ 465.191220][T15179] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.210873][T15179] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 465.219340][T15179] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 465.227352][T15179] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 465.235363][T15179] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 465.243374][T15179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 465.251385][T15179] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00\xe5\xbd\ai\x1cH!\x96\x1d\x95\xfd\xca ]\n\xa5\xb7+O3\xab\xe8\xb2i\xa5q\xf9k\xc3\x1abImQ\xae\x15~\x99\x8b\xee\x14\xf0v$K\xa5\xa1\v\x8e\xa4y kq\xbb\xd0\xc9\xf6\xd4W\xd0~-\x1f\x17\xa1\v\x99\xda\xe7Tk$\x9f&\xafx~\x1e=\\') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 07:59:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:59:25 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x0, 0x210) 07:59:25 executing program 1 (fault-call:1 fault-nth:71): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 465.546370][T15199] FAULT_INJECTION: forcing a failure. [ 465.546370][T15199] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 465.559944][T15199] CPU: 1 PID: 15199 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 465.567969][T15199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.578062][T15199] Call Trace: [ 465.581433][T15199] dump_stack+0x191/0x1f0 [ 465.585827][T15199] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.591870][T15199] should_fail+0xa3f/0xa50 [ 465.596367][T15199] should_fail_alloc_page+0x1fb/0x270 [ 465.601808][T15199] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 465.607332][T15199] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 465.613458][T15199] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 465.619587][T15199] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 465.625807][T15199] ? update_stack_state+0xa12/0xb40 [ 465.631099][T15199] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 465.637231][T15199] ? __module_address+0x68/0x5e0 [ 465.642242][T15199] ? is_bpf_text_address+0x3c5/0x4b0 [ 465.647606][T15199] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 465.653746][T15199] ? is_bpf_text_address+0x47d/0x4b0 [ 465.659136][T15199] ? __kernel_text_address+0x24f/0x350 [ 465.664680][T15199] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.670720][T15199] ? alloc_pages_current+0x412/0x9a0 [ 465.676069][T15199] alloc_pages_current+0x68d/0x9a0 [ 465.681299][T15199] pte_alloc_one+0x59/0x1a0 [ 465.685880][T15199] copy_huge_pmd+0xf6/0xf80 [ 465.690456][T15199] ? kmsan_internal_poison_shadow+0x75/0xa0 [ 465.696444][T15199] ? kmsan_internal_poison_shadow+0x53/0xa0 [ 465.702390][T15199] ? kmsan_slab_alloc+0xaa/0x120 [ 465.707391][T15199] ? kmem_cache_alloc+0x8e3/0xd10 [ 465.712482][T15199] ? dup_mmap+0xd8f/0x1d60 [ 465.716965][T15199] ? __msan_poison_alloca+0x1c0/0x270 [ 465.722444][T15199] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.728536][T15199] copy_page_range+0x12d7/0x43a0 [ 465.733558][T15199] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 465.739800][T15199] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 465.745589][T15199] ? init_admin_reserve+0x160/0x160 [ 465.750879][T15199] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.756927][T15199] dup_mmap+0x1510/0x1d60 [ 465.761362][T15199] dup_mm+0x1f2/0x710 [ 465.765417][T15199] copy_process+0x3d50/0x8e30 [ 465.770164][T15199] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 465.776324][T15199] _do_fork+0x25c/0xeb0 [ 465.780533][T15199] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 465.786667][T15199] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 465.792713][T15199] __se_sys_clone+0x32a/0x370 [ 465.797482][T15199] __x64_sys_clone+0x62/0x80 [ 465.802126][T15199] do_syscall_64+0xbc/0xf0 [ 465.806631][T15199] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 465.812562][T15199] RIP: 0033:0x459829 [ 465.816511][T15199] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.836160][T15199] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:59:25 executing program 0: 07:59:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 465.844631][T15199] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 465.852642][T15199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 465.860651][T15199] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 465.868663][T15199] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 465.876675][T15199] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:28 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:28 executing program 2: 07:59:28 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x0, 0x210) 07:59:28 executing program 1 (fault-call:1 fault-nth:72): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:28 executing program 0: 07:59:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:28 executing program 2: [ 468.176335][T15220] FAULT_INJECTION: forcing a failure. [ 468.176335][T15220] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 468.190349][T15220] CPU: 0 PID: 15220 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 468.198378][T15220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.208437][T15220] Call Trace: [ 468.211755][T15220] dump_stack+0x191/0x1f0 [ 468.216131][T15220] should_fail+0xa3f/0xa50 [ 468.220586][T15220] should_fail_alloc_page+0x1fb/0x270 [ 468.225979][T15220] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 468.231452][T15220] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 468.237625][T15220] ? kernel_poison_pages+0x40/0x360 [ 468.242857][T15220] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 468.249022][T15220] ? prep_new_page+0x792/0x9b0 [ 468.253839][T15220] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 468.259930][T15220] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 468.265943][T15220] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 468.272380][T15220] kmsan_alloc_page+0x7a/0xf0 [ 468.277077][T15220] __alloc_pages_nodemask+0x142d/0x5fa0 [ 468.282637][T15220] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 468.288717][T15220] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 468.294845][T15220] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 468.301019][T15220] ? update_stack_state+0xa12/0xb40 [ 468.306246][T15220] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 468.312322][T15220] ? __module_address+0x68/0x5e0 [ 468.317288][T15220] ? is_bpf_text_address+0x3c5/0x4b0 [ 468.322593][T15220] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 468.328670][T15220] ? is_bpf_text_address+0x47d/0x4b0 [ 468.333989][T15220] ? __kernel_text_address+0x240/0x350 [ 468.339482][T15220] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 468.345469][T15220] ? alloc_pages_current+0x412/0x9a0 [ 468.350769][T15220] alloc_pages_current+0x68d/0x9a0 [ 468.355918][T15220] pte_alloc_one+0x59/0x1a0 [ 468.360447][T15220] copy_huge_pmd+0xf6/0xf80 [ 468.364960][T15220] ? kmsan_internal_poison_shadow+0x75/0xa0 [ 468.370860][T15220] ? kmsan_internal_poison_shadow+0x53/0xa0 [ 468.376761][T15220] ? kmsan_slab_alloc+0xaa/0x120 [ 468.381714][T15220] ? kmem_cache_alloc+0x8e3/0xd10 [ 468.386755][T15220] ? dup_mmap+0xd8f/0x1d60 [ 468.391182][T15220] ? __msan_poison_alloca+0x1c0/0x270 [ 468.396584][T15220] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 468.402594][T15220] copy_page_range+0x12d7/0x43a0 [ 468.407560][T15220] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 468.413752][T15220] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 468.419500][T15220] ? init_admin_reserve+0x160/0x160 [ 468.424749][T15220] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 468.430749][T15220] dup_mmap+0x1510/0x1d60 [ 468.435148][T15220] dup_mm+0x1f2/0x710 [ 468.439157][T15220] copy_process+0x3d50/0x8e30 [ 468.443858][T15220] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 468.449983][T15220] _do_fork+0x25c/0xeb0 [ 468.454149][T15220] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 468.460245][T15220] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 468.466247][T15220] __se_sys_clone+0x32a/0x370 [ 468.470974][T15220] __x64_sys_clone+0x62/0x80 [ 468.475581][T15220] do_syscall_64+0xbc/0xf0 [ 468.480015][T15220] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 468.485915][T15220] RIP: 0033:0x459829 [ 468.489834][T15220] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.509444][T15220] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 468.517866][T15220] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:59:28 executing program 0: [ 468.525839][T15220] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 468.533811][T15220] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 468.541787][T15220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 468.549759][T15220] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:28 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x0) 07:59:28 executing program 0: 07:59:28 executing program 1 (fault-call:1 fault-nth:73): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:28 executing program 2: [ 469.045530][T15241] FAULT_INJECTION: forcing a failure. [ 469.045530][T15241] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 469.058797][T15241] CPU: 0 PID: 15241 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 469.066790][T15241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.077364][T15241] Call Trace: [ 469.080691][T15241] dump_stack+0x191/0x1f0 [ 469.085058][T15241] should_fail+0xa3f/0xa50 [ 469.089523][T15241] should_fail_alloc_page+0x1fb/0x270 [ 469.094931][T15241] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 469.100417][T15241] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 469.106604][T15241] ? kernel_poison_pages+0x40/0x360 [ 469.111840][T15241] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 469.118697][T15241] ? prep_new_page+0x792/0x9b0 [ 469.123509][T15241] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 469.129592][T15241] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 469.135609][T15241] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 469.142048][T15241] kmsan_alloc_page+0x7a/0xf0 [ 469.146748][T15241] __alloc_pages_nodemask+0x142d/0x5fa0 [ 469.152316][T15241] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 469.158409][T15241] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 469.164497][T15241] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 469.170662][T15241] ? update_stack_state+0xa12/0xb40 [ 469.175890][T15241] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 469.181971][T15241] ? __module_address+0x68/0x5e0 [ 469.186924][T15241] ? is_bpf_text_address+0x3c5/0x4b0 [ 469.192229][T15241] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 469.198302][T15241] ? is_bpf_text_address+0x47d/0x4b0 [ 469.203652][T15241] ? __kernel_text_address+0x240/0x350 [ 469.209139][T15241] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 469.215137][T15241] ? alloc_pages_current+0x412/0x9a0 [ 469.220455][T15241] alloc_pages_current+0x68d/0x9a0 [ 469.225605][T15241] pte_alloc_one+0x59/0x1a0 [ 469.230130][T15241] copy_huge_pmd+0xf6/0xf80 [ 469.234645][T15241] ? kmsan_internal_poison_shadow+0x75/0xa0 [ 469.240542][T15241] ? kmsan_internal_poison_shadow+0x53/0xa0 [ 469.246444][T15241] ? kmsan_slab_alloc+0xaa/0x120 [ 469.251393][T15241] ? kmem_cache_alloc+0x8e3/0xd10 [ 469.256434][T15241] ? dup_mmap+0xd8f/0x1d60 [ 469.260860][T15241] ? __msan_poison_alloca+0x1c0/0x270 [ 469.266249][T15241] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 469.272250][T15241] copy_page_range+0x12d7/0x43a0 [ 469.277214][T15241] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 469.283404][T15241] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 469.289154][T15241] ? init_admin_reserve+0x160/0x160 [ 469.294404][T15241] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 469.300405][T15241] dup_mmap+0x1510/0x1d60 [ 469.304794][T15241] dup_mm+0x1f2/0x710 [ 469.308808][T15241] copy_process+0x3d50/0x8e30 [ 469.313521][T15241] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 469.319654][T15241] _do_fork+0x25c/0xeb0 [ 469.323820][T15241] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 469.329911][T15241] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 469.335911][T15241] __se_sys_clone+0x32a/0x370 [ 469.340630][T15241] __x64_sys_clone+0x62/0x80 [ 469.345238][T15241] do_syscall_64+0xbc/0xf0 [ 469.349674][T15241] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 469.355572][T15241] RIP: 0033:0x459829 [ 469.359471][T15241] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.379113][T15241] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 469.387561][T15241] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 469.395537][T15241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 469.403514][T15241] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 469.411493][T15241] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 469.419463][T15241] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:31 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:31 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x0) 07:59:31 executing program 0: 07:59:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:31 executing program 2: 07:59:31 executing program 1 (fault-call:1 fault-nth:74): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 471.619998][T15247] FAULT_INJECTION: forcing a failure. [ 471.619998][T15247] name failslab, interval 1, probability 0, space 0, times 0 [ 471.632872][T15247] CPU: 1 PID: 15247 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 471.640897][T15247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.650983][T15247] Call Trace: [ 471.654342][T15247] dump_stack+0x191/0x1f0 [ 471.658732][T15247] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 471.664774][T15247] should_fail+0xa3f/0xa50 [ 471.669313][T15247] __should_failslab+0x264/0x280 [ 471.674311][T15247] should_failslab+0x29/0x70 [ 471.678960][T15247] kmem_cache_alloc+0xd6/0xd10 [ 471.683809][T15247] ? dup_mmap+0xb6e/0x1d60 [ 471.688316][T15247] dup_mmap+0xb6e/0x1d60 [ 471.692659][T15247] dup_mm+0x1f2/0x710 [ 471.696716][T15247] copy_process+0x3d50/0x8e30 [ 471.701466][T15247] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 471.707626][T15247] _do_fork+0x25c/0xeb0 [ 471.711842][T15247] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 471.717980][T15247] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 471.724038][T15247] __se_sys_clone+0x32a/0x370 [ 471.728808][T15247] __x64_sys_clone+0x62/0x80 [ 471.733452][T15247] do_syscall_64+0xbc/0xf0 [ 471.737931][T15247] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 471.743863][T15247] RIP: 0033:0x459829 [ 471.747812][T15247] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.767462][T15247] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 471.775928][T15247] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 471.783935][T15247] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 471.791945][T15247] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 471.800069][T15247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 471.808100][T15247] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:31 executing program 0: 07:59:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) 07:59:32 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) semget(0x0, 0x4, 0x0) 07:59:32 executing program 1 (fault-call:1 fault-nth:75): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000040)={0x8, 0x1, 'client0\x00', 0x0, "1ae9646ea7e7d0d5", "4ed6fb9b543c279e2d1ee31f8caee0a1a4683e27d3473f28a89557f262deb075"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000801) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 07:59:32 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) [ 472.187771][T15268] FAULT_INJECTION: forcing a failure. [ 472.187771][T15268] name failslab, interval 1, probability 0, space 0, times 0 [ 472.200631][T15268] CPU: 1 PID: 15268 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 472.208652][T15268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.218753][T15268] Call Trace: [ 472.222141][T15268] dump_stack+0x191/0x1f0 [ 472.226556][T15268] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 472.232611][T15268] should_fail+0xa3f/0xa50 [ 472.237125][T15268] __should_failslab+0x264/0x280 [ 472.242143][T15268] should_failslab+0x29/0x70 [ 472.246817][T15268] kmem_cache_alloc+0xd6/0xd10 [ 472.251657][T15268] ? dup_mmap+0xb6e/0x1d60 [ 472.256154][T15268] ? dup_mmap+0xb2a/0x1d60 [ 472.260634][T15268] dup_mmap+0xb6e/0x1d60 [ 472.264974][T15268] dup_mm+0x1f2/0x710 [ 472.269028][T15268] copy_process+0x3d50/0x8e30 [ 472.273809][T15268] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 472.279970][T15268] _do_fork+0x25c/0xeb0 [ 472.284183][T15268] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 472.290322][T15268] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 472.296397][T15268] __se_sys_clone+0x32a/0x370 [ 472.301182][T15268] __x64_sys_clone+0x62/0x80 [ 472.305825][T15268] do_syscall_64+0xbc/0xf0 [ 472.310309][T15268] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 472.316257][T15268] RIP: 0033:0x459829 [ 472.320207][T15268] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.339854][T15268] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 472.348329][T15268] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 472.356345][T15268] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 472.364354][T15268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 472.372362][T15268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 472.380387][T15268] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:35 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:35 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0xffffffffffffffff) 07:59:35 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 07:59:35 executing program 1 (fault-call:1 fault-nth:76): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000040)={0x8, 0x1, 'client0\x00', 0x0, "1ae9646ea7e7d0d5", "4ed6fb9b543c279e2d1ee31f8caee0a1a4683e27d3473f28a89557f262deb075"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000801) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 07:59:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 475.104090][T15290] FAULT_INJECTION: forcing a failure. [ 475.104090][T15290] name failslab, interval 1, probability 0, space 0, times 0 [ 475.116904][T15290] CPU: 0 PID: 15290 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 475.124962][T15290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.135084][T15290] Call Trace: [ 475.138443][T15290] dump_stack+0x191/0x1f0 [ 475.142831][T15290] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 475.148874][T15290] should_fail+0xa3f/0xa50 [ 475.153383][T15290] __should_failslab+0x264/0x280 [ 475.158379][T15290] should_failslab+0x29/0x70 [ 475.163042][T15290] kmem_cache_alloc+0xd6/0xd10 [ 475.167861][T15290] ? anon_vma_clone+0x167/0xcb0 [ 475.172761][T15290] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 475.178809][T15290] anon_vma_clone+0x167/0xcb0 [ 475.183581][T15290] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 475.189625][T15290] anon_vma_fork+0xe8/0xb00 [ 475.194180][T15290] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 475.200206][T15290] ? vma_dup_policy+0xf9/0x190 [ 475.205026][T15290] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 475.211071][T15290] dup_mmap+0xd8f/0x1d60 [ 475.215410][T15290] dup_mm+0x1f2/0x710 [ 475.219462][T15290] copy_process+0x3d50/0x8e30 [ 475.224212][T15290] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 475.230374][T15290] _do_fork+0x25c/0xeb0 [ 475.234590][T15290] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 475.240741][T15290] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 475.246786][T15290] __se_sys_clone+0x32a/0x370 [ 475.251545][T15290] __x64_sys_clone+0x62/0x80 [ 475.256200][T15290] do_syscall_64+0xbc/0xf0 [ 475.260679][T15290] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 475.266610][T15290] RIP: 0033:0x459829 [ 475.270561][T15290] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.290222][T15290] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 475.298699][T15290] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 475.306712][T15290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 475.314723][T15290] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 475.322740][T15290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 475.330749][T15290] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:35 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2088000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:59:35 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000280)="2e00000022004786006d20002b1f003500b00000000000000000000d4ab4268dd93f748d2d671af9336056ac3dbd", 0x128) 07:59:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000040)={0x8, 0x1, 'client0\x00', 0x0, "1ae9646ea7e7d0d5", "4ed6fb9b543c279e2d1ee31f8caee0a1a4683e27d3473f28a89557f262deb075"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000801) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 07:59:35 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:35 executing program 1 (fault-call:1 fault-nth:77): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:35 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b1a3fd800000000a3", 0xffc0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x11, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0xac0}, {&(0x7f00000000c0)=""/85, 0x2f}, {&(0x7f0000000780)=""/4096, 0x1050}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x400000000000334, 0x6, &(0x7f0000003700)={0x77359400}) 07:59:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000180)={@dev}, 0x142) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:59:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:36 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 07:59:36 executing program 2: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9a9009eb) futimesat(r0, 0x0, 0x0) getpgid(0xffffffffffffffff) fsync(r0) [ 476.154333][T15318] FAULT_INJECTION: forcing a failure. [ 476.154333][T15318] name failslab, interval 1, probability 0, space 0, times 0 [ 476.167279][T15318] CPU: 0 PID: 15318 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 476.175335][T15318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.186520][T15318] Call Trace: [ 476.189898][T15318] dump_stack+0x191/0x1f0 [ 476.194317][T15318] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 476.200384][T15318] should_fail+0xa3f/0xa50 [ 476.204892][T15318] __should_failslab+0x264/0x280 [ 476.209904][T15318] should_failslab+0x29/0x70 [ 476.214565][T15318] kmem_cache_alloc+0xd6/0xd10 [ 476.219393][T15318] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 476.225608][T15318] ? anon_vma_clone+0x167/0xcb0 [ 476.230535][T15318] anon_vma_clone+0x167/0xcb0 [ 476.235307][T15318] anon_vma_fork+0xe8/0xb00 [ 476.239865][T15318] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 476.245898][T15318] ? vma_dup_policy+0xf9/0x190 [ 476.250724][T15318] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 476.256769][T15318] dup_mmap+0xd8f/0x1d60 [ 476.261105][T15318] dup_mm+0x1f2/0x710 [ 476.265162][T15318] copy_process+0x3d50/0x8e30 [ 476.269908][T15318] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 476.276073][T15318] _do_fork+0x25c/0xeb0 [ 476.280286][T15318] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 476.286422][T15318] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 476.292475][T15318] __se_sys_clone+0x32a/0x370 [ 476.297236][T15318] __x64_sys_clone+0x62/0x80 [ 476.301885][T15318] do_syscall_64+0xbc/0xf0 [ 476.306371][T15318] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 476.312302][T15318] RIP: 0033:0x459829 [ 476.316255][T15318] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.335907][T15318] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 476.344378][T15318] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 07:59:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000040)={0x8, 0x1, 'client0\x00', 0x0, "1ae9646ea7e7d0d5", "4ed6fb9b543c279e2d1ee31f8caee0a1a4683e27d3473f28a89557f262deb075"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000801) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 476.352389][T15318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 476.360399][T15318] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 476.368406][T15318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 476.376413][T15318] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000080000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000003c0)={0x40011, @dev, 0x0, 0x1, 'none\x00\x00\x00\x00\x00\x00\xde\xff\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 07:59:36 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 07:59:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001080)='net/tcp6\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000000), 0x14a9) 07:59:36 executing program 1 (fault-call:1 fault-nth:78): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8001}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 07:59:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:37 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 07:59:37 executing program 5: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000440)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1/file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) 07:59:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@local}, 0xfea2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 477.257600][T15362] FAULT_INJECTION: forcing a failure. [ 477.257600][T15362] name failslab, interval 1, probability 0, space 0, times 0 [ 477.270997][T15362] CPU: 1 PID: 15362 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 477.279029][T15362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.289130][T15362] Call Trace: [ 477.292496][T15362] dump_stack+0x191/0x1f0 [ 477.296908][T15362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 477.302960][T15362] should_fail+0xa3f/0xa50 [ 477.307452][T15362] __should_failslab+0x264/0x280 [ 477.312450][T15362] should_failslab+0x29/0x70 [ 477.317109][T15362] kmem_cache_alloc+0xd6/0xd10 [ 477.321937][T15362] ? anon_vma_interval_tree_insert+0x5ee/0x630 [ 477.328140][T15362] ? anon_vma_clone+0x167/0xcb0 [ 477.333068][T15362] anon_vma_clone+0x167/0xcb0 [ 477.337833][T15362] anon_vma_fork+0xe8/0xb00 [ 477.342395][T15362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 477.348422][T15362] ? vma_dup_policy+0xf9/0x190 [ 477.353245][T15362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 477.359298][T15362] dup_mmap+0xd8f/0x1d60 [ 477.363642][T15362] dup_mm+0x1f2/0x710 [ 477.367700][T15362] copy_process+0x3d50/0x8e30 [ 477.372453][T15362] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 477.378622][T15362] _do_fork+0x25c/0xeb0 [ 477.382837][T15362] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 477.388976][T15362] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 477.395027][T15362] __se_sys_clone+0x32a/0x370 [ 477.399798][T15362] __x64_sys_clone+0x62/0x80 [ 477.404449][T15362] do_syscall_64+0xbc/0xf0 [ 477.408935][T15362] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 477.414866][T15362] RIP: 0033:0x459829 [ 477.418812][T15362] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.438461][T15362] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 477.446934][T15362] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 477.454947][T15362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 477.462961][T15362] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 477.470974][T15362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 477.478982][T15362] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:37 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 07:59:37 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) accept$inet6(r3, 0x0, &(0x7f00000002c0)) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 07:59:37 executing program 5: r0 = socket(0x1000000010, 0x4008000000803, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x33c) r1 = gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffffffffffffff1a) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1be) getsockname(r0, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x80) r2 = geteuid() setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in=@empty, 0x4e23, 0x7, 0x4e24, 0x0, 0x2, 0xa0, 0x0, 0x87, 0x0, r2}, {0x3ff, 0x0, 0x11da, 0x8000, 0x6, 0x9, 0x0, 0x100}, {0xfffffffffffff5e8, 0x0, 0x1, 0x3}, 0xc78, 0x6e6bb5, 0x0, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x9, 0x0, 0x32}, 0xa, @in6=@ipv4={[], [], @empty}, 0x3504, 0x0, 0x3, 0x0, 0xe4a, 0x6}}, 0xe8) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000400)={0x8cde, {{0x2, 0x4e21, @remote}}}, 0x88) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) read$char_usb(r3, &(0x7f0000000500)=""/4096, 0x1000) sched_getscheduler(0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000003c0)="7e7e07e32576b3937fafe85e6e85cdc07ce47ef140d4e55d32c7f1f574c152c55e5a36146218cc491849cf71f4bfc4d1641be15e0417898a04", 0x39) tkill(r1, 0x1000000000016) 07:59:37 executing program 0: r0 = socket(0x1000000010, 0x4008000000803, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x33c) r1 = gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffffffffffffff1a) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) tkill(r1, 0x1000000000016) 07:59:38 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 07:59:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:38 executing program 1 (fault-call:1 fault-nth:79): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:38 executing program 0: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\xff', 0x8380, 0x0) 07:59:38 executing program 0: clone(0x8000100000201, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file1\x00', 0xc808, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000380)) [ 478.251205][T15406] FAULT_INJECTION: forcing a failure. [ 478.251205][T15406] name failslab, interval 1, probability 0, space 0, times 0 [ 478.264676][T15406] CPU: 0 PID: 15406 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 478.272696][T15406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.282782][T15406] Call Trace: [ 478.286147][T15406] dump_stack+0x191/0x1f0 [ 478.290548][T15406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 478.296617][T15406] should_fail+0xa3f/0xa50 [ 478.301113][T15406] __should_failslab+0x264/0x280 [ 478.306130][T15406] should_failslab+0x29/0x70 [ 478.310796][T15406] kmem_cache_alloc+0xd6/0xd10 [ 478.315625][T15406] ? anon_vma_fork+0x1fe/0xb00 [ 478.320459][T15406] anon_vma_fork+0x1fe/0xb00 [ 478.325101][T15406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 478.331143][T15406] ? vma_dup_policy+0xf9/0x190 [ 478.335966][T15406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 478.342029][T15406] dup_mmap+0xd8f/0x1d60 [ 478.346365][T15406] dup_mm+0x1f2/0x710 [ 478.350417][T15406] copy_process+0x3d50/0x8e30 [ 478.355186][T15406] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 478.361378][T15406] _do_fork+0x25c/0xeb0 [ 478.365589][T15406] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 478.371725][T15406] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 478.377771][T15406] __se_sys_clone+0x32a/0x370 [ 478.382530][T15406] __x64_sys_clone+0x62/0x80 [ 478.387199][T15406] do_syscall_64+0xbc/0xf0 [ 478.391682][T15406] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 478.397617][T15406] RIP: 0033:0x459829 [ 478.401649][T15406] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.421383][T15406] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 478.429843][T15406] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 478.437849][T15406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:59:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) sendmsg$unix(r1, &(0x7f0000000b80)={&(0x7f0000000100)=@abs, 0x6e, 0x0}, 0x20008000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000000140)=""/11, 0xdd) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = dup2(r2, r0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, 0x0) [ 478.445858][T15406] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 478.453867][T15406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 478.461877][T15406] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:38 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 07:59:38 executing program 1 (fault-call:1 fault-nth:80): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0x80404509, 0x0) 07:59:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100), 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 479.052245][T15435] FAULT_INJECTION: forcing a failure. [ 479.052245][T15435] name failslab, interval 1, probability 0, space 0, times 0 [ 479.065081][T15435] CPU: 1 PID: 15435 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 479.073391][T15435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.083484][T15435] Call Trace: [ 479.086850][T15435] dump_stack+0x191/0x1f0 [ 479.091242][T15435] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 479.097288][T15435] should_fail+0xa3f/0xa50 [ 479.101784][T15435] __should_failslab+0x264/0x280 [ 479.106788][T15435] should_failslab+0x29/0x70 [ 479.111652][T15435] kmem_cache_alloc+0xd6/0xd10 [ 479.116702][T15435] ? anon_vma_fork+0x33a/0xb00 [ 479.121631][T15435] anon_vma_fork+0x33a/0xb00 [ 479.126280][T15435] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 479.132311][T15435] ? vma_dup_policy+0xf9/0x190 [ 479.137153][T15435] dup_mmap+0xd8f/0x1d60 [ 479.141771][T15435] dup_mm+0x1f2/0x710 [ 479.145836][T15435] copy_process+0x3d50/0x8e30 [ 479.150586][T15435] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 479.156757][T15435] _do_fork+0x25c/0xeb0 [ 479.160979][T15435] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 479.167123][T15435] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 479.173193][T15435] __se_sys_clone+0x32a/0x370 [ 479.177954][T15435] __x64_sys_clone+0x62/0x80 [ 479.182604][T15435] do_syscall_64+0xbc/0xf0 [ 479.187505][T15435] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 479.193463][T15435] RIP: 0033:0x459829 [ 479.197414][T15435] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.217164][T15435] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 479.225632][T15435] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 479.233641][T15435] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 479.241652][T15435] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 479.249701][T15435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 479.257712][T15435] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:39 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 07:59:39 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x10000000005) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) sendmsg$nl_generic(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 07:59:39 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x10000000005) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 07:59:39 executing program 1 (fault-call:1 fault-nth:81): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:39 executing program 2: 07:59:39 executing program 3: 07:59:39 executing program 2: 07:59:39 executing program 5: 07:59:40 executing program 0: 07:59:40 executing program 3: 07:59:40 executing program 5: [ 480.137858][T15473] FAULT_INJECTION: forcing a failure. [ 480.137858][T15473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.151399][T15473] CPU: 1 PID: 15473 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 480.159420][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.169757][T15473] Call Trace: [ 480.173125][T15473] dump_stack+0x191/0x1f0 [ 480.177522][T15473] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.185051][T15473] should_fail+0xa3f/0xa50 [ 480.189548][T15473] should_fail_alloc_page+0x1fb/0x270 [ 480.195218][T15473] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 480.200736][T15473] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 480.206857][T15473] ? __module_address+0x68/0x5e0 [ 480.211858][T15473] ? is_bpf_text_address+0x3c5/0x4b0 [ 480.217210][T15473] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 480.223347][T15473] ? is_bpf_text_address+0x47d/0x4b0 [ 480.228715][T15473] ? __kernel_text_address+0x24f/0x350 [ 480.234238][T15473] ? unwind_get_return_address+0x8c/0x130 [ 480.240027][T15473] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 480.246150][T15473] ? sctp_sock_dump+0xc31/0xe80 [ 480.251080][T15473] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.257117][T15473] ? alloc_pages_current+0x412/0x9a0 [ 480.262470][T15473] alloc_pages_current+0x68d/0x9a0 [ 480.267879][T15473] get_zeroed_page+0x47/0xd0 [ 480.272531][T15473] __pud_alloc+0x9f/0x370 [ 480.277030][T15473] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.283085][T15473] copy_page_range+0x400d/0x43a0 [ 480.288117][T15473] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 480.294333][T15473] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.300651][T15473] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 480.306874][T15473] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.312917][T15473] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 480.319206][T15473] ? __rb_insert_augmented+0xba8/0x1140 [ 480.325033][T15473] ? init_admin_reserve+0x160/0x160 [ 480.330329][T15473] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.336378][T15473] dup_mmap+0x1510/0x1d60 [ 480.340806][T15473] dup_mm+0x1f2/0x710 [ 480.345065][T15473] copy_process+0x3d50/0x8e30 [ 480.349862][T15473] _do_fork+0x25c/0xeb0 [ 480.354077][T15473] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 480.360211][T15473] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.366258][T15473] __se_sys_clone+0x32a/0x370 [ 480.371035][T15473] __x64_sys_clone+0x62/0x80 [ 480.375701][T15473] do_syscall_64+0xbc/0xf0 [ 480.380183][T15473] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 480.386118][T15473] RIP: 0033:0x459829 [ 480.390074][T15473] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.409727][T15473] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 480.418195][T15473] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 480.426203][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 480.434213][T15473] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 480.442229][T15473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 480.450235][T15473] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100), 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:40 executing program 0: 07:59:40 executing program 3: 07:59:40 executing program 5: 07:59:40 executing program 1 (fault-call:1 fault-nth:82): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:40 executing program 2: 07:59:40 executing program 5: 07:59:40 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:40 executing program 3: 07:59:40 executing program 3: [ 480.891970][T15503] FAULT_INJECTION: forcing a failure. [ 480.891970][T15503] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.905232][T15503] CPU: 1 PID: 15503 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 480.913218][T15503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.923273][T15503] Call Trace: [ 480.926589][T15503] dump_stack+0x191/0x1f0 [ 480.930942][T15503] should_fail+0xa3f/0xa50 [ 480.935404][T15503] should_fail_alloc_page+0x1fb/0x270 [ 480.940798][T15503] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 480.946275][T15503] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 480.952453][T15503] ? kernel_poison_pages+0x40/0x360 [ 480.957681][T15503] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 480.963846][T15503] ? prep_new_page+0x792/0x9b0 [ 480.968990][T15503] ? kmsan_get_metadata_or_null+0x208/0x290 [ 480.974922][T15503] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 480.981019][T15503] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 480.987028][T15503] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 480.993479][T15503] kmsan_alloc_page+0x7a/0xf0 [ 480.998176][T15503] __alloc_pages_nodemask+0x142d/0x5fa0 [ 481.003743][T15503] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 481.010022][T15503] ? __module_address+0x68/0x5e0 [ 481.014977][T15503] ? is_bpf_text_address+0x3c5/0x4b0 [ 481.020290][T15503] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 481.026367][T15503] ? is_bpf_text_address+0x47d/0x4b0 [ 481.031696][T15503] ? __kernel_text_address+0x24f/0x350 [ 481.037195][T15503] ? __kprobes_text_end+0xddc08/0xddc08 [ 481.042780][T15503] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 481.048764][T15503] ? alloc_pages_current+0x412/0x9a0 [ 481.054077][T15503] alloc_pages_current+0x68d/0x9a0 [ 481.059219][T15503] get_zeroed_page+0x47/0xd0 [ 481.063829][T15503] __pud_alloc+0x9f/0x370 [ 481.068175][T15503] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 481.074176][T15503] copy_page_range+0x400d/0x43a0 [ 481.079139][T15503] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 481.085315][T15503] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 481.091308][T15503] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 481.097484][T15503] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 481.103501][T15503] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 481.109672][T15503] ? __rb_insert_augmented+0xba8/0x1140 [ 481.115234][T15503] ? init_admin_reserve+0x160/0x160 [ 481.120481][T15503] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 481.126482][T15503] dup_mmap+0x1510/0x1d60 [ 481.130868][T15503] dup_mm+0x1f2/0x710 [ 481.134879][T15503] copy_process+0x3d50/0x8e30 [ 481.139585][T15503] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 481.145715][T15503] _do_fork+0x25c/0xeb0 [ 481.149884][T15503] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 481.156634][T15503] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 481.162641][T15503] __se_sys_clone+0x32a/0x370 [ 481.167362][T15503] __x64_sys_clone+0x62/0x80 [ 481.171972][T15503] do_syscall_64+0xbc/0xf0 [ 481.176406][T15503] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 481.182307][T15503] RIP: 0033:0x459829 [ 481.186211][T15503] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.205854][T15503] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 481.214290][T15503] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 481.222275][T15503] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 481.230267][T15503] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:59:41 executing program 5: 07:59:41 executing program 2: [ 481.238252][T15503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 481.246229][T15503] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100), 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:41 executing program 5: 07:59:41 executing program 3: 07:59:41 executing program 2: 07:59:41 executing program 1 (fault-call:1 fault-nth:83): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:41 executing program 5: 07:59:41 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:41 executing program 2: 07:59:41 executing program 3: 07:59:41 executing program 5: [ 481.951080][T15535] FAULT_INJECTION: forcing a failure. [ 481.951080][T15535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.964335][T15535] CPU: 0 PID: 15535 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 481.973448][T15535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.988198][T15535] Call Trace: [ 481.991511][T15535] dump_stack+0x191/0x1f0 [ 481.995866][T15535] should_fail+0xa3f/0xa50 [ 482.000313][T15535] should_fail_alloc_page+0x1fb/0x270 [ 482.005704][T15535] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 482.011185][T15535] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 482.017362][T15535] ? kernel_poison_pages+0x40/0x360 [ 482.022613][T15535] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 482.028774][T15535] ? prep_new_page+0x792/0x9b0 [ 482.033592][T15535] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 482.039675][T15535] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.045677][T15535] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 482.052204][T15535] kmsan_alloc_page+0x7a/0xf0 [ 482.056903][T15535] __alloc_pages_nodemask+0x142d/0x5fa0 [ 482.062466][T15535] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 482.068550][T15535] ? __module_address+0x68/0x5e0 [ 482.075001][T15535] ? is_bpf_text_address+0x3c5/0x4b0 [ 482.080319][T15535] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 482.086404][T15535] ? is_bpf_text_address+0x47d/0x4b0 [ 482.091770][T15535] ? __kernel_text_address+0x24f/0x350 [ 482.097264][T15535] ? __kprobes_text_end+0xddc08/0xddc08 [ 482.102847][T15535] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.108854][T15535] ? alloc_pages_current+0x412/0x9a0 [ 482.114159][T15535] alloc_pages_current+0x68d/0x9a0 [ 482.119297][T15535] get_zeroed_page+0x47/0xd0 [ 482.123910][T15535] __pud_alloc+0x9f/0x370 [ 482.128271][T15535] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.134282][T15535] copy_page_range+0x400d/0x43a0 [ 482.139251][T15535] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 482.145426][T15535] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.151435][T15535] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 482.157614][T15535] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.163619][T15535] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 482.169789][T15535] ? __rb_insert_augmented+0xba8/0x1140 [ 482.175352][T15535] ? init_admin_reserve+0x160/0x160 [ 482.181369][T15535] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.187375][T15535] dup_mmap+0x1510/0x1d60 [ 482.191767][T15535] dup_mm+0x1f2/0x710 [ 482.195783][T15535] copy_process+0x3d50/0x8e30 [ 482.200491][T15535] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 482.206617][T15535] _do_fork+0x25c/0xeb0 [ 482.210784][T15535] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 482.217050][T15535] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.223071][T15535] __se_sys_clone+0x32a/0x370 [ 482.227800][T15535] __x64_sys_clone+0x62/0x80 [ 482.232408][T15535] do_syscall_64+0xbc/0xf0 [ 482.236848][T15535] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 482.242761][T15535] RIP: 0033:0x459829 [ 482.246665][T15535] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.266279][T15535] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 482.274720][T15535] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 482.282699][T15535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 482.290685][T15535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:59:42 executing program 3: 07:59:42 executing program 2: [ 482.298665][T15535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 482.306641][T15535] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:42 executing program 5: 07:59:42 executing program 1 (fault-call:1 fault-nth:84): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:42 executing program 2: 07:59:42 executing program 3: 07:59:42 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) [ 482.624600][T15546] FAULT_INJECTION: forcing a failure. [ 482.624600][T15546] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.638610][T15546] CPU: 0 PID: 15546 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 482.646636][T15546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.656729][T15546] Call Trace: [ 482.660119][T15546] dump_stack+0x191/0x1f0 [ 482.664509][T15546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.670557][T15546] should_fail+0xa3f/0xa50 [ 482.675055][T15546] should_fail_alloc_page+0x1fb/0x270 [ 482.680490][T15546] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 482.686002][T15546] ? __module_address+0x68/0x5e0 [ 482.691002][T15546] ? is_bpf_text_address+0x3c5/0x4b0 [ 482.696346][T15546] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 482.702468][T15546] ? is_bpf_text_address+0x47d/0x4b0 [ 482.707835][T15546] ? __kernel_text_address+0x24f/0x350 [ 482.713417][T15546] ? __kprobes_text_end+0xddc08/0xddc08 [ 482.719043][T15546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.725072][T15546] ? alloc_pages_current+0x412/0x9a0 [ 482.730413][T15546] alloc_pages_current+0x68d/0x9a0 [ 482.735607][T15546] __pmd_alloc+0xad/0x420 [ 482.740008][T15546] copy_page_range+0x3db0/0x43a0 [ 482.745012][T15546] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 482.751222][T15546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.757258][T15546] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 482.763481][T15546] ? __rb_insert_augmented+0xba8/0x1140 [ 482.769088][T15546] ? init_admin_reserve+0x160/0x160 [ 482.774386][T15546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.780430][T15546] dup_mmap+0x1510/0x1d60 [ 482.784857][T15546] dup_mm+0x1f2/0x710 [ 482.788910][T15546] copy_process+0x3d50/0x8e30 [ 482.793659][T15546] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 482.799819][T15546] _do_fork+0x25c/0xeb0 [ 482.804029][T15546] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 482.810160][T15546] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 482.816206][T15546] __se_sys_clone+0x32a/0x370 [ 482.820986][T15546] __x64_sys_clone+0x62/0x80 [ 482.825644][T15546] do_syscall_64+0xbc/0xf0 [ 482.830158][T15546] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 482.836091][T15546] RIP: 0033:0x459829 [ 482.840039][T15546] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.859681][T15546] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 482.868142][T15546] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 482.876154][T15546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 482.884167][T15546] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 482.892172][T15546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 482.900192][T15546] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:43 executing program 2: 07:59:43 executing program 5: 07:59:43 executing program 1 (fault-call:1 fault-nth:85): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:43 executing program 2: 07:59:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:43 executing program 3: 07:59:43 executing program 5: [ 483.370952][T15567] FAULT_INJECTION: forcing a failure. [ 483.370952][T15567] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.384215][T15567] CPU: 0 PID: 15567 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 483.392204][T15567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.402270][T15567] Call Trace: [ 483.405604][T15567] dump_stack+0x191/0x1f0 [ 483.409968][T15567] should_fail+0xa3f/0xa50 [ 483.414427][T15567] should_fail_alloc_page+0x1fb/0x270 [ 483.419826][T15567] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 483.425306][T15567] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 483.431502][T15567] ? kernel_poison_pages+0x40/0x360 [ 483.436742][T15567] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 483.442906][T15567] ? prep_new_page+0x792/0x9b0 [ 483.447720][T15567] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 483.453801][T15567] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 483.459802][T15567] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 483.466239][T15567] kmsan_alloc_page+0x7a/0xf0 [ 483.470941][T15567] __alloc_pages_nodemask+0x142d/0x5fa0 [ 483.476498][T15567] ? __module_address+0x68/0x5e0 [ 483.481448][T15567] ? is_bpf_text_address+0x3c5/0x4b0 [ 483.486749][T15567] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 483.492831][T15567] ? is_bpf_text_address+0x47d/0x4b0 [ 483.498153][T15567] ? __kernel_text_address+0x24f/0x350 [ 483.503669][T15567] ? __kprobes_text_end+0xddc08/0xddc08 [ 483.509260][T15567] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 483.515250][T15567] ? alloc_pages_current+0x412/0x9a0 [ 483.520552][T15567] alloc_pages_current+0x68d/0x9a0 [ 483.525706][T15567] __pmd_alloc+0xad/0x420 [ 483.530089][T15567] copy_page_range+0x3db0/0x43a0 [ 483.535056][T15567] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 483.541230][T15567] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 483.547225][T15567] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 483.553407][T15567] ? __rb_insert_augmented+0xba8/0x1140 [ 483.558963][T15567] ? init_admin_reserve+0x160/0x160 [ 483.564227][T15567] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 483.570240][T15567] dup_mmap+0x1510/0x1d60 [ 483.574648][T15567] dup_mm+0x1f2/0x710 [ 483.578677][T15567] copy_process+0x3d50/0x8e30 [ 483.583394][T15567] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 483.589526][T15567] _do_fork+0x25c/0xeb0 [ 483.593712][T15567] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 483.599814][T15567] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 483.605821][T15567] __se_sys_clone+0x32a/0x370 [ 483.610546][T15567] __x64_sys_clone+0x62/0x80 [ 483.615163][T15567] do_syscall_64+0xbc/0xf0 [ 483.619603][T15567] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 483.625509][T15567] RIP: 0033:0x459829 [ 483.629414][T15567] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.649048][T15567] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 483.657477][T15567] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:59:43 executing program 2: 07:59:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 483.665451][T15567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 483.673428][T15567] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 483.681406][T15567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 483.689379][T15567] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:43 executing program 3: 07:59:43 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:43 executing program 2: 07:59:44 executing program 3: 07:59:44 executing program 5: 07:59:44 executing program 1 (fault-call:1 fault-nth:86): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:44 executing program 2: 07:59:44 executing program 5: [ 484.218920][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 484.270121][T15596] FAULT_INJECTION: forcing a failure. [ 484.270121][T15596] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 484.283377][T15596] CPU: 0 PID: 15596 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 484.291360][T15596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.301430][T15596] Call Trace: [ 484.304738][T15596] dump_stack+0x191/0x1f0 [ 484.309091][T15596] should_fail+0xa3f/0xa50 [ 484.313546][T15596] should_fail_alloc_page+0x1fb/0x270 [ 484.318942][T15596] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 484.324421][T15596] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 484.330602][T15596] ? kernel_poison_pages+0x40/0x360 [ 484.335938][T15596] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 484.342100][T15596] ? prep_new_page+0x792/0x9b0 [ 484.346910][T15596] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 484.353004][T15596] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 484.359022][T15596] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 484.365476][T15596] kmsan_alloc_page+0x7a/0xf0 [ 484.370190][T15596] __alloc_pages_nodemask+0x142d/0x5fa0 [ 484.375753][T15596] ? __module_address+0x68/0x5e0 [ 484.380706][T15596] ? is_bpf_text_address+0x3c5/0x4b0 [ 484.386009][T15596] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 484.392085][T15596] ? is_bpf_text_address+0x47d/0x4b0 [ 484.397426][T15596] ? __kernel_text_address+0x24f/0x350 [ 484.402920][T15596] ? __kprobes_text_end+0xddc08/0xddc08 [ 484.408506][T15596] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 484.414510][T15596] ? alloc_pages_current+0x412/0x9a0 [ 484.419812][T15596] alloc_pages_current+0x68d/0x9a0 [ 484.424959][T15596] __pmd_alloc+0xad/0x420 [ 484.429317][T15596] copy_page_range+0x3db0/0x43a0 [ 484.434300][T15596] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 484.440470][T15596] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 484.446467][T15596] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 484.452651][T15596] ? __rb_insert_augmented+0xba8/0x1140 [ 484.458205][T15596] ? init_admin_reserve+0x160/0x160 [ 484.463454][T15596] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 484.469452][T15596] dup_mmap+0x1510/0x1d60 [ 484.473840][T15596] dup_mm+0x1f2/0x710 [ 484.477852][T15596] copy_process+0x3d50/0x8e30 [ 484.482556][T15596] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 484.488686][T15596] _do_fork+0x25c/0xeb0 [ 484.492859][T15596] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 484.498949][T15596] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 484.504948][T15596] __se_sys_clone+0x32a/0x370 [ 484.509665][T15596] __x64_sys_clone+0x62/0x80 [ 484.514269][T15596] do_syscall_64+0xbc/0xf0 [ 484.518705][T15596] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 484.524600][T15596] RIP: 0033:0x459829 [ 484.528495][T15596] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.548119][T15596] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 484.556536][T15596] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:59:44 executing program 3: [ 484.564518][T15596] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 484.572490][T15596] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 484.580465][T15596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 484.588440][T15596] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:44 executing program 2: socket$inet(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') 07:59:44 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:44 executing program 5: clone(0x10080000, 0x0, 0x0, 0x0, 0x0) 07:59:44 executing program 3: clone(0x2002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) syz_open_procfs(0x0, 0x0) 07:59:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:45 executing program 1 (fault-call:1 fault-nth:87): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:45 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 07:59:45 executing program 5: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000580)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 07:59:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 485.163195][T15631] FAULT_INJECTION: forcing a failure. [ 485.163195][T15631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.177371][T15631] CPU: 1 PID: 15631 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 485.185400][T15631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.195495][T15631] Call Trace: [ 485.198849][T15631] dump_stack+0x191/0x1f0 [ 485.203242][T15631] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.209293][T15631] should_fail+0xa3f/0xa50 [ 485.213817][T15631] should_fail_alloc_page+0x1fb/0x270 [ 485.219249][T15631] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 485.224769][T15631] ? __alloc_pages_nodemask+0x142d/0x5fa0 [ 485.230539][T15631] ? __module_address+0x68/0x5e0 [ 485.235540][T15631] ? is_bpf_text_address+0x3c5/0x4b0 [ 485.240883][T15631] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 485.247005][T15631] ? is_bpf_text_address+0x47d/0x4b0 [ 485.252380][T15631] ? __kernel_text_address+0x24f/0x350 [ 485.257929][T15631] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.263968][T15631] ? alloc_pages_current+0x412/0x9a0 [ 485.269311][T15631] alloc_pages_current+0x68d/0x9a0 [ 485.274501][T15631] pte_alloc_one+0x59/0x1a0 [ 485.279055][T15631] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.285107][T15631] __pte_alloc+0x6d/0x460 [ 485.289493][T15631] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.295531][T15631] copy_page_range+0x3296/0x43a0 [ 485.300545][T15631] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 485.306754][T15631] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.312816][T15631] ? init_admin_reserve+0x160/0x160 [ 485.318123][T15631] dup_mmap+0x1510/0x1d60 [ 485.322551][T15631] dup_mm+0x1f2/0x710 [ 485.326604][T15631] copy_process+0x3d50/0x8e30 [ 485.331348][T15631] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 485.337510][T15631] _do_fork+0x25c/0xeb0 [ 485.341718][T15631] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 485.347857][T15631] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.353898][T15631] __se_sys_clone+0x32a/0x370 [ 485.358662][T15631] __x64_sys_clone+0x62/0x80 [ 485.363398][T15631] do_syscall_64+0xbc/0xf0 [ 485.367879][T15631] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 485.373809][T15631] RIP: 0033:0x459829 [ 485.377762][T15631] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.397430][T15631] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 485.405894][T15631] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 485.413902][T15631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 485.421913][T15631] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 485.429919][T15631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 485.438278][T15631] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 [ 485.449054][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:45 executing program 2: syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) 07:59:45 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:45 executing program 1 (fault-call:1 fault-nth:88): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:45 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) listen(r0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 07:59:45 executing program 2: clone(0x2002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) [ 485.839743][T15653] FAULT_INJECTION: forcing a failure. [ 485.839743][T15653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.853006][T15653] CPU: 1 PID: 15653 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 485.860996][T15653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.871060][T15653] Call Trace: [ 485.874390][T15653] dump_stack+0x191/0x1f0 [ 485.878759][T15653] should_fail+0xa3f/0xa50 [ 485.883219][T15653] should_fail_alloc_page+0x1fb/0x270 [ 485.888621][T15653] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 485.894119][T15653] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 485.900317][T15653] ? kernel_poison_pages+0x40/0x360 [ 485.905570][T15653] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 485.911748][T15653] ? prep_new_page+0x792/0x9b0 [ 485.916543][T15653] ? kmsan_get_metadata_or_null+0x208/0x290 [ 485.922469][T15653] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 485.928548][T15653] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.934551][T15653] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 485.940987][T15653] kmsan_alloc_page+0x7a/0xf0 [ 485.945700][T15653] __alloc_pages_nodemask+0x142d/0x5fa0 [ 485.951267][T15653] ? __alloc_pages_nodemask+0x142d/0x5fa0 [ 485.956994][T15653] ? __module_address+0x68/0x5e0 [ 485.961952][T15653] ? is_bpf_text_address+0x3c5/0x4b0 [ 485.967259][T15653] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 485.973336][T15653] ? is_bpf_text_address+0x47d/0x4b0 [ 485.978697][T15653] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 485.984688][T15653] ? alloc_pages_current+0x412/0x9a0 [ 485.989986][T15653] alloc_pages_current+0x68d/0x9a0 [ 485.995135][T15653] pte_alloc_one+0x59/0x1a0 [ 485.999646][T15653] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.005647][T15653] __pte_alloc+0x6d/0x460 [ 486.009991][T15653] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.016003][T15653] copy_page_range+0x3296/0x43a0 [ 486.020964][T15653] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 486.027146][T15653] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.033184][T15653] ? init_admin_reserve+0x160/0x160 [ 486.038442][T15653] dup_mmap+0x1510/0x1d60 [ 486.042831][T15653] dup_mm+0x1f2/0x710 [ 486.046839][T15653] copy_process+0x3d50/0x8e30 [ 486.051545][T15653] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 486.057670][T15653] _do_fork+0x25c/0xeb0 [ 486.061841][T15653] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 486.067940][T15653] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.074665][T15653] __se_sys_clone+0x32a/0x370 [ 486.079381][T15653] __x64_sys_clone+0x62/0x80 [ 486.083988][T15653] do_syscall_64+0xbc/0xf0 [ 486.088421][T15653] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 486.094320][T15653] RIP: 0033:0x459829 [ 486.098222][T15653] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.117825][T15653] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 486.126246][T15653] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:59:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045005, &(0x7f0000000000)=0x2a2692a4) [ 486.134309][T15653] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 486.142295][T15653] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 486.150270][T15653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 486.158247][T15653] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 [ 486.289966][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:46 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) 07:59:46 executing program 3: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="da", 0x1, 0xfffffffffffffffc) 07:59:46 executing program 1 (fault-call:1 fault-nth:89): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:46 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:46 executing program 3: r0 = socket(0x1, 0x1, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040), 0x4) 07:59:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) 07:59:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 486.603922][T15680] FAULT_INJECTION: forcing a failure. [ 486.603922][T15680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.617188][T15680] CPU: 1 PID: 15680 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 486.625178][T15680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.635307][T15680] Call Trace: [ 486.638742][T15680] dump_stack+0x191/0x1f0 [ 486.643113][T15680] should_fail+0xa3f/0xa50 [ 486.647572][T15680] should_fail_alloc_page+0x1fb/0x270 [ 486.652972][T15680] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 486.658449][T15680] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 486.664625][T15680] ? kernel_poison_pages+0x40/0x360 [ 486.669856][T15680] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 486.676014][T15680] ? prep_new_page+0x792/0x9b0 [ 486.680824][T15680] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 486.686904][T15680] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.692904][T15680] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 486.699347][T15680] kmsan_alloc_page+0x7a/0xf0 [ 486.704055][T15680] __alloc_pages_nodemask+0x142d/0x5fa0 [ 486.709625][T15680] ? __alloc_pages_nodemask+0x142d/0x5fa0 [ 486.715354][T15680] ? __module_address+0x68/0x5e0 [ 486.720316][T15680] ? is_bpf_text_address+0x3c5/0x4b0 [ 486.725617][T15680] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 486.731713][T15680] ? is_bpf_text_address+0x47d/0x4b0 [ 486.737081][T15680] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.743075][T15680] ? alloc_pages_current+0x412/0x9a0 [ 486.748377][T15680] alloc_pages_current+0x68d/0x9a0 [ 486.753520][T15680] pte_alloc_one+0x59/0x1a0 [ 486.758032][T15680] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.764041][T15680] __pte_alloc+0x6d/0x460 [ 486.768395][T15680] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.774394][T15680] copy_page_range+0x3296/0x43a0 [ 486.779355][T15680] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 486.785526][T15680] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.791548][T15680] ? init_admin_reserve+0x160/0x160 [ 486.796815][T15680] dup_mmap+0x1510/0x1d60 [ 486.801201][T15680] dup_mm+0x1f2/0x710 [ 486.805227][T15680] copy_process+0x3d50/0x8e30 [ 486.809934][T15680] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 486.816060][T15680] _do_fork+0x25c/0xeb0 [ 486.820229][T15680] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 486.826322][T15680] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 486.832410][T15680] __se_sys_clone+0x32a/0x370 [ 486.837131][T15680] __x64_sys_clone+0x62/0x80 [ 486.841745][T15680] do_syscall_64+0xbc/0xf0 [ 486.846181][T15680] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 486.852084][T15680] RIP: 0033:0x459829 [ 486.855988][T15680] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.875595][T15680] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 486.884016][T15680] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 486.891992][T15680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 486.899966][T15680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 486.907937][T15680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 486.915917][T15680] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) 07:59:47 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x100000000000082, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") read(r0, &(0x7f00000001c0)=""/182, 0xfffffc20) 07:59:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) dup2(r0, r1) 07:59:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) flock(0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300090468fe0700000000000000ff3f01000000450004070000001419001900040002b0fb004a22550e69330f4de5020080080000", 0x39}], 0x1) 07:59:47 executing program 1 (fault-call:1 fault-nth:90): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xe, &(0x7f0000000040), 0xf1) 07:59:47 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) [ 487.374373][T15709] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.5'. [ 487.448003][T15713] sock: process `syz-executor.3' is using obsolete setsockopt SO_BSDCOMPAT [ 487.474408][T15715] FAULT_INJECTION: forcing a failure. [ 487.474408][T15715] name failslab, interval 1, probability 0, space 0, times 0 [ 487.487793][T15715] CPU: 1 PID: 15715 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 07:59:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x5e0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000200)={0x17}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 487.495824][T15715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.505920][T15715] Call Trace: [ 487.509286][T15715] dump_stack+0x191/0x1f0 [ 487.513702][T15715] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 487.519761][T15715] should_fail+0xa3f/0xa50 [ 487.524268][T15715] __should_failslab+0x264/0x280 [ 487.529538][T15715] should_failslab+0x29/0x70 [ 487.534201][T15715] kmem_cache_alloc+0xd6/0xd10 [ 487.539042][T15715] ? dup_mmap+0xb6e/0x1d60 [ 487.543548][T15715] ? dup_mmap+0xb2a/0x1d60 [ 487.548049][T15715] dup_mmap+0xb6e/0x1d60 [ 487.552400][T15715] dup_mm+0x1f2/0x710 [ 487.556464][T15715] copy_process+0x3d50/0x8e30 [ 487.561219][T15715] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 487.567424][T15715] _do_fork+0x25c/0xeb0 [ 487.571654][T15715] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 487.577797][T15715] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 487.583842][T15715] __se_sys_clone+0x32a/0x370 [ 487.588602][T15715] __x64_sys_clone+0x62/0x80 [ 487.593254][T15715] do_syscall_64+0xbc/0xf0 [ 487.597737][T15715] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 487.603666][T15715] RIP: 0033:0x459829 [ 487.607610][T15715] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.627255][T15715] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 487.635723][T15715] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 487.643730][T15715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 487.651740][T15715] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 487.659752][T15715] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 487.667765][T15715] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:47 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'u\x00'}, 0x8) 07:59:47 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x800454cf, 0x0) 07:59:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:48 executing program 1 (fault-call:1 fault-nth:91): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:48 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x16001}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)) [ 488.138601][T15745] FAULT_INJECTION: forcing a failure. [ 488.138601][T15745] name failslab, interval 1, probability 0, space 0, times 0 [ 488.152958][T15745] CPU: 1 PID: 15745 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 488.161323][T15745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.172393][T15745] Call Trace: [ 488.175885][T15745] dump_stack+0x191/0x1f0 [ 488.180288][T15745] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 488.187387][T15745] should_fail+0xa3f/0xa50 [ 488.191885][T15745] __should_failslab+0x264/0x280 [ 488.196888][T15745] should_failslab+0x29/0x70 [ 488.201552][T15745] kmem_cache_alloc+0xd6/0xd10 [ 488.206379][T15745] ? anon_vma_clone+0x167/0xcb0 [ 488.211471][T15745] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 488.217681][T15745] ? dup_mmap+0xb6e/0x1d60 [ 488.222166][T15745] anon_vma_clone+0x167/0xcb0 [ 488.226998][T15745] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 488.233338][T15745] anon_vma_fork+0xe8/0xb00 [ 488.238438][T15745] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 488.244496][T15745] ? vma_dup_policy+0xf9/0x190 [ 488.249316][T15745] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 488.255359][T15745] dup_mmap+0xd8f/0x1d60 [ 488.259696][T15745] dup_mm+0x1f2/0x710 [ 488.263755][T15745] copy_process+0x3d50/0x8e30 [ 488.268497][T15745] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 488.274657][T15745] _do_fork+0x25c/0xeb0 [ 488.278865][T15745] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 488.285005][T15745] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 488.291043][T15745] __se_sys_clone+0x32a/0x370 [ 488.295811][T15745] __x64_sys_clone+0x62/0x80 [ 488.300455][T15745] do_syscall_64+0xbc/0xf0 [ 488.304938][T15745] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 488.310868][T15745] RIP: 0033:0x459829 [ 488.314820][T15745] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:59:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="a1f920a5c67b"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="0303000003004c0003003c00fff5", 0xe, 0x0, 0x0, 0x0) [ 488.334463][T15745] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 488.342927][T15745] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 488.350932][T15745] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 488.358945][T15745] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 488.366958][T15745] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 488.374964][T15745] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:48 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:48 executing program 2: 07:59:48 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:48 executing program 2: 07:59:48 executing program 3: 07:59:48 executing program 1 (fault-call:1 fault-nth:92): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:48 executing program 5: [ 488.959106][T15776] FAULT_INJECTION: forcing a failure. [ 488.959106][T15776] name failslab, interval 1, probability 0, space 0, times 0 [ 488.973122][T15776] CPU: 1 PID: 15776 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 488.981186][T15776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.991282][T15776] Call Trace: [ 488.994647][T15776] dump_stack+0x191/0x1f0 [ 488.999041][T15776] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 489.005106][T15776] should_fail+0xa3f/0xa50 [ 489.009632][T15776] __should_failslab+0x264/0x280 [ 489.014660][T15776] should_failslab+0x29/0x70 [ 489.019331][T15776] kmem_cache_alloc+0xd6/0xd10 [ 489.024171][T15776] ? anon_vma_fork+0x1fe/0xb00 [ 489.029009][T15776] anon_vma_fork+0x1fe/0xb00 [ 489.033655][T15776] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 489.039684][T15776] ? vma_dup_policy+0xf9/0x190 [ 489.044515][T15776] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 489.050559][T15776] dup_mmap+0xd8f/0x1d60 [ 489.054905][T15776] dup_mm+0x1f2/0x710 [ 489.058958][T15776] copy_process+0x3d50/0x8e30 [ 489.063707][T15776] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 489.069873][T15776] _do_fork+0x25c/0xeb0 [ 489.074088][T15776] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 489.080236][T15776] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 489.086278][T15776] __se_sys_clone+0x32a/0x370 [ 489.091037][T15776] __x64_sys_clone+0x62/0x80 [ 489.095690][T15776] do_syscall_64+0xbc/0xf0 [ 489.100219][T15776] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 489.106171][T15776] RIP: 0033:0x459829 [ 489.110124][T15776] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.129777][T15776] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 489.138246][T15776] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 489.146267][T15776] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:59:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:49 executing program 2: 07:59:49 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:49 executing program 3: [ 489.154279][T15776] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 489.162328][T15776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 489.170488][T15776] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:49 executing program 2: 07:59:49 executing program 5: 07:59:49 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0xc) ptrace$cont(0x11, 0x0, 0x0, 0x0) 07:59:49 executing program 1 (fault-call:1 fault-nth:93): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:49 executing program 3: 07:59:49 executing program 2: 07:59:49 executing program 5: 07:59:49 executing program 3: [ 489.996723][T15805] FAULT_INJECTION: forcing a failure. [ 489.996723][T15805] name failslab, interval 1, probability 0, space 0, times 0 [ 490.010162][T15805] CPU: 1 PID: 15805 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 490.018192][T15805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.028278][T15805] Call Trace: [ 490.031639][T15805] dump_stack+0x191/0x1f0 [ 490.036030][T15805] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.042109][T15805] should_fail+0xa3f/0xa50 [ 490.046600][T15805] __should_failslab+0x264/0x280 [ 490.051597][T15805] should_failslab+0x29/0x70 [ 490.056252][T15805] kmem_cache_alloc+0xd6/0xd10 [ 490.061076][T15805] ? anon_vma_fork+0x33a/0xb00 [ 490.065921][T15805] anon_vma_fork+0x33a/0xb00 [ 490.070566][T15805] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.077390][T15805] ? vma_dup_policy+0xf9/0x190 [ 490.082241][T15805] dup_mmap+0xd8f/0x1d60 [ 490.086593][T15805] dup_mm+0x1f2/0x710 [ 490.090647][T15805] copy_process+0x3d50/0x8e30 [ 490.095395][T15805] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 490.101584][T15805] _do_fork+0x25c/0xeb0 [ 490.105797][T15805] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 490.111934][T15805] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.117974][T15805] __se_sys_clone+0x32a/0x370 [ 490.122758][T15805] __x64_sys_clone+0x62/0x80 [ 490.127403][T15805] do_syscall_64+0xbc/0xf0 [ 490.131890][T15805] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 490.137818][T15805] RIP: 0033:0x459829 [ 490.141774][T15805] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.161435][T15805] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 490.169905][T15805] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 490.177917][T15805] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 490.187465][T15805] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 490.195473][T15805] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 490.203507][T15805] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:50 executing program 2: 07:59:50 executing program 3: 07:59:50 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0xc) ptrace$cont(0x11, 0x0, 0x0, 0x0) 07:59:50 executing program 5: 07:59:50 executing program 2: 07:59:50 executing program 3: 07:59:50 executing program 1 (fault-call:1 fault-nth:94): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:50 executing program 5: [ 490.714460][T15829] FAULT_INJECTION: forcing a failure. [ 490.714460][T15829] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 490.727908][T15829] CPU: 1 PID: 15829 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 490.735935][T15829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.746031][T15829] Call Trace: [ 490.749400][T15829] dump_stack+0x191/0x1f0 [ 490.753826][T15829] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.759866][T15829] should_fail+0xa3f/0xa50 [ 490.764365][T15829] should_fail_alloc_page+0x1fb/0x270 [ 490.769808][T15829] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 490.775352][T15829] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 490.781485][T15829] ? __module_address+0x68/0x5e0 [ 490.786501][T15829] ? is_bpf_text_address+0x3c5/0x4b0 [ 490.791856][T15829] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 490.797988][T15829] ? is_bpf_text_address+0x47d/0x4b0 [ 490.803354][T15829] ? __kernel_text_address+0x24f/0x350 [ 490.808874][T15829] ? unwind_get_return_address+0x8c/0x130 [ 490.814659][T15829] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 490.820776][T15829] ? sctp_sock_dump+0xc31/0xe80 [ 490.825705][T15829] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.831733][T15829] ? alloc_pages_current+0x412/0x9a0 [ 490.837083][T15829] alloc_pages_current+0x68d/0x9a0 [ 490.842263][T15829] get_zeroed_page+0x47/0xd0 [ 490.846923][T15829] __pud_alloc+0x9f/0x370 [ 490.851310][T15829] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.857350][T15829] copy_page_range+0x400d/0x43a0 [ 490.862383][T15829] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 490.868623][T15829] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 490.874835][T15829] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 490.880618][T15829] ? __rb_insert_augmented+0xfd0/0x1140 [ 490.886212][T15829] ? init_admin_reserve+0x160/0x160 [ 490.891491][T15829] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.897559][T15829] dup_mmap+0x1510/0x1d60 [ 490.901986][T15829] dup_mm+0x1f2/0x710 [ 490.906089][T15829] copy_process+0x3d50/0x8e30 [ 490.910856][T15829] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 490.917017][T15829] _do_fork+0x25c/0xeb0 [ 490.921228][T15829] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 490.927363][T15829] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 490.933428][T15829] __se_sys_clone+0x32a/0x370 [ 490.938180][T15829] __x64_sys_clone+0x62/0x80 [ 490.942865][T15829] do_syscall_64+0xbc/0xf0 [ 490.947360][T15829] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 490.953291][T15829] RIP: 0033:0x459829 [ 490.957245][T15829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.976890][T15829] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 490.985355][T15829] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 490.993364][T15829] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 491.001372][T15829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:59:51 executing program 2: 07:59:51 executing program 3: 07:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 491.009382][T15829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 491.017392][T15829] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:51 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0xc) ptrace$cont(0x11, 0x0, 0x0, 0x0) 07:59:51 executing program 5: 07:59:51 executing program 3: 07:59:51 executing program 2: 07:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, 0x0, 0x0) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:51 executing program 3: 07:59:51 executing program 1 (fault-call:1 fault-nth:95): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:51 executing program 5: 07:59:51 executing program 3: 07:59:51 executing program 2: 07:59:51 executing program 5: 07:59:51 executing program 3: [ 491.890051][T15867] FAULT_INJECTION: forcing a failure. [ 491.890051][T15867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 491.903364][T15867] CPU: 1 PID: 15867 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 491.911343][T15867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.921424][T15867] Call Trace: [ 491.924771][T15867] dump_stack+0x191/0x1f0 [ 491.929130][T15867] should_fail+0xa3f/0xa50 [ 491.933584][T15867] should_fail_alloc_page+0x1fb/0x270 [ 491.938979][T15867] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 491.944456][T15867] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 491.950643][T15867] ? kernel_poison_pages+0x40/0x360 [ 491.955875][T15867] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 491.962036][T15867] ? prep_new_page+0x792/0x9b0 [ 491.966829][T15867] ? kmsan_get_metadata_or_null+0x208/0x290 [ 491.972754][T15867] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 491.978836][T15867] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 491.984844][T15867] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 491.991275][T15867] kmsan_alloc_page+0x7a/0xf0 [ 491.995974][T15867] __alloc_pages_nodemask+0x142d/0x5fa0 [ 492.001536][T15867] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 492.007618][T15867] ? __module_address+0x68/0x5e0 [ 492.012569][T15867] ? is_bpf_text_address+0x3c5/0x4b0 [ 492.017875][T15867] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 492.023951][T15867] ? is_bpf_text_address+0x47d/0x4b0 [ 492.029271][T15867] ? __kernel_text_address+0x24f/0x350 [ 492.034757][T15867] ? __kprobes_text_end+0xddc08/0xddc08 [ 492.040334][T15867] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.046323][T15867] ? alloc_pages_current+0x412/0x9a0 [ 492.051622][T15867] alloc_pages_current+0x68d/0x9a0 [ 492.056762][T15867] get_zeroed_page+0x47/0xd0 [ 492.061372][T15867] __pud_alloc+0x9f/0x370 [ 492.065728][T15867] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.071734][T15867] copy_page_range+0x400d/0x43a0 [ 492.077501][T15867] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 492.083703][T15867] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 492.089863][T15867] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 492.095604][T15867] ? __rb_insert_augmented+0xfd0/0x1140 [ 492.101160][T15867] ? init_admin_reserve+0x160/0x160 [ 492.106413][T15867] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.112416][T15867] dup_mmap+0x1510/0x1d60 [ 492.116814][T15867] dup_mm+0x1f2/0x710 [ 492.120823][T15867] copy_process+0x3d50/0x8e30 [ 492.125542][T15867] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 492.131664][T15867] _do_fork+0x25c/0xeb0 [ 492.135833][T15867] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 492.141926][T15867] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.147926][T15867] __se_sys_clone+0x32a/0x370 [ 492.152645][T15867] __x64_sys_clone+0x62/0x80 [ 492.157252][T15867] do_syscall_64+0xbc/0xf0 [ 492.161694][T15867] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 492.167604][T15867] RIP: 0033:0x459829 07:59:52 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 07:59:52 executing program 2: 07:59:52 executing program 5: [ 492.171504][T15867] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.192304][T15867] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 492.200727][T15867] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 492.208699][T15867] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 492.216677][T15867] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 492.224656][T15867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 492.232644][T15867] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:52 executing program 3: 07:59:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, 0x0, 0x0) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:52 executing program 5: 07:59:52 executing program 1 (fault-call:1 fault-nth:96): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:52 executing program 3: 07:59:52 executing program 5: [ 492.590428][T15885] FAULT_INJECTION: forcing a failure. [ 492.590428][T15885] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 492.603687][T15885] CPU: 0 PID: 15885 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 492.611674][T15885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.621744][T15885] Call Trace: [ 492.625060][T15885] dump_stack+0x191/0x1f0 [ 492.629412][T15885] should_fail+0xa3f/0xa50 [ 492.633862][T15885] should_fail_alloc_page+0x1fb/0x270 [ 492.639254][T15885] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 492.644743][T15885] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 492.650814][T15885] ? try_charge+0x2e6a/0x3d70 [ 492.655508][T15885] ? kernel_poison_pages+0x40/0x360 [ 492.660744][T15885] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 492.666905][T15885] ? prep_new_page+0x792/0x9b0 [ 492.671716][T15885] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 492.677806][T15885] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.683806][T15885] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 492.690240][T15885] kmsan_alloc_page+0x7a/0xf0 [ 492.694947][T15885] __alloc_pages_nodemask+0x142d/0x5fa0 [ 492.700521][T15885] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 492.706614][T15885] ? __module_address+0x68/0x5e0 [ 492.711569][T15885] ? is_bpf_text_address+0x3c5/0x4b0 [ 492.716876][T15885] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 492.722956][T15885] ? is_bpf_text_address+0x47d/0x4b0 [ 492.728273][T15885] ? __kernel_text_address+0x24f/0x350 [ 492.733760][T15885] ? __kprobes_text_end+0xddc08/0xddc08 [ 492.739341][T15885] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.745323][T15885] ? alloc_pages_current+0x412/0x9a0 [ 492.750621][T15885] alloc_pages_current+0x68d/0x9a0 [ 492.755785][T15885] get_zeroed_page+0x47/0xd0 [ 492.760390][T15885] __pud_alloc+0x9f/0x370 [ 492.764733][T15885] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.770730][T15885] copy_page_range+0x400d/0x43a0 [ 492.775692][T15885] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 492.781874][T15885] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 492.788032][T15885] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 492.793777][T15885] ? __rb_insert_augmented+0xfd0/0x1140 [ 492.799338][T15885] ? init_admin_reserve+0x160/0x160 [ 492.804617][T15885] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.810621][T15885] dup_mmap+0x1510/0x1d60 [ 492.815008][T15885] dup_mm+0x1f2/0x710 [ 492.819020][T15885] copy_process+0x3d50/0x8e30 [ 492.823720][T15885] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 492.829927][T15885] _do_fork+0x25c/0xeb0 [ 492.834104][T15885] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 492.840209][T15885] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 492.846203][T15885] __se_sys_clone+0x32a/0x370 [ 492.850922][T15885] __x64_sys_clone+0x62/0x80 [ 492.855522][T15885] do_syscall_64+0xbc/0xf0 [ 492.859958][T15885] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 492.865858][T15885] RIP: 0033:0x459829 [ 492.869764][T15885] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.889371][T15885] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 492.897791][T15885] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 492.905771][T15885] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 492.913747][T15885] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 492.921717][T15885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 492.929692][T15885] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:53 executing program 2: 07:59:53 executing program 1 (fault-call:1 fault-nth:97): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:53 executing program 2: 07:59:53 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 07:59:53 executing program 3: [ 493.213745][T15896] FAULT_INJECTION: forcing a failure. [ 493.213745][T15896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.227337][T15896] CPU: 0 PID: 15896 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 493.235356][T15896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.245453][T15896] Call Trace: [ 493.248814][T15896] dump_stack+0x191/0x1f0 [ 493.253208][T15896] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 493.259255][T15896] should_fail+0xa3f/0xa50 [ 493.263752][T15896] should_fail_alloc_page+0x1fb/0x270 [ 493.269192][T15896] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 493.274712][T15896] ? __module_address+0x68/0x5e0 [ 493.279723][T15896] ? is_bpf_text_address+0x3c5/0x4b0 [ 493.285076][T15896] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 493.291227][T15896] ? is_bpf_text_address+0x47d/0x4b0 [ 493.296613][T15896] ? __kernel_text_address+0x24f/0x350 [ 493.302153][T15896] ? __kprobes_text_end+0xddc08/0xddc08 [ 493.307794][T15896] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 493.313827][T15896] ? alloc_pages_current+0x412/0x9a0 [ 493.319183][T15896] alloc_pages_current+0x68d/0x9a0 [ 493.324378][T15896] __pmd_alloc+0xad/0x420 [ 493.328786][T15896] copy_page_range+0x3db0/0x43a0 [ 493.333790][T15896] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 493.340028][T15896] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 493.345909][T15896] ? __rb_insert_augmented+0xfd0/0x1140 [ 493.351509][T15896] ? init_admin_reserve+0x160/0x160 [ 493.356805][T15896] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 493.362863][T15896] dup_mmap+0x1510/0x1d60 [ 493.367300][T15896] dup_mm+0x1f2/0x710 [ 493.371353][T15896] copy_process+0x3d50/0x8e30 [ 493.376101][T15896] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 493.382262][T15896] _do_fork+0x25c/0xeb0 [ 493.386471][T15896] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 493.392613][T15896] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 493.398655][T15896] __se_sys_clone+0x32a/0x370 [ 493.403415][T15896] __x64_sys_clone+0x62/0x80 [ 493.408057][T15896] do_syscall_64+0xbc/0xf0 [ 493.412549][T15896] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 493.418484][T15896] RIP: 0033:0x459829 [ 493.422433][T15896] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.442077][T15896] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 493.450546][T15896] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 07:59:53 executing program 5: 07:59:53 executing program 2: [ 493.458557][T15896] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 493.466568][T15896] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 493.474599][T15896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 493.482610][T15896] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, 0x0, 0x0) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:53 executing program 3: 07:59:53 executing program 5: 07:59:53 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000280)=""/121, 0x1ad3cc2f) 07:59:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000003a7acef25dd3acc300000100000500004ad86777a69a18850000000000000000a5f52fbca504272a27820b4f3513bb00aff5ed3de877f5443fe23604abf5c073ab7d2e1c645dd1b0ef028eb08e61284d4ed40c4d77583e02"], &(0x7f0000000080)=""/236, 0x32, 0xec, 0x1}, 0x20) 07:59:53 executing program 1 (fault-call:1 fault-nth:98): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000880), 0x24, 0x0) [ 493.995362][T15926] FAULT_INJECTION: forcing a failure. [ 493.995362][T15926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.008660][T15926] CPU: 1 PID: 15926 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 494.016647][T15926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.026713][T15926] Call Trace: [ 494.030024][T15926] dump_stack+0x191/0x1f0 [ 494.034380][T15926] should_fail+0xa3f/0xa50 [ 494.038835][T15926] should_fail_alloc_page+0x1fb/0x270 [ 494.044224][T15926] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 494.049704][T15926] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 494.055880][T15926] ? kernel_poison_pages+0x40/0x360 [ 494.061118][T15926] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 494.067282][T15926] ? prep_new_page+0x792/0x9b0 [ 494.072100][T15926] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 494.078865][T15926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.084868][T15926] kmsan_internal_alloc_meta_for_pages+0x86/0x510 [ 494.091301][T15926] kmsan_alloc_page+0x7a/0xf0 [ 494.095995][T15926] __alloc_pages_nodemask+0x142d/0x5fa0 [ 494.101555][T15926] ? __module_address+0x68/0x5e0 [ 494.106509][T15926] ? is_bpf_text_address+0x3c5/0x4b0 [ 494.111814][T15926] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 494.117895][T15926] ? is_bpf_text_address+0x47d/0x4b0 [ 494.123215][T15926] ? __kernel_text_address+0x24f/0x350 [ 494.128702][T15926] ? __kprobes_text_end+0xddc08/0xddc08 [ 494.134291][T15926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.140279][T15926] ? alloc_pages_current+0x412/0x9a0 [ 494.145578][T15926] alloc_pages_current+0x68d/0x9a0 [ 494.150730][T15926] __pmd_alloc+0xad/0x420 [ 494.155465][T15926] copy_page_range+0x3db0/0x43a0 [ 494.160427][T15926] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 494.166625][T15926] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 494.172368][T15926] ? __rb_insert_augmented+0xfd0/0x1140 [ 494.177923][T15926] ? init_admin_reserve+0x160/0x160 [ 494.184328][T15926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.190328][T15926] dup_mmap+0x1510/0x1d60 [ 494.194719][T15926] dup_mm+0x1f2/0x710 [ 494.198734][T15926] copy_process+0x3d50/0x8e30 [ 494.203441][T15926] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 494.209559][T15926] _do_fork+0x25c/0xeb0 [ 494.213729][T15926] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 494.219822][T15926] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.225829][T15926] __se_sys_clone+0x32a/0x370 [ 494.230548][T15926] __x64_sys_clone+0x62/0x80 [ 494.235154][T15926] do_syscall_64+0xbc/0xf0 [ 494.239588][T15926] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 494.245490][T15926] RIP: 0033:0x459829 [ 494.249390][T15926] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.269001][T15926] RSP: 002b:00007f4ed39dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 494.277423][T15926] RAX: ffffffffffffffda RBX: 00007f4ed39dac90 RCX: 0000000000459829 [ 494.285397][T15926] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:59:54 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xc, 0x0, "0e1584ea"}, &(0x7f0000000100), 0x0) 07:59:54 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 07:59:54 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, 0x0) [ 494.293373][T15926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 494.301367][T15926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39db6d4 [ 494.309344][T15926] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x1ef, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000080)=""/236, 0x32, 0xec, 0x1}, 0x20) 07:59:54 executing program 1 (fault-call:1 fault-nth:99): modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000), 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:54 executing program 2: add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = dup2(r0, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x8, 0x7fffffff, 0x0, 0x100, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x1}, 0x3c) open(0x0, 0x0, 0x0) 07:59:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) dup2(r0, r1) 07:59:54 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x4000, 0x0) [ 494.757105][T15950] FAULT_INJECTION: forcing a failure. [ 494.757105][T15950] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.770448][T15950] CPU: 0 PID: 15950 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #17 [ 494.778434][T15950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.788496][T15950] Call Trace: [ 494.791816][T15950] dump_stack+0x191/0x1f0 [ 494.796200][T15950] should_fail+0xa3f/0xa50 [ 494.800667][T15950] should_fail_alloc_page+0x1fb/0x270 [ 494.806078][T15950] __alloc_pages_nodemask+0x3c1/0x5fa0 [ 494.811570][T15950] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 494.817766][T15950] ? kernel_poison_pages+0x40/0x360 [ 494.823009][T15950] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 494.829180][T15950] ? prep_new_page+0x792/0x9b0 [ 494.834007][T15950] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 494.840115][T15950] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.846124][T15950] kmsan_internal_alloc_meta_for_pages+0xf9/0x510 [ 494.852569][T15950] kmsan_alloc_page+0x7a/0xf0 [ 494.857286][T15950] __alloc_pages_nodemask+0x142d/0x5fa0 [ 494.862857][T15950] ? __module_address+0x68/0x5e0 [ 494.867822][T15950] ? is_bpf_text_address+0x3c5/0x4b0 [ 494.873187][T15950] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 494.879296][T15950] ? is_bpf_text_address+0x47d/0x4b0 [ 494.884633][T15950] ? __kernel_text_address+0x24f/0x350 [ 494.890134][T15950] ? __kprobes_text_end+0xddc08/0xddc08 [ 494.895734][T15950] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.901738][T15950] ? alloc_pages_current+0x412/0x9a0 [ 494.907046][T15950] alloc_pages_current+0x68d/0x9a0 [ 494.912209][T15950] __pmd_alloc+0xad/0x420 [ 494.916609][T15950] copy_page_range+0x3db0/0x43a0 [ 494.921679][T15950] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 494.927881][T15950] ? vma_gap_callbacks_rotate+0x3f2/0x460 [ 494.933682][T15950] ? __rb_insert_augmented+0xfd0/0x1140 [ 494.939240][T15950] ? init_admin_reserve+0x160/0x160 [ 494.944453][T15950] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.950430][T15950] dup_mmap+0x1510/0x1d60 [ 494.954836][T15950] dup_mm+0x1f2/0x710 [ 494.958864][T15950] copy_process+0x3d50/0x8e30 [ 494.963571][T15950] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 494.969807][T15950] _do_fork+0x25c/0xeb0 [ 494.973991][T15950] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 494.980084][T15950] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 494.986078][T15950] __se_sys_clone+0x32a/0x370 [ 494.990805][T15950] __x64_sys_clone+0x62/0x80 [ 494.995438][T15950] do_syscall_64+0xbc/0xf0 [ 494.999884][T15950] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 495.005763][T15950] RIP: 0033:0x459829 [ 495.009667][T15950] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.029287][T15950] RSP: 002b:00007f4ed39b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 495.037706][T15950] RAX: ffffffffffffffda RBX: 00007f4ed39b9c90 RCX: 0000000000459829 [ 495.045675][T15950] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 495.053664][T15950] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 495.061641][T15950] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ed39ba6d4 [ 495.069604][T15950] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000003 07:59:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000100000008000000180000000200000000"], &(0x7f0000000080)=""/236, 0x19, 0xec, 0x1}, 0x20) 07:59:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000005000000000052d2da6d000000000000000000"], &(0x7f0000000080)=""/236, 0x32, 0xec, 0x1}, 0x20) 07:59:55 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x800) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x100000001}, &(0x7f0000000180)=0x8) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'veth1_to_bridge\x00', 0x1}, 0x18) clone(0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x40) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v2={0x5, 0x2, 0x6, 0x4, 0x8f, "855af01f48f6ebdcd14612fda734006b934d650defd8e1962efb22dc3fe8ab801e322e9499e00a69f85d6dd7a49ab54b80b0e1223833014503e17435a04bcafb33ea14e7cd63446e965ca694ee1c6504deab2025668f6def68fbf9937cf57d1dc22219f0d9f187dbdc72e1cc624ac5e0d39d921201b13e2c0a28a4cc50f7cde203d14a1486758dca8510e1d685a6aa"}, 0x99, 0x1) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x400001, 0x0) 07:59:55 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 07:59:55 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 07:59:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\xeb', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) 07:59:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000040)='+\xb9xMoO\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) write$binfmt_misc(r2, 0x0, 0x0) dup3(r2, r0, 0x80000) 07:59:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000540)='./file0\x00') openat(r0, &(0x7f0000000600)='./file0\x00', 0x202000, 0x100) 07:59:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000), 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000300)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @remote}}}, 0x108) 07:59:55 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x28540, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x28) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000000c0)=0x80, 0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:59:55 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigaction(0x0, &(0x7f0000000140)={0x0, {}, 0x0, &(0x7f0000000080)="66410f38234b73c4e2fd1e7034c443394a43758a43ffcd8fc9d89ad1450fc7fe65f3450fc7fbf3450f38f6bd0e000000c401885f8b0900000066460f38f87144"}, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10000003b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x146}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:59:55 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x3f, &(0x7f0000000540)="cb11d8b530cabcdb4985eb8ee634f1e630c1250e1dbd48cab58c401c0c179b52ab728ec91516a3fb40d6ff1648f12d8cbbf50d70ec7f6d27df17e4bf9b6beffe92c6ab2a1df99a55695ec2cb4f5f18fd42952421c40f01520c4f6fe7b1432ae0f4be318270980296d05618ea079ad6fc7533eb851aeaee54aafecb7a6fdcbf384e9eb8b181aef632afbaa071c0110d3d72211b43d08305f3b1f422a0") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x20, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x12, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f00000003c0)={0x0, 0x0, {0x65, 0x2, 0x7fffffff, 0x32d5}}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x7, 0x1, 0x72, 0x401, 0x698000000000000, 0x7, 0x8, 0x0}, &(0x7f0000000240)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000500)={r3, 0x9, 0x30}, 0xc) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000400)="14d3a469d46cdebbcc9a71a60c558d5286b577732f0a12d841fcba4c7177f5ab244755122331ed65738f02bfbac790f09e53cc8c71d06406d6cb2438f26cb798ef6efebec0723ab3bab7284f5cc03eb974412a3cc6abdf612ad3714cab7a8aed094536a9244ed6cee856e833b0e661c27c65bbbb56ee37a5c8467bba287ef4519cac2f8b5813f072f5aa3e942aa54e8a242351516334f94d53c355d7826266a27a9a05921def4931988fb0232a3fb70ef7640c2b5ed894725abb02dc4edf3c0d069c9c21cd31e9505f641e466f5a5cf30c41eb45d50c84f721a56fdd07466a9e6b79c0ec60f74f626271453f891b61babc", 0xf1, 0xfffffffffffffff8) r5 = add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="5713bf2feb785b1f8f6c683f2317816dcf612249d8eb3f5f437db4d022f79c14974baedd9515aaadb801c1d3dbc2bb0bc42b13486832674c45d8c6dac061ed5f2ce8ccc94df318fe456c1ca8882eed92b4ea7d56050ac90af1b5", 0x5a, 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)="d2e744767f8bde1bb4845dbe22d9f2b262584bc0aba4d45aa03052e9cfb3e5d4d587ce875b200bd1264c8d46af84b665d159b0c981d05ba4fa4f4f14b7c8ef0108f8946409aaf6b49c3e092bde019024b3ccaf02427ae4514f6148d1", 0x5c, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000300)={r4, r5, r6}, &(0x7f0000000340)=""/25, 0x19, 0x0) 07:59:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x800000000002, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144aff0ae9", 0x12, 0x0, 0x0, 0x0) 07:59:56 executing program 2: mount(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 07:59:56 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 07:59:56 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000000140), 0x41d, 0x0, 0x0) sendmmsg(r1, &(0x7f000000b600)=[{{&(0x7f00000001c0)=@in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x25}, 0x7}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000080)="a47b64eb20b35f2aa2218338b62dfb42a5e0a096f1716c0b9c0cd0aedb26fc723f6c30b5c6808899731740769a2c54", 0x2f}], 0x2, &(0x7f0000002040)=[{0xc}], 0xc}}, {{&(0x7f0000000380)=@isdn={0x22, 0x800, 0x2, 0x6, 0x815}, 0x80, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000001640)="b905a597b53bbc74ed92e7429e7a7233f2eac7865118b389e336689a7c3cb208d26ec050df74d29a7b4dba20ff7c64a1cb45631b2ab6bd9b167e999289847b76cbf0859a0416e8376a9209da021562863867de0d15c9cc051d074e961cb9f53afe5b69e7921ede9ca5bb6c094055d71f8d675f12cdbce9fc910fabff215bb5505dc1e3f0532675b163a3f3c800442ca3f4753259894075ad6982292a5c95fbdad27f31e65091cde38565f1bb454ac8f333c9f49a2b74e0dc53f80f75d8a16f3acb6d078a3c66391e4d270ba13e603a68a3acaf0087da3c", 0xd7}, {&(0x7f0000000580)="9e33edd2e1d3afdc", 0x8}], 0x3}}, {{0x0, 0x0, &(0x7f0000001c40)=[{0x0}, {&(0x7f0000006640)="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", 0x1000}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0) 07:59:56 executing program 2: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r5) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x27) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000680)) ioctl$TIOCLINUX7(r4, 0x541c, &(0x7f0000000240)={0x7, 0xe54}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x0, 0x0, 0x2, 0x9, 0x1, 0x3f}, 0x20) ioctl$EVIOCGABS3F(r1, 0x8018457f, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) lsetxattr(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000540)='/dev/null\x00', 0xa, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffffe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001}, 0xfffffe2d) 07:59:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000280)='./file0\x00') [ 496.280590][T16020] netlink: 'syz-executor.1': attribute type 18 has an invalid length. [ 496.340346][T16026] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:59:56 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000000140), 0x41d, 0x0, 0x0) sendmmsg(r1, &(0x7f000000b600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001f80)=@generic={0x82047463f93fe395, "0aad1367a9ae5bd0addb649b810e62beb4665251d95547dd7d0ab773c5529671bf946ff004da3cef339e46ce09567256a91f69f4ed32fe1b3081f7cf5c35647abb5a60fbd5ae3c2e154ffaf09e37a345b64506dcb0e074c4389793ff502074dd290bf619d4d70c6ee4d1d6efc4a67ff28e79d872d77d070a24cd4747e1c6"}, 0x80, &(0x7f00000085c0)=[{&(0x7f0000008540)="650c1313499724e46092c52e3d0c849cebff4bb5994208ac654c4e23adb0fc4932cb8be028b2a5637135f97e72ca5256fce850e4b469db0b3084b5b75b49eec7526eafe7d4740e7a52218d3d3c5d4be57cb3557aeef8fb04ef7297a3451b1bfcff6972c75e5187352e4ae91592f372", 0x6f}], 0x1}}, {{&(0x7f0000008600)=@nfc={0x27, 0x1, 0x0, 0x6}, 0x80, &(0x7f0000008d80)=[{&(0x7f0000008680)="dccb5a1ed929517c2f282a0463c7da5de7b61206e756e418789aacf994a86c99e3ce825721b4c54998f3cb8508eea21a146ca5ea5842748a269b9ccc0d8eb430bdf0a45674a402251050b365c72fd0806deef6b41abfb85ae8a8f302e5f21998e6498464a9c5de7e26f9b7617694338c98ce2d35bfd33bab57586333cf248f82bb7245afd5187970803a75c3699b8a137a5133e4f95bd416ab1600f016d6563a338e9658899652dbe5f59d068a6cb655bca4d341ada00c0f2b87df60d6ae22", 0xbf}, {&(0x7f0000008740)="ac4a4b48eea4a3f06d586ac6e83194bb918f2d9d4276ca27176232c08c8561e2c0dba26ed2a000974589d7b61a484d61c475a21491906acc65ea8b7d817e2e608527faf07a8c0875af1541982d830163505837048135e0dc79cb8c107b8680255e548bcca4ac6c0c5c992428b06469c20216083e4f709504eb76175272348fb355eaae93c6c310645ebb1c3b1d139452376ae47f51158db9fe0e36", 0x9b}, {0x0}, {&(0x7f0000008a40)="3341adcbb84392eda43748d54395485fc221681cfc5d3047a716156bdb5eb7834a7252965217498481b0530253ac02f1e0ba94b066a2a2a40cfc1f0c47f62eb1c62e562953fa3beb3a11a9c5057d9ff72ed30e17c5b5af61539ba042443d282ef225ecf81c4670523f71bdedb64a81223e3f659ff300ced9bec029639ff216a16cec7122567881124374191487b7c74784d4b182cf5083a490c9b1664023813265eb05b0187ea79c362abc7d4429ecd86fd9113be97f768c3c6c1d242309de1a461cd0f624986ddff845fed9fd9475541dee752a17e58a8311c4d2cef13236cc7190499f7962e5277f574db76ce503", 0xef}, {&(0x7f0000008b40)="7c80f41b941a57b1dc891bb35b1611e0368f7780a19b10bb93231a6d45b98e289a3a7a6b59cf70e81689b4babadf4977c910f31f4dbddd3c667c1c6f90aa3dd07ed30c45d44b1e2898f3ae292b26e9556a7942194eba4d08ad7c164d9ff2dd12b8383619a483b9834bc95d4efe2832c7ce08f6b425c1f589972280fcfb8a0502f8dfe34c3c540195585d930e0614068b3b463f81048ba95a721aa5daa2f28561afb8085704fef544693255c3c96037870514fac6bf9ff2bd80349060df311428eb5d24114b4a33183545002b88c8403dc1666da767ce5b509de6", 0xda}, {&(0x7f0000008c40)="2158ef17a652964f7905672c7017e3ca4960186bad06114bc3c29f97a06771a5a3e89da5ae", 0x25}, {&(0x7f0000008c80)='_', 0x1}, {&(0x7f0000008d00)="bb01598f5fa5adc14a9be3ca6526fccdd70af47281377f46fc57994af62dd0be055498ab0a9500e6cf9a3ba1e9e2261087c966b911d38b6921db8a03b244423e109e096eb0f4bbf834", 0x49}], 0x8}}, {{0x0, 0x0, &(0x7f0000008e40)=[{&(0x7f0000008e00)="3a93ffc472b88ed157002007a494648bbcf106", 0x13}], 0x1, &(0x7f0000008e80)}}, {{&(0x7f0000008ec0)=@l2={0x1f, 0x100, {0x240000000000000, 0x2, 0x6, 0x1, 0x4, 0xa95}}, 0x80, 0x0}}], 0x5, 0x0) [ 496.444831][T16020] netlink: 'syz-executor.1': attribute type 18 has an invalid length. 07:59:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000), 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:56 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000c1"]) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 07:59:56 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) clone(0x40810000, 0x0, 0x0, 0x0, 0x0) 07:59:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) pipe(&(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x158, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0xc, 0x0, @u64}, @generic="0f33e877c866d3ece75da19ac6ad552ffd2d1fed8ecc2b45f6b0c88ca47e100dafab480e3efadb9c320a882f195a9978f62a8f7bddd460906165f077f5e862df3c7fe074f0ba71d3374918f91b403646d254e7772dbcd776b9b46f2cce7c0ccf7831b5d09e64a1a5edd0afe8e91b2e923adf7653732b791a172ee47f6a7fdeb1f9f3e7155a4dcb8400e157922f29a3765a71074bd81479de659e6f9530883b4e21114e08df04e96d709c4a29b5dbc01a00d469fe065b4930", @nested={0x64, 0x0, [@generic="9620b84842b969ca91cd0613e00a7bf53c41ba40dc73943cbfa8ca284f2a78cc014d9beb9ea16df09e8579ac21bb632f4cceb95bda92cdf655c0816ffacf160167b38c4d34d9b58971beee9a24c104e2a5b7dabc662f54dbb6bfe77fc4"]}, @generic="54bfb1f770ff5d7e9d8c017c2d2a6bc12d9c1e14bf52727cab"]}, 0x158}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:59:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0xd3a0f466961b7523) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 07:59:57 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="16d0e26de106745fd30136fc2dd1876ba449e9f893d37ea6c3f1c4331afb3101d4136d49fc9b78a9fb35d229c09462ef16d89c8139dec3c311744236bf74de99a7056759536ebca5bf6b8bf84d9ba33e99e4ee28fe5f0a9fae35dcaa27edf29167fa41aba923fb852c31c90e49a58be54b1bdee7ddc4a0ba0c524ef53c8140563e752c8379f53b375ef5e22ee71f647b32cd25bb6b0086414e41f72e4b86ce078fc20fd54f5b25a2cd38cdf46ef313b096cdd478f5e9d067ef30f503ab1846b328c707d847c3d769e67478d213955c0e84fd3bff6787dff861bb0c701f74afe5187c6fef2855269b24d3439959c0fe59c5640e7595f1432d", 0xf8, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r0, 0xa6, 0xd9}, &(0x7f00000001c0)={'enc=', 'oaep', ' hash=', {'sha256-arm64-neon\x00'}}, &(0x7f0000000240)="d0b4b78011aec30763155141e0856fadfe138bfb25ada98af7e69e0ea08ac0f7a91c6fd350acba408be8b16ffcf2852dbb36e499fac799d5ebb15c896b42fa44052e23db0eb6d75ae138ee9bf912b7c93a2000cfa05f4a29d00b3c4130b54541e967a575aaaa0f95ad07dd80bba53f762493d745658068c7fb2639dc7dca98874e84b2c849c46f108051c45b312720a61a2289d30e12e54374951e2aa4bd8e62fe825c4564f6", &(0x7f0000000300)="117a69ff5f2c3438668a3af232131a35f7bf3421b78cd8c4b04da96075549e9179b59a41a2919abd356c54c5f935c549899f19dead7f89662159bc8560d35c1289eed6d44fdc59bb2b52b4a664b0578cd6ac80d03ff91427beddcf90d54c0bb666347b0a2238da9a582f507ba2d439c9b03b3a69accc20a1e7cfa5daf33d6c67214386690b908800a77e527f9da498baf6f58bacd071e08207023dde05751fa5c55512572584c8c79459a0ddf00bcfefda4fbf7e66f3be3d9af302069c8d1bb13bb0862b284918bf8f2a973addc50bc7aedcf0ed04a1dbeecd") setxattr$security_evm(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)=@ng={0x4, 0x7, "19f8cac38b7a8f62"}, 0xa, 0x1) r1 = syz_open_dev$swradio(&(0x7f00000004c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000500)) 07:59:57 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 07:59:57 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x65, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 07:59:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) 07:59:57 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x80200400, 0x0, 0x0, 0x0, 0x0) 07:59:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2da) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000700)="ff", 0xc5b80, 0x401c005, 0x0, 0x0) 07:59:57 executing program 2: r0 = socket(0x2, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e21}, 0x10) recvmsg(r0, &(0x7f000000b600)={&(0x7f000000b500)=@l2, 0x80, 0x0}, 0x40002000) 07:59:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)={0x2, 0x0, [{0x1}, {0xd, 0x9}]}) 07:59:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(r0, r0) lseek(r1, 0x0, 0x0) 07:59:57 executing program 1: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x80000) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000200)={{0x4, 0x2000, 0x10, 0x6, 0x100000001, 0xff, 0x4, 0x3, 0x9, 0x1, 0x9, 0x10000}, {0x0, 0x4000, 0x0, 0x100, 0x5, 0x100, 0x559, 0x9, 0x8, 0x1, 0x3, 0x9}, {0x10000, 0x13001, 0x0, 0x2, 0x4, 0x0, 0x2253, 0x20, 0x7, 0x0, 0x7, 0x1f}, {0x5000, 0x4000, 0x4, 0x41a4, 0x6, 0x6, 0x3, 0x10001, 0xffffffffffffe475, 0x40, 0xe7, 0x100}, {0x1, 0x10000, 0xc, 0x5, 0x6, 0xfffffffffffffffc, 0x4, 0xf29, 0x0, 0x5, 0x80000000, 0x5}, {0x10000, 0x2, 0x3, 0x80000001, 0x5, 0x7, 0xf94, 0xfff, 0x7, 0x0, 0x100000000, 0x9}, {0x2000, 0xd000, 0x18, 0x0, 0x9, 0xffff, 0x9, 0xffff, 0x80, 0x5, 0x6, 0x737d}, {0x2, 0x1, 0x9, 0x1f, 0x3ff, 0x5, 0xfffffffffffff800, 0x0, 0x7, 0x9, 0x42, 0x2}, {0x1, 0x3000}, {0x0, 0x1000}, 0x8, 0x0, 0x5000, 0x200008, 0xc, 0x0, 0xf000, [0x9, 0x1ff, 0x1, 0x7fffffff]}) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x3f, "a3c84eb56a95d83539756814540099498bb14a12b11c4d39c0f65834e6af9bcb519618f6659713bc599a22656324afb56a6135e8d7d4405cd413aacb557c7e"}, &(0x7f0000000180)=0x47) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x6, 0xc, 0x5, 0x4, r2}, 0x10) 07:59:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_THP_DISABLE(0x29, 0x0) 07:59:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:59:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000003000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cr4={0x1, 0x40050}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:59:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:58 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x1e28, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1a) 07:59:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 07:59:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000004c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x15f, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe9800000000000000000000000000aa"], 0x24a}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 07:59:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:59:58 executing program 5: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="14e60f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2df90b90f73cc65ed36a76b737a47e804e2e5696733ce994090e0c42c5bc0b8f6b517283865db0609699e5190b3271ce6e97ba328af0270a57f7b7899c1502a9f8fbe3673c6cc85237261876b5bc044b794c4a045244ce202a0945dac7651e2366305352f8efab591d84f4eb76d9a908c3433fc5e7208cf3d3145ce8dd3db3b9ba51eca78e072a2ea606b27f0c696a4d8ae72039710b36ab5eb31296e1ed71105466ae7b67236fc85947360ec4f8f69f9508c78e4f9abbb6b5fb859e010f950800bd70b70d714cdc95a53731f5bfadd60df2e7b47a612a2ac3b681ba9a89323633478eb33918eada4425f9af", @ANYBLOB="4e1347ab3b843d2140c36f0d31813b89fb37280f45", @ANYBLOB="afabe794fb8e7584e6264696d7b104ac391a48e460a0839586bc69b1f663"], 0x0, 0x11f}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) lstat(&(0x7f0000000700)='./file0\x00', 0x0) 07:59:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:58 executing program 5: r0 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e21}, 0x10) recvmsg(r0, &(0x7f000000b600)={0x0, 0x0, 0x0}, 0x40002000) 07:59:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000003c0)=0xe8) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 07:59:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000580)={@local, @empty, 0x0}, &(0x7f00000005c0)=0xc) connect$packet(r0, &(0x7f0000000600)={0x11, 0x7, r1, 0x1, 0x6, 0x6, @random="00ef149fbd7f"}, 0x14) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 499.068561][T16167] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 499.076244][T16167] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:59:59 executing program 5: syz_genetlink_get_family_id$SEG6(0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000004c0)={@empty, @remote}, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) syz_open_procfs$namespace(0x0, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) geteuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0xff}, {0x0, 0x7ff, 0x88, 0x0, 0x3}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0x7fffffff}}, 0xe8) accept4(0xffffffffffffffff, 0x0, &(0x7f00000008c0), 0x0) ioprio_get$pid(0x3, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0xb994e0bbb38c079e, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000200)={0x1f, 0x37, 0x2, {0x0, 0xffff, 0x0, 0x0, 0x1, '-'}}, 0x1f) fallocate(r1, 0x0, 0x200, 0x4003ff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1000000000004006, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) 07:59:59 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 07:59:59 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0x3, 0x1000}, &(0x7f0000000180)=0x90) [ 499.212942][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 499.219519][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 499.226507][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 499.233208][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 499.382680][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 499.389331][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:59:59 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000002, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000004c0)={@empty, @remote, 0x0}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000580)={@local, 0x6, r1}) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@nl=@unspec, &(0x7f0000000440)=0x80) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) syz_open_procfs$namespace(0x0, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f00000003c0)) geteuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0xff}, {0x80000000, 0x7ff, 0x88, 0x1, 0x3}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0x7fffffff}}, 0xe8) accept4(0xffffffffffffffff, 0x0, &(0x7f00000008c0), 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0xaa, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="354766741cfdecb3677acd459fa619260faeba00f0c0b8395fbd51b02926754a253bbaa1c195137f8094d0c0cbfb34c2557f89ada8f3f71668c525aaa0b4d2afa912cb21667bc29be818aa80aa45efb8724cb457238c4acab104180800ac234e0ca0c8eef6e612afb8ccd79587caf9e6cfdaaadec44f022519a8e745f526aaf91766d8533c320dbdf00459eaaef4533427c24933b08a00f95c112d3bde125a90e044c40f2f9cbc655ef7"], 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='\x1a\x00', 0xffffffffffffffff}, 0x30) ioprio_get$pid(0x3, r2) pipe(0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0xb994e0bbb38c079e, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffff40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000200)={0x1f, 0x37, 0x2, {0x0, 0xffff, 0x34f, r2, 0x1, '-'}}, 0x1f) fallocate(r3, 0x0, 0x200, 0x4003ff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1000000000004006, 0x0) sendfile(r4, r4, 0x0, 0x8800000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000900)="551111dc93eec457a33aeac89e6bc06c1076160e6b3aa6a3079e5112d03bc3f33c8be44fcd6501689aeffe3683ca3651515e766c0bd343cfefeae9a48e0ab464b4e5cf45b1bd8bb8c24519890e9de5beed94823097a1c52df14689167a59c5ff96da661319ddb93d5ab8e00739354a50570e8c07d7f38386c18c26afad66") [ 499.498949][T16167] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:59:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(0xffffffffffffffff, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 499.692837][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 499.699668][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 499.748111][T16191] cgroup: fork rejected by pids controller in /syz1 08:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000004c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x15f, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe9800000000000000000000000000aa"], 0x24a}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 08:00:00 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:00 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000080)=""/164, 0xa4}, {&(0x7f0000000140)=""/30, 0x1e}, {&(0x7f0000000180)=""/198, 0xc6}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/41, 0x29}, {&(0x7f00000012c0)=""/210, 0xd2}], 0x6, &(0x7f0000001440)}, 0x3ff}, {{&(0x7f0000001480)=@generic, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/11, 0xb}, {&(0x7f0000001540)=""/39, 0x27}, {&(0x7f0000001580)=""/59, 0x3b}, {&(0x7f00000015c0)=""/247, 0xf7}, {&(0x7f0000001700)=""/179, 0xb3}], 0x5, &(0x7f0000001840)=""/242, 0xf2}, 0xf5e}], 0x2, 0x2000, &(0x7f00000019c0)) getsockname$inet(r0, &(0x7f0000001a00)={0x2, 0x0, @local}, &(0x7f0000001a40)=0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='c9\x87\xf9M\x9f\xbd\x03\x97ta\\\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000002d00)=ANY=[@ANYBLOB="05"], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400201) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'pids'}]}, 0x6) 08:00:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000440), 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000440)={[{0x2d, 'rdma'}, {0x2b, 'memory'}]}, 0xe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000600)='^\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r0, &(0x7f0000000680)=r2, 0x12) r3 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0xd3, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) sendmsg$kcm(r4, &(0x7f00000003c0)={&(0x7f00000000c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)="b00f3b73529e59e26f707198930b325431f16ce2b21932e53c8ad52fd5319b8c206bc1ce994334ef4e2f607d62ea9097ba751d6fb83fea3ffd0029d0faf3f5bba2b257d3f767fd9c75c6c1bdc787970ae9cadb0eb1a7f26895fed91549fdbcdd3eb342d8528abb58be55", 0x6a}, {&(0x7f0000000280)="2bdc2b2ebd21175e7483841e1c3e48593ca072f482edf9efa5c45e6515ad07eb9d86c4d85242a8e1b829e0dda19b82c3bd06c8bd1b46562246f94d56809a9dd63c3fecd32aca8f618e1e42c7211447425a20a9500f16ac988bd1d7db9c9cc7485082832bad17643b39cad0fe6fbb4a03cabeb9bc86297f56d1477caf9b1d2715bf47e59511698e47cacda41dee710a59a48898cddfbaf4d486f4b0930c84240b2927f68be139c2d07afa8e116a4ddeb700e349b502bd1af58e95c691", 0xbc}, {&(0x7f0000000040)="b7", 0x1}, {&(0x7f0000000340)="ecb3cc43d473e7ed176e9f203fdafb8f35990275843b359e5219ac80759d89cb7ba8a53f800ac0be10696e1ae2fbc42ccbe836cde781fdee454291e0ff61a64bb75277085a4edff5744ec3d1ee453510b504e8144ba83f8fcdb1bda7f8e1b7097dfb8cee5954c8be2c9da4c65a1f206e3ab7e8", 0x73}], 0x4}, 0x40801) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r6 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f00000004c0)='\\%\'$,\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r6, r5, 0x0, 0x4, &(0x7f0000000480)='rdma', r7}, 0x30) mkdirat$cgroup(r1, &(0x7f00000005c0)='syz0\x00', 0x1ff) [ 500.409562][T16322] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:00:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000140)='mime_typebdevvboxnet1md5sum-vboxnet1\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0x6d000) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x1ff) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = getpid() perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x6, 0xfffffffffffffff9, 0x9, 0xfffffffffffffff8, 0x0, 0x77, 0x800, 0x8, 0x8, 0x6, 0x2, 0x8, 0xff, 0x0, 0x98, 0x6, 0x1, 0x4, 0x7, 0x6, 0x800, 0x7fffffff, 0x1, 0x6, 0x1f, 0xfffffffffffffff9, 0x3, 0x8b8, 0x100, 0xffffffff, 0x200, 0x5, 0x3b7, 0x2, 0x4, 0xe2, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x10000, 0x1, 0x57, 0x9, 0x1}, r4, 0xd, 0xffffffffffffffff, 0xa) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz1\x00', 0x200002, 0x0) socket$kcm(0x10, 0x2, 0x0) 08:00:00 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) [ 500.492383][ C1] protocol 88fb is buggy, dev hsr_slave_0 08:00:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001e008109e00f80ecdb4cb92e0a48240b5a44fe0be8bd6efb080008000100000001000000060005001200", 0x2e}], 0x1}, 0x0) 08:00:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x0) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 500.768501][T16443] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 08:00:00 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x23dcebe1f1b1860e, 0x0, 0x0, 0x0, 0x0) 08:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000004c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x15f, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe9800000000000000000000000000aa"], 0x24a}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 500.878973][T16448] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 08:00:01 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 08:00:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_type(r1, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0x6d000) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x1ff) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = getpid() perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x6, 0xfffffffffffffff9, 0x9, 0xfffffffffffffff8, 0x0, 0x77, 0x800, 0x8, 0x8, 0x6, 0x2, 0x8, 0xff, 0x3, 0x98, 0x6, 0x1, 0x4, 0x7, 0x6, 0x800, 0x7fffffff, 0x1, 0x6, 0x1f, 0xfffffffffffffff9, 0x3, 0x8b8, 0x100, 0xffffffff, 0x200, 0x5, 0x3b7, 0x0, 0x4, 0xe2, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x10000, 0x1, 0x57, 0x9, 0x1}, r5, 0xd, r4, 0xa) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x10, 0x2, 0x0) 08:00:01 executing program 5: perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:00:01 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "e9161683986a6323", "3deaf2bf1b2b4dd597052fb81636747e", "b553d5dd", "89ab6075f05eee26"}, 0x28) 08:00:01 executing program 5: 08:00:01 executing program 2: 08:00:01 executing program 5: 08:00:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x0) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:01 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:00:01 executing program 5: 08:00:01 executing program 2: [ 502.416044][T16460] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:00:02 executing program 3: 08:00:02 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 08:00:02 executing program 2: 08:00:02 executing program 5: 08:00:02 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0xa94}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:02 executing program 2: 08:00:02 executing program 5: 08:00:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x0) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:02 executing program 3: 08:00:03 executing program 5: 08:00:03 executing program 2: 08:00:03 executing program 3: 08:00:03 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x610ac00, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20200) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000080)={0x80000001, 0x2, 0x7, @local, 'eql\x00'}) 08:00:03 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) ptrace$cont(0x11, r0, 0x0, 0x0) 08:00:03 executing program 5: 08:00:03 executing program 2: 08:00:03 executing program 3: 08:00:03 executing program 5: 08:00:03 executing program 2: 08:00:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:03 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x7fffffff, 0x20000800, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffff4d) clone(0x2000, 0x0, 0x0, 0x0, 0x0) 08:00:03 executing program 3: 08:00:03 executing program 5: 08:00:04 executing program 2: 08:00:04 executing program 3: 08:00:04 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:04 executing program 5: 08:00:04 executing program 2: 08:00:04 executing program 3: 08:00:04 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:04 executing program 5: [ 504.652554][ C1] net_ratelimit: 25 callbacks suppressed [ 504.652575][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 504.664858][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 504.744395][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 504.750714][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:04 executing program 2: 08:00:04 executing program 3: 08:00:04 executing program 5: 08:00:04 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) fchdir(r0) ioctl(r0, 0x3, &(0x7f0000000040)="7ca5086e4784c39b2d5295b99161f609c42aa211a8b3a8e1bc86e9201fc6227a6fb660442403e2858396e067b63d99198c2fa5b62d3be6a786a2f1f94b93f1ebe16ae2490d6cbd4830994c03c2683a466d1f3e4f5dfded7ccc0456e64dfa7e422347") ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f00000000c0)={0x7, 0x1, "84e1e119aebe849d91bbee03707bea63b57b02414a2b865d660b35fafe7a6d13", 0x3600, 0x8, 0x56, 0x800, 0x20}) 08:00:05 executing program 3: 08:00:05 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:05 executing program 2: 08:00:05 executing program 5: 08:00:05 executing program 3: 08:00:05 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x400, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x10}, 0x1cea91e3f49da827) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:05 executing program 3: [ 505.452763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 505.459395][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 505.466353][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 505.472971][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 505.612525][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 505.618813][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:05 executing program 2: 08:00:05 executing program 5: 08:00:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x83, 0x3, 0x6}}, 0x14) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:05 executing program 3: 08:00:05 executing program 2: 08:00:06 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:06 executing program 3: 08:00:06 executing program 2: 08:00:06 executing program 5: 08:00:06 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x21210100, 0x0, 0x0, 0x0, 0x0) 08:00:06 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0x810c5701, &(0x7f0000000080)={0x0, 0x0, 0x10001}) 08:00:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000040)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 08:00:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="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"/732], 0x2dc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 08:00:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:06 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="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") modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:06 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @random="9c72e0571040", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x2c}, @initdev, {[@lsrr={0x83, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) 08:00:06 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xe, 0x8031, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) [ 506.817827][T17253] IPVS: ftp: loaded support on port[0] = 21 08:00:07 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x2df) 08:00:07 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xd0, 0x3) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) prctl$PR_GET_KEEPCAPS(0x7) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x2df) 08:00:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(r1, r2, 0x0) ioctl$KVM_X86_SET_MCE(r4, 0x4138ae84, 0x0) dup2(r0, r4) 08:00:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2df, 0x2df) 08:00:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:07 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x0) 08:00:08 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:08 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x10) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) eventfd2(0x325, 0x800) ioctl$KDADDIO(r0, 0x4b34, 0x1) sync_file_range(r0, 0x4, 0x8, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x8, {0x7, 0x4, 0x1, 0x3}}, 0x20) 08:00:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) [ 508.532110][T17253] IPVS: ftp: loaded support on port[0] = 21 08:00:08 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc3b4}, 0x10) 08:00:08 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(r1, r0) 08:00:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, 0x0, 0x0, 0x100, &(0x7f0000001880), 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:08 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:08 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x0) 08:00:08 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000000)={0x6, 0x20001800}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 508.991298][T17627] cgroup: fork rejected by pids controller in /syz0 08:00:09 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = creat(0x0, 0x22) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) io_submit(0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)={@local, @multicast1, @multicast2}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)) getpid() openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000240), 0xfffffffffffffeb1) 08:00:09 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:09 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x1000, 0x0, 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) 08:00:09 executing program 2: io_setup(0xffff, &(0x7f0000000040)) io_setup(0x5c, &(0x7f0000000000)) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:09 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) sendfile(r1, r0, 0x0, 0x8) [ 509.692253][T17624] vivid-000: kernel_thread() failed 08:00:09 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x6, 0x20001000, 0x1000, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffe, 0xa42}, 0xff8b) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 509.782785][ C1] net_ratelimit: 22 callbacks suppressed [ 509.782808][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 509.795341][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:10 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:10 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x0) 08:00:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x0, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1e, &(0x7f0000000100)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) [ 510.092720][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 510.099563][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:10 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:10 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x4}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:10 executing program 2: r0 = socket(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) 08:00:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0xf0ff7f, 0x0, &(0x7f0000002a80), 0x261, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 08:00:10 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8a200, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:10 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 510.902610][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 510.909167][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x0, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 510.972754][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 510.979323][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:11 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:11 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x0) 08:00:11 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:11 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x6b69, 0x7, 0x20, 0x3, 0xdc13, {0x0, @in6={{0xa, 0x4e24, 0x80000000, @rand_addr="90c8ebdd635ba950e8ae105a396f78f8", 0x5}}, 0x7, 0x5, 0x4, 0x1f, 0x8}}, &(0x7f00000000c0)=0xb0) seccomp(0x1, 0x1, &(0x7f00000001c0)={0x7, &(0x7f0000000180)=[{0x800, 0xbbe, 0x8}, {0xb191, 0x40, 0x6, 0x4}, {0x1, 0x0, 0x400}, {0xb91a, 0x1, 0x1035}, {0xffffffffffffff80, 0x401, 0x1, 0x7}, {0x69, 0x766a, 0x0, 0x1}, {0x7, 0x7fff, 0x2, 0xfff}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x7, 0x3f, 0x4ccb14db, 0x2, 0xffffffff}, &(0x7f0000000140)=0x14) 08:00:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 511.692649][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 511.699212][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:11 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:11 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40400) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001140)={r0, 0x0, 0x1000, 0xca, &(0x7f0000000040)="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", &(0x7f0000001040)=""/202, 0xd14b}, 0x28) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x0, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:12 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:12 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:12 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:12 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff, 0x4002) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) 08:00:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:12 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:12 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x900) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x6, 0x4) 08:00:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0x1f, 0x100, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:13 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:13 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000040)={0x20007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) clone(0x600, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000300)='./file1\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f00000002c0)={0x0, {0xcc8, 0x40004}}) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), 0x4) socket$unix(0x1, 0x1, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000200)={0xa0, 0x0, 0x1, {{0x4, 0x3, 0x3, 0x100, 0x9, 0x358, {0x2, 0xffffffffffff3134, 0x1ff, 0x0, 0x3, 0x11, 0x0, 0x6, 0x100, 0xffffffffffffff18, 0x10000, r1, r2, 0x8}}, {0x0, 0x4ccd3162c0c685d5}}}, 0xa0) 08:00:13 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:00:14 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:14 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:14 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0x1f, 0x100, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:14 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x1, 0x0, 0x3400, 0x0, 0x20000000000, 0x0, 0xfffffffffffffffe, 0x5, 0xfffffffffffffffe}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:14 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:00:14 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 515.052673][ C1] net_ratelimit: 16 callbacks suppressed [ 515.052696][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 515.065330][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0x1f, 0x100, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 515.818981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 515.825548][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 515.833569][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 515.839792][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 515.871963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 515.878210][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 515.884711][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 515.890940][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:15 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:15 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000100)={0x9, 0x335, &(0x7f0000000040)="bf3b1c4b9d51e9eca44378f0e1b216a2eda6b46f27a3386cb43bb5eef39438f4ad614c533adab8b8e388d86c0c6a8e31697e80a15b4694f20cfe27f35e22687164606b8878778b0d2aa1c17bae1cd0fe24be25dfb5111f699fe5e560fcdff882076dd6c3", &(0x7f00000000c0)="347075ba42fc4e086024a8dd7b36b1a13d539d4d4a022e479a983bacde030c657675398f0dc4da5fe60a9f45d5483b4914b06a", 0x64, 0x33}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:15 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:16 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 515.960889][T19641] QAT: Invalid ioctl 08:00:16 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:16 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:16 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:16 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:16 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:16 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000040)=0x5) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:16 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:16 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:16 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:17 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:17 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:17 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:17 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140), 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:17 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:17 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:17 executing program 1: r0 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r0, 0x1, 0xffffffff, r1) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xa0080, 0x105) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:17 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:17 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140), 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:17 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:17 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140), 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:17 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:18 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0x7, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x3, 0x6, 0xa, 0x1, 0x100, 0xfffffffffffffff4}, @jmp={0x5, 0x5, 0x7, 0x0, 0x4, 0x8, 0x10}, @map, @call={0x85, 0x0, 0x0, 0x36}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='GPL\x00', 0x55, 0x6c, &(0x7f0000000080)=""/108, 0x41100, 0x2, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xb, 0x401, 0x81}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x3, 0x1}, 0x0, 0x0, &(0x7f0000000280)={0x0, 0xa, 0x6, 0x40}, &(0x7f00000002c0)=0x80000001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x168}}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:18 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:18 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:18 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:18 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:18 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:19 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:19 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:19 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:19 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000, 0x1e) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000180)=""/60) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x2}) clone(0x0, 0x0, 0x0, 0x0, 0x0) accept4$tipc(r1, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10, 0x80000) restart_syscall() 08:00:19 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:19 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:19 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:19 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:20 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x20200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x120}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x7fff, r1}) 08:00:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:20 executing program 3: r0 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r0}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:20 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 520.198365][ C1] net_ratelimit: 24 callbacks suppressed [ 520.198387][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 520.210557][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:20 executing program 3: r0 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r0}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:20 executing program 3: r0 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r0}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:20 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:20 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x280000) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 08:00:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:21 executing program 3: r0 = open(0x0, 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:21 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:21 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x800, 0x0, 0x0, 0x0, 0x0) 08:00:21 executing program 3: r0 = open(0x0, 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) [ 521.292363][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 521.298881][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:21 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@loopback, 0x65, r1}) 08:00:21 executing program 3: r0 = open(0x0, 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:21 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:22 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:22 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) [ 522.012658][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 522.019235][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 522.026072][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 522.032912][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:22 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0xcd, 0x20001000, 0x0, 0x80000000, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff}, 0x0) clone(0x8000, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2400, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0xbf0000, 0x7, 0x7, [], &(0x7f00000000c0)={0xbb0b7f, 0x0, [], @p_u8=&(0x7f0000000080)=0xc79}}) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x2, 0x4) fchmod(r0, 0x4) [ 522.092764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 522.099349][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:22 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:22 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:23 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa000, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000040)={"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"}) clone(0x400, 0x0, 0x0, 0x0, 0x0) 08:00:23 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200), 0x0, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:23 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:23 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:23 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:23 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x6}, 0x10) clone(0x2010000, 0x0, 0x0, 0x0, 0x0) 08:00:23 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0xc) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:23 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setownex(r0, 0xf, 0x0) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200), 0x0, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:23 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x440, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)=0x4) 08:00:23 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:24 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setownex(r0, 0xf, 0x0) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:24 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:24 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setownex(r0, 0xf, 0x0) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200), 0x0, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:24 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:24 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$HIDIOCGUSAGES(r0, 0xd01c4813, &(0x7f0000000040)={{0x3, 0xffffffff, 0x100000000, 0x6, 0x2, 0x2}, 0x93, [0x5, 0x9, 0xffffffff, 0x80000000, 0x0, 0x6, 0x6, 0x400, 0x0, 0x4716, 0x8, 0x1, 0x81, 0x2, 0x5, 0x16, 0x3, 0x0, 0x5, 0x0, 0x1, 0x3, 0x7, 0x20, 0x4, 0xffffffff927fd8ad, 0x3ff, 0x7, 0x2031, 0x3, 0x100, 0xfffffffffffffffd, 0x9, 0x7ff, 0x7, 0x6, 0x100, 0x7, 0x7, 0x3, 0x5, 0x60, 0x800, 0x40, 0x0, 0x100000000, 0x80, 0x8, 0x8, 0xa3d, 0xffffffff, 0xfffffffffffffffe, 0x1ff, 0x2, 0x0, 0xffffffffffff8001, 0x25, 0x6, 0x40, 0x9, 0x9, 0x7, 0x9, 0x8000, 0x100000000, 0x8001, 0x0, 0x9, 0x7, 0x2, 0x2, 0x80, 0x7, 0xffffffffffffff01, 0x1, 0xbc, 0x8001, 0xcf, 0x200, 0x3, 0x1, 0x9, 0xfffffffffffffff9, 0x7, 0x6, 0x1, 0x7fff, 0x0, 0xbb, 0x4, 0x5, 0x9, 0x62bf, 0x3ff, 0x4, 0x986, 0x4, 0x172, 0xfffffffffffffffd, 0x9, 0x3f, 0x7, 0x1, 0x1, 0x3f, 0x0, 0x6, 0x7f, 0xff, 0x1, 0x7, 0x2bf5da61, 0x7, 0x1000, 0x1ff, 0x80000001, 0x7c5a, 0x7, 0xffffffffffffebbb, 0x7, 0x6, 0xacca, 0x7, 0xffffffffffff0000, 0x3ff, 0x1, 0x8, 0x1, 0x80000000, 0x20, 0x401, 0x2, 0x8, 0x7, 0xfff, 0x3, 0xb6, 0x0, 0x0, 0x80000000, 0x1d0, 0x0, 0x10001, 0xffffffffffffcaec, 0x14, 0x90, 0x60, 0x66e, 0xfff, 0xffffffff80000001, 0x1, 0x6, 0xce6a, 0x4, 0x7, 0x3, 0x7, 0x3, 0x7, 0x9, 0x8cf, 0x40, 0x4, 0xfffffffffffffff8, 0x5, 0x8000, 0x3, 0x2000000000, 0xfffffffffffff000, 0x0, 0xfffffffffffffff7, 0x4, 0x200, 0x2793, 0x1, 0x5806, 0x882e, 0xfff, 0x2, 0x0, 0x3, 0x31, 0x6, 0x0, 0x7fffffff, 0xfffffffffffff5ba, 0x2, 0x0, 0xdb, 0x642a, 0x88, 0xb776, 0x1, 0x100000000, 0xffffffffffffffff, 0xaca, 0x1, 0x9, 0x7fffffff, 0x27, 0x3, 0x4, 0x1000, 0x10000, 0x3, 0x7, 0x3, 0xfffffffffffffff9, 0xfffffffffffff001, 0x81, 0x9, 0xaea, 0x4, 0x2, 0x1, 0x3, 0x5, 0x2, 0x0, 0x800, 0x8, 0x49c5b90, 0x4, 0x80000001, 0x3ff, 0x1, 0x0, 0x80000000, 0x200, 0x8, 0x0, 0x8, 0x1, 0x4, 0xfffffffffffff800, 0x0, 0x100, 0x8, 0x0, 0x5, 0x7, 0x10000, 0x8, 0x7f, 0x200, 0x8, 0x7, 0x9, 0x1, 0x5, 0x101, 0x5, 0x3, 0x27, 0x6, 0x8, 0x6, 0x2000000000000, 0xfffffffffffffffb, 0x800, 0x7, 0x2, 0x4, 0xc7c, 0x6, 0x40, 0x5, 0x4, 0x9, 0xfffffffffffffffc, 0x3, 0x80000001, 0x401, 0x6, 0x1, 0x1, 0x100000001, 0x1, 0x10001, 0x4, 0x8001, 0xfffffffffffffffb, 0x9, 0x40, 0x6, 0x6, 0x1ff, 0x862, 0x100000001, 0xcf9, 0x4a, 0x100000001, 0x80, 0x1ff, 0xab, 0x1000, 0xffffffffffffff00, 0x1c0000000000, 0x7, 0x4, 0x2, 0xfffffffffffffffc, 0x1, 0xff, 0x4e, 0xfffffffffffffffd, 0x0, 0x10000, 0x9, 0xb5ca, 0x8, 0xfcd7, 0x80000001, 0xb07, 0x8001, 0xe41, 0xffff, 0x1000, 0x8, 0x1000, 0x6, 0x401, 0x2, 0x8000, 0x1, 0x100000000, 0x7fff, 0x4, 0x4, 0xaf1c, 0x4, 0x4, 0x843, 0x1, 0x8b2, 0x200000000000, 0xfffffffffffff000, 0x5, 0x890000, 0x6, 0x100000001, 0xffff, 0x100000000, 0x2, 0x1, 0x6, 0x1, 0x0, 0x4, 0x5, 0x0, 0x3, 0xfffffffffffffffe, 0x5, 0x1, 0x78, 0x200, 0x5, 0xa1, 0xd6f5, 0x5, 0xdc, 0x2, 0xe9, 0x1000, 0xffffffffffffffc0, 0x3ff, 0x2, 0x1, 0x4, 0x7, 0x10001, 0x0, 0x40, 0x1ff, 0x3ff, 0x6, 0x8ea, 0x80000000, 0x4, 0x0, 0xc, 0x14, 0x3, 0x2, 0x10000, 0x7, 0x9, 0x400, 0x200, 0x5, 0x6, 0x9b, 0x80000000, 0x1b3, 0x75, 0x50, 0x6, 0x8, 0x7fff, 0x5, 0x9, 0x7, 0x9, 0x4, 0x0, 0x8001, 0x100000001, 0x281, 0x7f, 0x7fff, 0x2, 0x1, 0xfffffffffffffffc, 0x0, 0x88d, 0xbb84, 0x0, 0x80, 0x80000000, 0x2d, 0xfffffffffffffff8, 0x0, 0x2, 0x6, 0x9, 0x39e, 0x2b, 0x100000001, 0x7, 0x8c04, 0x1, 0x2, 0x1, 0x2, 0x3f, 0x3, 0x3, 0x4, 0x7ff, 0x1, 0x3, 0x7, 0x1ff, 0x8, 0x7, 0x2, 0x7, 0x8, 0x100000000, 0x6, 0x400, 0x5, 0x7, 0x5, 0x6, 0x100000001, 0x1, 0xc2a9, 0x10001, 0x9, 0x100, 0x5, 0x6, 0x0, 0x80000000, 0x8, 0x7, 0x3, 0xfff, 0x8, 0x7, 0x6, 0xff, 0x1e, 0x800, 0x2, 0x10000, 0x85, 0xae80, 0x6, 0x0, 0x1, 0x1ff, 0x1ff, 0x10000, 0x40, 0x1, 0x9, 0x2, 0x8a7, 0x2, 0x800, 0x4, 0xfffffffffffffff8, 0x3, 0x33, 0x1f, 0x100000000, 0x8001, 0xfffffffffffffba3, 0x6c, 0x7fffffff, 0x0, 0x7fffffff, 0x80000001, 0x1, 0x3, 0xff, 0x9, 0x8000, 0x7, 0x1, 0x1, 0x4, 0x7fff, 0x7, 0xb79c, 0x0, 0x100000000, 0x100000000, 0x3, 0x2, 0x7f, 0x3, 0x2, 0x56b, 0xfff, 0x2, 0x7ff, 0x7fff, 0x9, 0x401, 0x6, 0x4, 0x400, 0x9, 0x83e0, 0x4, 0x8, 0x1ff, 0x7b5, 0x5, 0x6, 0x100000001, 0x4, 0x100000001, 0x3e, 0x5, 0x2fea, 0x8, 0xff, 0x3ff, 0x100000001, 0x8, 0x2, 0x1, 0x2, 0x6, 0xd2aa, 0x1, 0x996b, 0x316, 0x80000000, 0x2a5c, 0x0, 0x8, 0x1, 0x10001, 0x7000000000000000, 0x10001, 0x9, 0x9, 0x20000, 0x0, 0x10000, 0x3, 0x80000001, 0x6, 0x6, 0x800, 0x6, 0x400, 0x2, 0x80000000, 0xd5, 0x6, 0x0, 0x5, 0xffffffffffff878d, 0x10001, 0x0, 0x401, 0x4, 0x81, 0x2, 0xff000000000, 0xfffffffffffffffd, 0x8, 0x4, 0x80, 0xef, 0x5, 0xff, 0x2, 0xbb3d, 0x3b, 0xa26, 0xfff, 0xebf2, 0x1ff, 0x200, 0x6dd, 0x0, 0x1, 0x2, 0x6, 0x8, 0x4, 0x66, 0x4, 0x1f, 0x1, 0x7a0, 0x2, 0xffffffffffffffc0, 0x33, 0x9, 0x5, 0x54, 0x7, 0x8d95, 0x2, 0x6, 0x9, 0x0, 0x9, 0x2, 0xfffffffffffffffe, 0x1, 0x8, 0xc0000000, 0x4, 0x4, 0x9, 0x817, 0x8, 0x80000000, 0x8f, 0x4, 0x8699, 0x10000, 0x4, 0x9, 0x26e3, 0x3f, 0xba6, 0x2, 0x2, 0x280, 0x2, 0x2, 0x47ff6c7b, 0x0, 0x0, 0x8, 0x1, 0x101, 0x3, 0x4, 0x87ba, 0x5, 0xcb5a, 0x6, 0x4, 0x3, 0x65aad37e, 0x7, 0x0, 0x4, 0x80, 0x3, 0x8ab2, 0x3, 0xca9, 0x47d3, 0x0, 0x2, 0x5, 0x10000, 0x8000, 0x80, 0x1, 0x0, 0x6, 0x0, 0xffffffffcc210c14, 0x100, 0x81, 0x3, 0x80000000, 0x6e, 0x5, 0x600000000000000, 0x80000001, 0x2, 0x5, 0x2, 0x7f, 0x7, 0x8, 0x8, 0x5, 0xe6, 0x7, 0x3, 0x400, 0x9, 0x81, 0x318ec04d, 0x17a6, 0x400, 0xfffffffffffffff8, 0xff, 0x4, 0x200, 0x10001, 0x3f, 0x8, 0x81, 0x3, 0x6, 0x9, 0x6, 0x10001, 0xfffffffffffffffa, 0x6, 0x8, 0x100000001, 0x4, 0x3, 0x6, 0x4, 0x3, 0x0, 0x1, 0xffffffffffffff5e, 0x80, 0xfffffffffffffffe, 0x200, 0x8, 0x3f, 0x1, 0x0, 0x9, 0x93, 0x5, 0xfb, 0x7, 0x2, 0x7, 0xffff, 0x6, 0x3, 0x0, 0x400, 0x1, 0x3ff, 0x8000, 0x7, 0x8, 0xc, 0x4, 0x1, 0x3ff, 0x8, 0x874e, 0x2, 0x5, 0xffff, 0xdc8, 0x8, 0x0, 0x400, 0x8000, 0xfed1, 0x6, 0x1, 0xfffffffffffffff7, 0x94ab, 0x4, 0xfffffffffffffffc, 0x5, 0x3, 0x8, 0xfff, 0x990, 0x2, 0x3, 0x9da1, 0xb1, 0xd222, 0x6, 0x8, 0x5, 0x6, 0x401, 0x4, 0x80000000, 0x200, 0x9ec1, 0x7fff00, 0x3, 0x2, 0x100, 0x6, 0x4, 0x8, 0x133, 0x8, 0xf56b, 0x10001, 0x101, 0x2, 0x7, 0x259be1ed, 0x0, 0x40, 0x6, 0x5, 0x1, 0x8, 0x4, 0x0, 0x96a3, 0x4, 0x2, 0x6, 0x5, 0x6, 0x40, 0xfffffffffffffff7, 0x800, 0x100, 0x4, 0x3fc0000000, 0x6, 0x1, 0x8a0, 0x6, 0x7747c692, 0x81, 0x3, 0x9, 0x8a, 0x7, 0x2, 0x8, 0xffffffffffffff67, 0x5, 0x1, 0x1, 0x7fffffff, 0x5, 0x8, 0x2388, 0x0, 0x5, 0x7ff, 0x81, 0x5, 0x6, 0x8001, 0x1a80, 0x6, 0x8000, 0x6, 0xffffffff, 0x10000, 0xa8, 0x7, 0xc8f, 0x1, 0x2, 0x2, 0x101, 0x5, 0x200, 0x0, 0x1, 0xffffffff, 0x400, 0x0, 0x8, 0xffffffff, 0x3, 0xfdc, 0x8, 0x4, 0x20, 0x1, 0x68b, 0xfd4b, 0x1ff, 0xfffffffffffffffa, 0x9, 0x6, 0x100000000, 0xfffffffffffff1fb, 0x4, 0xf2e, 0x6, 0x8, 0x5, 0x8, 0x8, 0x4, 0x4, 0x7, 0x0, 0x5, 0xfffffffffffffff8, 0x9, 0x2, 0x1000, 0x7, 0x200, 0x1, 0xff, 0x1ff, 0x0, 0x800, 0x963b, 0x9, 0x9, 0x0, 0x3, 0x1, 0x7, 0x3f, 0x2, 0x9, 0x6, 0x5, 0xfffffffffffffeff, 0x4, 0x3d, 0x7f, 0x8, 0xffffffffffffff2d, 0x7, 0x7, 0x0, 0x9, 0x9, 0x4, 0xb3f, 0x40, 0xffffffff, 0x7, 0xff, 0x5, 0x5, 0x3, 0xfffffffffffffff8, 0x9c, 0x5, 0x100000001, 0x4000, 0x4, 0x8, 0x79, 0xff, 0xffff, 0x2, 0x1, 0x9, 0x2, 0xb7, 0x7, 0x0, 0x5, 0x9, 0x7, 0x8, 0xad33, 0x3, 0x7ff, 0x0, 0x7, 0xffffffffffffff80, 0xfffffffffffff882, 0xfffffffffffffeff, 0x4, 0x99e, 0x0, 0x400, 0x7, 0x0, 0x6, 0x0, 0x5, 0x5d47, 0x80800000000, 0x0, 0x67fd, 0x5, 0x7ff, 0xe578, 0x186, 0x4, 0xfffffffffffffffe, 0x9d1, 0x80000000, 0x214f, 0x100, 0x2, 0x6, 0x80, 0xb8a, 0xc2, 0xffffffffffffad61, 0x400, 0x2]}) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:24 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x11, r1, 0x0, 0x0) 08:00:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:25 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:25 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 525.452716][ C1] net_ratelimit: 16 callbacks suppressed [ 525.452738][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 525.465160][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c937", 0x18, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:25 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 08:00:25 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) fallocate(r0, 0x8, 0x82, 0x1) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r1 = dup(0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x102, 0x4, {0x1000, 0xff, 0x4, 0x3}}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:25 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:26 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:26 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 08:00:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 526.172654][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 526.179311][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 526.187051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 526.194019][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 526.252664][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 526.259144][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 526.265886][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 526.272353][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c937", 0x18, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:26 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:26 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) read$hidraw(r0, &(0x7f0000000040)=""/185, 0xb9) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:26 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 08:00:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:26 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:27 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, 0x0, 0x0, 0x0) 08:00:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:27 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c937", 0x18, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:27 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:27 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:27 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, 0x0, 0x0, 0x0) 08:00:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:27 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:28 executing program 0: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xc) ptrace$cont(0x11, 0x0, 0x0, 0x0) 08:00:28 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3f, 0x800) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000080)={{0x3b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x2, 'wlc\x00', 0x24, 0x7, 0x34}, {@rand_addr=0x3, 0x4e21, 0x2, 0x3, 0x1, 0x5}}, 0x44) modify_ldt$write2(0x11, &(0x7f0000000000)={0xffffffffffffffff, 0x1000, 0x2000, 0x3, 0x0, 0x0, 0x2, 0x4, 0x0, 0x10000000000}, 0xfffffffffffffeee) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_connect(0x6, 0x3f4, &(0x7f0000000100)={{0x12, 0x1, 0x201, 0xae, 0xc7, 0xbe, 0x40, 0x50d, 0x258a, 0x839e, 0x100000000, 0x2, 0x0, 0x1, [{{0x9, 0x2, 0x3e2, 0x1, 0x1, 0x14, 0x40, 0x10000, [{{0x9, 0x4, 0xd2, 0xffffffffffffff00, 0x7, 0xcb, 0xbc, 0xbe, 0x0, [@hid_hid={0x9, 0x21, 0x8, 0x8, 0x1, {0x22, 0xc50}}, @hid_hid={0x9, 0x21, 0x2b4, 0x6, 0x1, {0x22, 0x688}}], [{{0x9, 0x5, 0x1, 0x10, 0x1b, 0x101, 0x100000001, 0x3, [@generic={0x73, 0x30, "a24316156bed37cb07bbf6e78a59bee3362486871853ffe4629844ed90c8223852d4fc4d7a517ebc9fd15a23e325f8a946fb9bfbdc713886b95e11dd8325ebfdf25035462d25b3943c0947728853b676d700feffcad555d98da2abe2c3febaeee985b93ac4f464591d78060092a1d13269"}]}}, {{0x9, 0x5, 0x80, 0x0, 0xdf, 0x8e, 0x1f, 0x1, [@generic={0x2d, 0xa, "7fbea22e3b4ff2ce963d67f39ac4e337f95a9a6852cb3bcb14d71702667400dd86d55c7082103cc0969772"}]}}, {{0x9, 0x5, 0x80, 0x7, 0x107, 0x7fffffff, 0x6, 0x6, [@generic={0xf4, 0x3, "96c0c26d14e458055f591a5b46dea7727408e1b098a2b4b8c1416c3375ad9bd08932991182e47c2d1b97958be49e2e25d9fc8201ec747dc968e92f130aff3b009d9c053c396e1d38b452dc2814d66da0553ea72fc8173524ef2b88db67cfd354aa6afea18fccf5bfa60a03f2b0ce8e34c069a1d089adff49e36c2f963a5b2ac31a937e84922ac9fe44d428f7f5e0023d153e60e93cc244769227dca5c84724842ebee93abcbf3586dd1ee1b41706eb1c1fb3822c27f088fe4beb9ae6c1862edf88afa97906491248d534d875967f458bde4d4c270dfbf46d32f32129c15c0bd788187dcdab4f0a02e6a5112a8ff36099aa46"}]}}, {{0x9, 0x5, 0xb, 0x5, 0x92, 0x7, 0x258, 0x7, [@generic={0x2, 0x9}, @generic={0x3c, 0x44611b2c226a49f5, "c37ac1bbc299ed44b0b8118a97729f0a4b299dc965065df4411f17c43823e62bebceb4e04d9d6d09ba5bceb6201735450f2df64b663f922b623a"}]}}, {{0x9, 0x5, 0x6ba15409ac1e8505, 0x0, 0x3e, 0x1, 0x4, 0x100000001, [@generic={0x6e, 0xf5479cc5a8601f8c, "8c715dc770375908c6a2531cc2737dc2fff617c97fbb91217c26fcf4435a53bcd2de324360a6696f3b6dd841c42396bcb577474c99425a72db1131ea5d3410d0b4f08c749a79dcb4c1c29ae5c0500435623c4b25e90d1002c41e5e2ed1433aef376bc42d0e8d953f645d8ccd"}, @generic={0xfa, 0x5100bb1a57c7da49, "a336b239f048a8f67138666c5ea1dfd39e18e976410b7d7a1fc3c80f0de0a7e50ba3db5f21ac2c8514d2f509a23afac15d8ca1d7a52dad6d2cb8291020ea44cbff5984dc220b62a02e3e8a94cfc304cae724bea30466e8be65716d86cc49f081b4d45da6638ffdf10209cc05d19b0a2fbe44f1857d969d8e867c959534a04a9faca5bda7984c90ade15f35cd2f9880aa18d685d861a291e538ea1378ee8d5ed2443aa04237daad5258c31119c83c3086e7b86fe4fea53bd362e3b0926301a64979849595f717d5a71418cd01bb5707144159e96575cec1007892f57a7185793974e45d48e458fdf50f836b98b4e6cf76eee852e52abb133e"}]}}, {{0x9, 0x5, 0x4, 0x2, 0x2b5, 0x4, 0x5, 0x38e}}, {{0x9, 0x5, 0x9, 0x0, 0x385, 0x7f, 0x0, 0xc8, [@generic={0x45, 0x0, "accb9fb04355c948f6b5cbbe95f9cfee0a790440428eee9694d6013f29ed4d9b5500c7e8d07213b74f960857cca4e04d8008b5dc20f26262c5c5d68e163824c099edb1"}]}}]}}]}}]}}, &(0x7f0000001700)={0xa, &(0x7f0000000500)={0xa, 0x6, 0x300, 0x28bdeb81, 0x2, 0x0, 0x40, 0x400}, 0x5, &(0x7f0000000540)={0x5, 0xf, 0x5}, 0x5, [{0x4, &(0x7f0000000580)=@lang_id={0x4, 0x3, 0x404}}, {0x4, &(0x7f00000005c0)=@lang_id={0x4, 0x3, 0x100a}}, {0x50, &(0x7f0000000600)=@string={0x50, 0x3, "f4fc11eefac4889dd33f1013a26f18121baa3bad8445f5ee36a04460f99345dfb0afb0f75c6453afaf55ff82f2b07e83260013bcd7863af5ff81ecce4de971cdec24eb3775c0698d466b8fccaf4e"}}, {0x4, &(0x7f0000000680)=@lang_id={0x4, 0x3, 0xeb92de27d72c0a15}}, {0x1002, &(0x7f00000006c0)=@string={0x1002, 0x3, "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"}}]}) 08:00:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:28 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2, 0x0) 08:00:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2101}) 08:00:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86", 0x24, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:28 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:29 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="d00806ee0c7a77820262a73a086237664731894b15b9151c", 0x18}], 0x1) 08:00:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) accept4(r0, 0x0, 0x0, 0x0) 08:00:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 529.118975][T23637] input: syz1 as /devices/virtual/input/input10 08:00:29 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0xef6dcf0c463b648c, 0x2671fe990800a1db) mq_timedreceive(r0, &(0x7f0000000040)=""/154, 0x9a, 0x40, &(0x7f0000000100)={0x0, 0x989680}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'nr0\x00', 0x200}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(r1, r2, 0x0) ioctl$KVM_X86_SET_MCE(r4, 0x4138ae84, &(0x7f0000000200)) dup2(r0, r4) 08:00:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86", 0x24, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:30 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:30 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 08:00:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:30 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x80005000, 0x0, 0x0, 0x0, 0x0) 08:00:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 530.572580][ C1] net_ratelimit: 24 callbacks suppressed [ 530.572604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 530.584866][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86", 0x24, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:30 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:31 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(0x0, 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:31 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x204200, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000140)=""/172) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x800, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r1, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=""/10, 0xa}}, 0x10) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000200)=0x0) setpriority(0x1, r2, 0x7ff) 08:00:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:31 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:31 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:00:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 08:00:31 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x12000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), 0x4) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000140)={0xb29a4f1f08a550fb, 0x44, &(0x7f0000000040)="079d461527b4543e2ba85ab4fa77ea37a6bf4af741f61deee96c1fb1e5d9ab08bb0b7b2848d1b4ca86212484ea6bf4517f5335f1f55123805f19f7fda4fd8723e39ad5804d0a69ff030743a49127a74b8ab8d83228c7f93b44e175dc157f41369c993b3ff10560a77f84a8d6ca73a4defc5e0682242b016abc383823849c97f49cc924ae736a406b42e3966ad62897f5391c8133e2698ab6dac0800869d75777a33ddc7e9eb6cbb785005372984475cc9faebdc7b23214b528cd2008977d9ff245e261d901b898d8c144c39f71b014fb838d", {0x8287, 0x64, 0x51424752, 0x3, 0xfff, 0xff, 0xd, 0x6}}) [ 531.517071][T24294] debugfs: Directory 'vcpu0' with parent '24294-6' already present! 08:00:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c", 0x2a, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) [ 531.692651][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 531.699327][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:31 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(0x0, 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/wireless\x00') pread64(r0, 0x0, 0x391, 0x0) 08:00:31 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x6e21c68a98647b18) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:32 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 08:00:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:32 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000400), 0x8, 0x800) readahead(r0, 0x988, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000040)=0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000200)=""/216, &(0x7f0000000300)=0xd8) r2 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r3 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={0x0, 0x2000000}) ioctl$MON_IOCX_MFETCH(r3, 0x80089203, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f00000001c0)={0x0}) r4 = geteuid() arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=@getpolicy={0x2b0, 0x15, 0x300, 0x70bd2a, 0x25dfdbff, {{@in=@multicast1, @in=@empty, 0x4e21, 0x1, 0x4e21, 0x0, 0xa, 0x20, 0x80, 0x0, 0x0, r4}, 0x6e6bb3, 0x2}, [@encap={0x1c, 0x4, {0x2, 0x4e23, 0x4e20, @in=@loopback}}, @tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x4d2, 0x7f}, 0x2, @in=@local, 0x3504, 0x0, 0x1, 0x3, 0x9, 0x7, 0x2}, {{@in6=@ipv4={[], [], @multicast2}, 0x4d3, 0xff}, 0x2, @in=@broadcast, 0x3501, 0x3, 0x0, 0x4, 0x3cd, 0xffffffffffffffc0, 0x7}]}, @replay_val={0x10, 0xa, {0x70bd2b, 0x70bd2d, 0x2}}, @extra_flags={0x8, 0x18, 0xf9f}, @tmpl={0x184, 0x5, [{{@in6=@local, 0x4d3, 0x33}, 0xa, @in6=@remote, 0x3503, 0x4, 0x3, 0x5, 0x7384, 0x3a8, 0x7}, {{@in6=@mcast1, 0x4d2, 0x33}, 0xa, @in6=@empty, 0x3500, 0x2, 0x3, 0xfffffffffffffffb, 0x100, 0x7, 0x400}, {{@in=@rand_addr=0xffffffff, 0x4d4, 0x6cb589535c9fee9}, 0xa, @in6=@mcast1, 0x3506, 0x2, 0x3, 0x2, 0x101, 0x1000, 0x959f}, {{@in6=@loopback, 0x4d6, 0x2b}, 0xa, @in=@multicast2, 0x34ff, 0x1, 0xc947e20ce1d1a89e, 0x8, 0x3, 0x3a800000000}, {{@in6=@mcast1, 0x4d2, 0x6c}, 0x2, @in=@loopback, 0x3500, 0xe6dd863cbec263db, 0x1, 0x3, 0x0, 0x1}, {{@in=@rand_addr=0x1, 0x4d5}, 0xa, @in=@remote, 0x3505, 0x1, 0x2, 0xfffffffffffffffa, 0x100000001, 0x60a, 0x2}]}, @lifetime_val={0x24, 0x9, {0x80000000, 0x8a41, 0xfff, 0x7f}}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000800) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x800000015) ioctl$HIDIOCGUCODE(r1, 0xc018480d, &(0x7f00000004c0)={0x2, 0x2, 0x4, 0x0, 0x2a, 0x80000000}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) capset(&(0x7f0000000380)={0x19980330, r5}, &(0x7f00000003c0)={0xffffffffffffff81, 0x400, 0x80, 0x200, 0x4, 0x177}) ioctl$TIOCSBRK(r3, 0x5427) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x58, &(0x7f0000000500)=[@in6={0xa, 0x4e24, 0xfffffffffffffffe, @rand_addr="4229d38c7b9690f36499a8dadd9847f2", 0x2}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x2, @rand_addr="8207a77d4eb721851a012101861d00f1", 0x661}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r6, 0x3}, &(0x7f00000001c0)=0x8) 08:00:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) [ 532.412636][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 532.419363][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 532.426494][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 532.432982][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 532.492451][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 532.498761][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c", 0x2a, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x0) 08:00:32 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(0x0, 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x2, 0x0) 08:00:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:32 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x4, 0x0, 0x0, 0x0, 0x2, 0x200000001, 0x0, 0x78c17cb1, 0x344b0de}, 0x10) clone(0x800, 0x0, 0x0, 0x0, 0x0) 08:00:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00\xe2Q*\xcf\x17F\xad6\xc5\x06\xb5\xe1^tCt\v\x9c(\xba\xc4}\t}\x91f\xa2\xfaH\xe1\xc9\xc4\xcdV\xcf\x17\xeb{\f0\x87\xea\x06\xd9\xac\x14n.^z\x99I4Su\x94FpQ\xe7\xde\x05y\xd3\xc6\xcc\xce\x9b\xf0\x15`Ah\xd4\xc2HT>O5\xb1\x8b\x9a\xd4:^O\x03f\xc7/\x80\b\xdb\xaan\xd9\xaf\x88\xb4\x98[\xae\xc3\xf2?\x10\x1b\xe2\xe63&\xb4\x13o\xde\xa5W\x85p\xa2\x16\xc3\x88s\x1b>\x92\xe6g\xe0\xeeF\xd6B\vQ\xef\xbaID\xd8y#\xb8Y>A_U\xde\xc3M\x14\xbd\xc7\x86\xee\xf3\xe4Z\x8c-\x938e\xc7\xff4\x96{\xe6\xa0R<\xfft7\xcc\x17\xaf\xf8\x1fl\x92\x1e\x9f\x84A\xae\xba\xb4\xa6\x91\xf9\xc1\x9al\xd4\xba\xd4@\xdd\xcc6\xb5\xbcO\xd6\xd2Zr') lseek(r0, 0x0, 0x1) 08:00:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:33 executing program 0: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c530f34"], 0x4}}, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4}) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ptrace$cont(0x7, r0, 0x0, 0x0) 08:00:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:00:33 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x10) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0x9, 0x7}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x80000000004100, &(0x7f0000000100)=0x0) ftruncate(r1, 0x2007ff) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) io_submit(r2, 0x6, &(0x7f0000000800)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x1000}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)="49f28c516e0d4f07a6dcda0c5feeba1c87a21ba5de0cdc4ab0cadbdfd088a97e3bddc4ae27a7ec2b86814cae00f9f75480d915755cf2475a21c7cdc9c08a64e55375ca9323f9adf2dcb6854dea5ab35b5ee1537b3975b4ce7142151a2cdbe22d9854fab8ebd1d3cdbfd7552716455234ef07f5f973916b3ab20f5be290f87fd88396646ec0f28b6106a6caa50f9676dd9f812479db3ed1263a84c5", 0x9b, 0x95, 0x0, 0x1, r3}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000580)="326eeadf93c5a7d38f5237c9a7a5f96bcdad6f2651e3e9660203ce89bb0fb58111274aad779e5049fd451d04722643ef36de85f2d58a6e7aba4b40065fe95606daaea3ec5946177b9a5d42e4bebd76245f1f7fd0bdce74602b5fe429af442aa8d430e835d920c684bffd6c7c1d8b2273e661d0309132f4bc6762c60123374c518fb780c279ede3450a1abeb84725e8ed30", 0x91, 0x458c, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000640)="1efa58fc4078dd34523d257ae92defe4d9ba99964f419b51368b1fefe0d7ecf0c5d0e68445dcac4cc36fe65ef07ac921d0d87c8d558105b4d8807fb7632bc1feff3ea27d1dcee4028833d6e9d7c39a307c75e76f97c86904ff5ec89f5efdbf", 0x5f, 0xfffffffffffffffb, 0x0, 0x2}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000006c0)="95053c6c12116b82f1109ef0ae0559865405a7208ec2abee9794b7412eb2baaa85b9ab80f5a642fc3d162b3e039fd9290c2398bf1267d86db2368ec22dfc127786195ea5ac1fb52c", 0x48, 0x7fff, 0x0, 0x0, r1}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000780)="cb2555c0d5af8b8fa4acb71c7dc2bd5dca12862794a3", 0x16, 0xeec}]) 08:00:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c", 0x2a, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 08:00:33 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(0x0, 0x2, 0x0) 08:00:33 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c1d0f056d"], 0x5}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:00:33 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) io_setup(0xff, &(0x7f0000000000)=0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x800, 0x0) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x1, 0x141000) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0xb, 0xffff, r1, &(0x7f0000000080)="ddcf658d729f06a3af37d91cf1df1b98f5a2e46d08f87347556bf5c704f331303b2def78ba97712d0e9d7ae304ef32bbfdd5291f423b7846e83500d98c559dfd4ca1afd9b1b5eaaafcefea84316da539b688be3ca4a5273931a123fa2738c6fad234", 0x62, 0x6, 0x0, 0x2, r2}]) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000001c0)) 08:00:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000002, 0x1) syncfs(r1) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x73, 0x1008e) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) clone(0x20003ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x40000000005, 0x80, 0x5) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x80) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x7ff, 0x125086) r4 = memfd_create(&(0x7f0000000000)='}#*nodev\xee\xb8em2N,\x00', 0x1) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f0000000480)='E', 0x1}], 0x1, 0x80ffd) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) prctl$PR_SVE_SET_VL(0x32, 0x126cf) r5 = syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x0) r6 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r6, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0xfffffdfd, &(0x7f00000000c0)="f2"}) 08:00:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 08:00:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 08:00:33 executing program 0: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000180)={'batadv0\x00', {0x2, 0x4e23, @empty}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x400001000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/ip6_flowlabel\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x501101, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@xdp, 0x80, 0x0}, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000001c0)) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000240)) preadv(r3, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:modules_object_t:s0\x00', 0x26, 0x2) [ 533.878470][T24893] debugfs: File '24890' in directory 'proc' already present! 08:00:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 08:00:34 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$tun(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) syncfs(r0) 08:00:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 08:00:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41", 0x2d, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:34 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000040)={0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b66}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:34 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(0x0, 0x2, 0x0) 08:00:34 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0x2000000fffff024}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x56, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaa00ffffff1bffff100d009a7ac6123abcb3ccd3337368773d853ea7361cb1e6a56dc84dc6747799d002d2520145e5aaf2c93a2d80f1dbfb6226e86b11b48568"], 0x0) 08:00:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 08:00:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:34 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x800) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) clone(0x22204500, 0x0, 0x0, 0x0, 0x0) 08:00:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 08:00:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) 08:00:35 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x7, 0x0, 0x6400, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x4aee7db0, 0x4}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) 08:00:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41", 0x2d, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:35 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(0x0, 0x2, 0x0) 08:00:35 executing program 0: clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)="09d3b86e780000000000000053443c55f91e8e0c204d9a035fe65bbfeff0e0c283af4278f3") ptrace(0x9, r0) 08:00:35 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000080)=0x7, 0x4) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000040)=[0x1, 0x3], 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c", 0xc) 08:00:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) [ 535.852576][ C1] net_ratelimit: 16 callbacks suppressed [ 535.852598][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 535.864916][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) 08:00:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:36 executing program 1: rmdir(&(0x7f0000000000)='./file0\x00') modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) prctl$PR_SVE_SET_VL(0x32, 0x982d) clone(0x0, 0x0, 0x0, 0x0, 0x0) semget$private(0x0, 0x3, 0x610) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) 08:00:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="2d5ef1f46ac9ef240d025393e7672d2835b278f141a2585982096bdd4f8c933f2d7c88322b859b6462fa5bb921c1e193d1ddd2cf2ea67c0019d2fece8752e5c2adb9db099afb396eb4bb8e5ff7ca4d0e8054edc2745aee4defcab05d1520759add602f55f5a38fb1d0949e6b28cc8b65500a890dc3a8d90700000022e0a4e575ad6dec9eb4775f22b0a894a2e92f649e02000000000000007327e87f4c773ce097e710b013"], 0xaa) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x7) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)) 08:00:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41", 0x2d, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:36 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) 08:00:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000", 0x12) 08:00:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 536.572668][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 536.579496][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 536.586644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 536.593150][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) [ 536.667744][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 536.674059][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 536.680499][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 536.686805][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:36 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xc2(t\xf56c\xf71E\x9e\x90\xac\xa4\x19\x7f\xa1\xb8\x02x9\xff0\x7f\x94\xa7\xbeX\xd2\xed\x0e^>@\xaf\x11c\xce19\xf5\xf8\xd3\x19k\x1d\xa5\x99\x89\xb4=\x1b\xde\x88g\xf4\xadi\xef\xbe\x13\xaaU\xdc\xdcw\r\xe1 jy8\n%\xde\x86\xb8ExAkCBp\x18/\x80W.[\r\x13\xc0e\x8f9i\xc5\x95\xca\xd1\xba&?\xe65}\xe9\nl\xb4b\xa7\x9dH\"\xf3\xaa>4\xe9A$\xf9\x04\xeb\xd5\x00\xb7,\x80\x1a\xaf\xbeP\f\xec\xa8\xc1l\xbb\xe9\xc2\x01\xe7\xf4mD\x80m\xc2\xbd|\x06\b\xd2\xc9\xdb\xcb\x83\xb2\xda\xa7\xc5\xf1J\xd2\xf7i\x95\xb7\xc0\xf4nEU.\x0e\x9b\xb6\x87\x13\xd5\xa8\x7f\x16\xc3\xac\x9d,\xa24>9\xa46\x8c\x7f\x00\x00\x00\x00\x00\x00\x00\x04\xf6\x8f\x0e|\xa0|\x8aw\x87\x9f\xec\xebQ\xa2\xf4[3\xdeF\xce\xf2\xb4\xf9H@\xce8\xe4\xf8\xd3\xf0', 0x200002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'teql0\x00'}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000ac0)='./file1\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r1, &(0x7f0000000140)=@ipx, 0x0) fchdir(r0) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$P9_ROPEN(r2, &(0x7f0000000000)={0x18}, 0xfffffcfb) fallocate(r2, 0x3, 0x0, 0x108001) 08:00:36 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x5015c7e8, 0x400000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x800) 08:00:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) 08:00:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f000000000000", 0x15) 08:00:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xa7, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000e000000000000f7ffffff", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) [ 537.278096][T25889] device bridge0 left promiscuous mode [ 537.287757][T25889] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 537.296480][T25889] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:00:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba43", 0x2f, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:37 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) 08:00:37 executing program 0: 08:00:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) 08:00:37 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0xc02) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x100, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x80000000, 0x8, 0xffffffffffff09e7, 0x2, 0x0, 0x9, 0x400, 0x1, 0x0, 0x101, 0x6, 0x3, 0x100000000, 0x7ff, 0x1f000000, 0xfffffffffffffffd, 0x7, 0x10001, 0xb53c, 0xfff, 0x3, 0x1, 0x0, 0x4, 0x0, 0x8, 0x2, 0x9, 0x2, 0x380000000000, 0x9be, 0x1, 0x0, 0x3, 0x3ff, 0x2, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x400, 0x0, 0x0, 0x5, 0x5, 0x7, 0x7fff}, r0, 0x8, r1, 0xf4def121cd5e5b41) get_thread_area(&(0x7f0000000000)={0x8001, 0x20001000, 0x400, 0x4, 0x3, 0x10001, 0x80000001, 0xfbc, 0x2, 0x81}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:37 executing program 0: 08:00:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) 08:00:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:37 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/114, 0x72}], 0x1}}], 0x1, 0x0, 0x0) 08:00:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e00", 0x17) 08:00:38 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x10000200, 0x0, 0x0, 0x0, 0x0) 08:00:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6076605100303afffe80034300050dff00000000000000ffff020000000000000000000000000001860090780007030060c5961ef3c40000030400000000000018030000050000011105000000000000000000000000000124c20c9151aaef92eec36cd7783f044c72034487093bddd0d8e366bf8b3276ffed569051f1ca62f7beb68462d2df939cd680a0762e963c8c2cccca88b29367b16ef8b2eb4838c891"], 0x0) 08:00:38 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8, 0x200282) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0xffffffff, {0x9e9, 0x4, 0x4, 0x1, 0x3, 0x8000}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8004, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0xffff, 0x5, {"b482c112c77153f6d534b785aaf26f2e"}, 0x2, 0x3, 0x9}}}, 0x90) clone(0x2842000, 0x0, 0x0, 0x0, 0x0) r3 = socket$isdn(0x22, 0x3, 0x26) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f0000000000)={0xeb6c25e75a5257bc, 0x44cd, 0xa84, 0xffff}) 08:00:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba43", 0x2f, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x800000000000803, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x2b4) 08:00:38 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) 08:00:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:38 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 08:00:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, '5&h', 0x44, 0x2c, 0x0, @local, @local, {[], @gre}}}}}, 0x0) 08:00:38 executing program 2: 08:00:39 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 08:00:39 executing program 2: 08:00:39 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x81, 0x40000) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000040)={0x3000, 0x2, 0x101, 0x8, 0x81}) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x9, 0x2) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) ioperm(0x2, 0x8002, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) userfaultfd(0x0) write$cgroup_pid(r2, &(0x7f0000000380), 0x12) fcntl$setlease(r0, 0x400, 0x1) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r3, &(0x7f0000000480)=""/215, 0xd7) clone(0x62000, 0x0, 0x0, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba43", 0x2f, 0x8dffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:39 executing program 0: 08:00:39 executing program 2: 08:00:39 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 08:00:39 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x0, 0xfff, 0xd6d, 0x52d7, 0xd4b, 0x5, 0x4, 0x8}}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:39 executing program 3: 08:00:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:39 executing program 0: 08:00:39 executing program 2: 08:00:39 executing program 3: 08:00:40 executing program 2: 08:00:40 executing program 0: 08:00:40 executing program 3: 08:00:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0x30, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:40 executing program 0: 08:00:40 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') 08:00:40 executing program 2: 08:00:40 executing program 3: 08:00:40 executing program 2: 08:00:40 executing program 0: 08:00:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:40 executing program 2: 08:00:40 executing program 0: 08:00:40 executing program 3: 08:00:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 540.972713][ C1] net_ratelimit: 25 callbacks suppressed [ 540.972736][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 540.985158][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0x30, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:41 executing program 2: 08:00:41 executing program 0: 08:00:41 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1b, 0x400000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x3, 0x10, 0x70, 0x4}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x10000}, 0x8) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:41 executing program 3: 08:00:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:41 executing program 0: 08:00:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:41 executing program 2: 08:00:41 executing program 3: 08:00:41 executing program 0: 08:00:41 executing program 3: [ 542.092400][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 542.098714][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:42 executing program 2: 08:00:42 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x103000, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0xffff, 0x3, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440840, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0xfffffffffffffffc, 0xfffffffffffffce9) 08:00:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0x30, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:00:42 executing program 0: 08:00:42 executing program 3: 08:00:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:42 executing program 0: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./file1\x00') close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) accept$packet(r2, 0x0, 0x0) 08:00:42 executing program 3: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./file1\x00') close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 08:00:42 executing program 2: 08:00:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:42 executing program 2: 08:00:42 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x20000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3}, 0x10) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x420040, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r1, 0x8, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8010}, 0x4000000) clone(0x40000, 0x0, 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f00000000c0)={{0x2e68, 0xff}, 'port1\x00', 0x20, 0x0, 0x3, 0x10001, 0x7, 0x7, 0xfffffffffffffff9, 0x0, 0x2, 0x2}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm], 0x1) [ 542.812577][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 542.819128][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 542.825921][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 542.832655][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 542.892654][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 542.899171][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 08:00:43 executing program 2: 08:00:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:43 executing program 0: 08:00:43 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 08:00:43 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x8}, &(0x7f0000000080), 0x0) 08:00:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) close(r1) 08:00:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:43 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@random="b100485caa2a", @random="43333e128ef5", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x12, 0x0, 0x0, @multicast1=0xe0000002}}}}}, 0x0) 08:00:43 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) 08:00:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='io\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 08:00:43 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 08:00:44 executing program 2: timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 08:00:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000100)="d34ea4bfca92031476db7002f06a8b6c58f96be4", 0x14) 08:00:44 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x2, 0x8) 08:00:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='coredump_filter\x00') writev(r0, &(0x7f0000000500)=[{&(0x7f0000000040)="8e", 0x1}], 0x1) 08:00:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 08:00:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="24000000180007121dff18946f61050002000000fd003e010000010008000f000400ff7e", 0x24}], 0x1}, 0x0) 08:00:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x0, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') writev(r0, &(0x7f0000000500)=[{&(0x7f0000000040)="8e", 0x1}], 0x1) 08:00:44 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:00:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x0, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:44 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) setsockopt$inet_int(r0, 0x0, 0x1f, 0x0, 0x0) 08:00:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x0, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 08:00:45 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000000)={0x0, 0x0, 0x2000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:45 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = request_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 08:00:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)) 08:00:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:45 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:00:45 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffff6c, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) semop(0x0, 0x0, 0x0) 08:00:45 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000140)=0x6d0f366cc523bee) 08:00:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') read$rfkill(r1, 0x0, 0x0) 08:00:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 08:00:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0), 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:46 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) [ 546.252754][ C1] net_ratelimit: 16 callbacks suppressed [ 546.252776][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 546.265268][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:46 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x103000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e20, @empty}], 0x20) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000080)={0x1, 0x200, 0x3ff, 0x1000, 0xffffffffffff0000, 0x7}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:46 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 08:00:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x4000000000001a1, 0xa001) 08:00:46 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:00:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0), 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xff, 0x0) read$rfkill(r1, &(0x7f0000000300), 0x20000308) 08:00:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0), 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:46 executing program 3: syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x80000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) bind$tipc(r1, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x17) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) 08:00:46 executing program 1: modify_ldt$write2(0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x34282e1b}, 0x10) clone(0x65f49d11d79c8495, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x5, 0x440) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000001c0)={0x6, 0x8}) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x14e, 0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="0000dfbc", @ANYRES16=r2, @ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$HIDIOCINITREPORT(r1, 0x4805, 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000017020007012e2f66696c6530"], 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, &(0x7f0000000040)=0x88d) [ 546.972567][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 546.979035][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 546.985804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 546.992564][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 547.052899][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 547.059525][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 547.066473][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 547.073059][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:00:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 08:00:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:47 executing program 0: clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) r0 = gettid() r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000140)=[{}], 0x1, 0x1475, 0x0, 0x0) tkill(r0, 0x2) 08:00:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000440)={0x0, 0x0, 'client1\x00', 0x0, "12af4956e4e12d08", "eceb85f0bc9ff7fcc1a87713ad2f65f842bb393ce3dd19ca3a0a09f3b07d0482"}) 08:00:47 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000001280)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000001240)={0x1, 0x108000}) r2 = add_key$keyring(&(0x7f0000001080)='keyring\x00', &(0x7f00000010c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000001100)='.request_key_auth\x00', &(0x7f0000001140)='^\x00') getxattr(&(0x7f0000001200)='./file0\x00', &(0x7f00000014c0)=ANY=[@ANYRES16=r1, @ANYPTR64=&(0x7f0000001380)=ANY=[], @ANYPTR64=&(0x7f00000013c0)=ANY=[@ANYRES16=r0, @ANYRES32=r1, @ANYRESOCT=r2], @ANYPTR64=&(0x7f0000001400)=ANY=[@ANYRES64=r2, @ANYBLOB="fe9197211c475cc646f29f91dbe4842b0f43e320ac6769c5ce70254b6530e6d3d1388d41745e4bc6e73d36e77b1c730d5076e3f695e9f8e9a674efa387a918025754c38c2d6aa6fbf62b0dbe04a8a58bc9018721f5bda5a429d5d5b87ed1e0128464265c233d5a4e28d519f3486a88870fd8b86785bcb39cf34dbc76adbe35f32e07318a361280a0300fdd5657acca9990e788654fcf24067c64519c5abea745ef24a9a048edddfcec95077f451a"], @ANYRESDEC=r2], &(0x7f0000000080)=""/4096, 0xfffffe46) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001180)='/dev/sequencer2\x00', 0x0, 0x0) splice(r0, &(0x7f0000001300), r0, &(0x7f0000001340), 0x4, 0x2) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000011c0)={0x1ff, 0xfffffffffffff40b, 0x3, 0x752, 0x4}) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f00000012c0)={0x1, 0x9}) 08:00:47 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x4001000000000014) 08:00:47 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:00:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) 08:00:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0) 08:00:47 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)='`evt.pfs\x00', 0x0, 0x0) 08:00:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 08:00:48 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/118, 0x76) getdents64(r0, &(0x7f0000000280)=""/121, 0x1ad3cc2f) 08:00:48 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x6}, 0x10) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x14) prctl$PR_SVE_SET_VL(0x32, 0x1f00b) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2010fffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:00:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8000204007ffd, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:48 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='binfmt_misc\x00', 0x5, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 08:00:48 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) 08:00:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8000204007ffd, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:48 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/118, 0x2f) getdents64(r0, &(0x7f0000000280)=""/121, 0x1ad3cc2f) 08:00:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r1, &(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0) 08:00:48 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) eventfd(0x3) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8000204007ffd, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = timerfd_create(0x9, 0x0) close(r1) 08:00:49 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/118, 0x76) 08:00:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x8000204007ffd, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:49 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0xffff}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x100) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x2, [{}, {}]}, 0x48) 08:00:49 executing program 4: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="14e60f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4e1347ab3b843d2140c36f0d31813b89fb37280f45", @ANYBLOB="afabe794fb8e7584e6264696d7b104ac391a48e460a0839586bc69b1f663"], 0x0, 0x33}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:00:49 executing program 3: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="14e60f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2df90b90f73cc65ed36a76b737a47e804e2e5696733ce994090e0c42c5bc0b8f6b517283865db0609699e5190b3271ce6e97ba328af0270a57f7b7899c1502a9f8fbe3673c6cc85237261876b5bc044b794c4a045244ce202a0945dac7651e2366305352f8efab591d84f4eb76d9a908c3433fc5e7208cf3d3145ce8dd3db3b9ba51eca78e072a2ea606b27f0c696a4d8ae72039710b36ab5eb31296e1ed71105466ae7b67236fc85947360ec4f8f69f9508c78e4f9abbb6b5fb859e010f950800bd70b70d714cdc95a53731f5bfadd60df2e7b47a612a2ac3b681ba9a89323633478eb33918eada4425f9af", @ANYBLOB="4e1347ab3b843d2140c36f0d31813b89fb37280f45", @ANYBLOB="afabe794fb8e7584e6264696d7b104ac391a48e460a0839586bc69b1f6"], 0x0, 0x11e}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 549.659298][T29137] ptrace attach of "/root/syz-executor.3"[29134] was attempted by "/root/syz-executor.3"[29137] 08:00:49 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) 08:00:49 executing program 4: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="14e60f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2df90b90f73cc65ed36a76b737a47e804e2e5696733ce994090e0c42c5bc0b8f6b517283865db0609699e5190b3271ce6e97ba328af0270a57f7b7899c1502a9f8fbe3673c6cc85237261876b5bc044b794c4a045244ce202a0945dac7651e2366305352f8efab591d84f4eb76d9a908c3433fc5e7208cf3d3145ce8dd3db3b9ba51eca78e072a2ea606b27f0c696a4d8ae72039710b36ab5eb31296e1ed71105466ae7b67236fc85947360ec4f8f69f9508c78e4f9abbb6b5fb859e010f950800bd70b70d714cdc95a53731f5bfadd60df2e7b47a612a2ac3b681ba9a89323633478eb33918eada4425f9af", @ANYBLOB="4e1347ab3b843d2140c36f0d31813b89", @ANYBLOB="afabe794fb8e7584e6264696d7b104ac391a48e460a0839586bc69b1f663"], 0x0, 0x11a}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:00:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x8000204007ffd, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:49 executing program 0: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000440)='./file1/file0\x00', 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000000)='./file1/file0\x00', 0x0, r1, 0x0) 08:00:49 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040)=0x33, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 08:00:49 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x480000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000040)={{0x4, 0x4, 0x0, 0xe521, 'syz1\x00', 0x4}, 0x1, [0xffff, 0x1d, 0xff, 0x4, 0x6, 0x0, 0x8, 0x4, 0x0, 0x7ff, 0x4, 0x0, 0x100, 0x5, 0x1ff, 0x8001, 0x2, 0x9, 0x8, 0xfffffffffffff800, 0x4, 0x1, 0x1, 0x5, 0x4b, 0xfffffffffffffffb, 0xba, 0x5, 0x688be6d9, 0x8, 0x400, 0x8, 0x3, 0x2, 0x0, 0x3, 0x7, 0x929, 0x81, 0xffff, 0x15fc, 0x81, 0x100000000, 0xffffffffffff88f3, 0x80aa, 0xffff, 0x8, 0xc4, 0x8, 0x7fff, 0x0, 0x8, 0x759, 0xff, 0x3, 0x9, 0x4, 0x10000, 0x9, 0x3f, 0x2, 0x1c, 0x5020, 0x80000000, 0x7fffffff, 0x0, 0xff, 0x0, 0x20, 0x40, 0x4bf, 0x5, 0x800, 0x8, 0xfffffffffffffffe, 0x8, 0x2000000, 0x9, 0x81, 0x3, 0x6, 0x0, 0x0, 0x3ff, 0x8, 0xffffffffffffff55, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x0, 0x4, 0x3903, 0x8000, 0x8, 0x0, 0x3ff, 0x80, 0x4, 0xc0, 0xffffffffffff28ff, 0x0, 0x5, 0x6, 0xffff, 0x4, 0x0, 0x80, 0xa000000000000000, 0x3, 0xffffffff, 0xf6, 0x0, 0x0, 0x5, 0x5, 0x1f, 0x80000000, 0x8, 0x9, 0x3, 0x20, 0x20, 0x9, 0x2ef0, 0x2, 0x101, 0x7, 0x0, 0x8], {0x77359400}}) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000540)) 08:00:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x8000000003, &(0x7f0000000000), 0x0) 08:00:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x8000204007ffd, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) pipe(&(0x7f0000000080)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000180)="6eb5f27b8756029a7141e355536a7f86ccd207e5710446602802db0db3b179ce7048ecb1240cf3ea9dab6bc7e23d58299dec03af2701e5db3b662674f6b86ec659225ede95d382e496e5dc6d32025d0ae09144b8808dffcce30d2c351937b8bfdcf405156b321e3fcf72f281f05ab4070627ba73d627b197abbc8bc39a0aa2247b24f7088bc848b1a0af68356ecf6c2c49269517dfabb3e800", 0x99}, {&(0x7f0000000280)="695b80fe77f89d4150209b0268a254525894d6c7a661b396b3caa3cb2b2d2f3e0cd67cb8e56a1d728e303ad473326307e03bad126d993063556a5869f87e713f0cfe35164e8e6970aad2466b7c0cdc31", 0x50}, {&(0x7f00000015c0)="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", 0x9f8}], 0x3}, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240)=0x40000008001, 0x4) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967480b41ba7860f46ef65ac61cded8974895abeaf4b4834ff922b3f1e0b02bd67aa03159bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x9, 0x0, 0x27) 08:00:50 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 08:00:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:50 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x5, 0x11, r2, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) 08:00:50 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) 08:00:50 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000003000/0x3000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 08:00:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:50 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) write$P9_RGETATTR(r2, 0x0, 0x0) 08:00:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x0, 0x81, 0x1}) 08:00:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:00:51 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0xffffffffffffffff}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 551.372668][ C1] net_ratelimit: 25 callbacks suppressed [ 551.372690][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 551.385127][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:51 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udplite\x00') sendfile(r0, r0, 0x0, 0x10001) 08:00:51 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000b80)) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)='\x00!', 0x2}], 0x1, 0x0) 08:00:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 08:00:51 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:52 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:00:52 executing program 0: r0 = socket(0x400000000010, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f0000006500)=[{{&(0x7f00000001c0)=@generic={0x10, "fa2073f453ee3825adc336e0e5773d033be4fad00abfb80dcaaf8a84f4818e98011f82e3fc63687a4d3966cffde1d5a8d0f3226974b782b36290530ae59e4061484a676947c73a42dbde78c2c4e6e2cbf6f5667b4ede0a1db3188ea458755516b1fc7609fccf9a33bc4a8596de9e9f4708e9878efa35500676a37f69d3fc"}, 0x80, 0x0}}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4777}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x40) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000c0000000000", 0x24) 08:00:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffd, 0x2, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 08:00:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clone(0x13102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 08:00:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 08:00:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:00:52 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000140)={r2}) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) 08:00:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(0x0) personality(0x40dabc650c7ca52c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 08:00:52 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:00:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 552.502638][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 552.509347][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xc6) 08:00:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0xd000, 0x0, 0x2, r2, 0x3}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x2, r2, 0x3}) 08:00:52 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:00:52 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000080), &(0x7f00000000c0)="04"}, 0x20) 08:00:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0xc, 0x3, @u64=0x6}]}, 0x20}}, 0x0) 08:00:53 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(0xffffffffffffffff, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x427) 08:00:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 08:00:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:53 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x91) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) execve(&(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x108) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) write$P9_RAUTH(r4, 0x0, 0x0) 08:00:53 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) sched_yield() [ 553.212362][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 553.219162][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 553.226155][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 553.232626][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 553.292406][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 553.298918][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 553.305151][T30178] netlink: 'syz-executor.0': attribute type 22 has an invalid length. 08:00:53 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(0xffffffffffffffff, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x427) 08:00:53 executing program 4: r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r0, 0xb, 0x0) 08:00:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 08:00:53 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) modify_ldt$write2(0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x5}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(0xffffffffffffffff, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x427) 08:00:53 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, &(0x7f0000000100)=0x69) [ 553.794343][T30207] netlink: 'syz-executor.0': attribute type 22 has an invalid length. 08:00:53 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) 08:00:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x2000004e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffeeb, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)='z', 0xfffffffffffffed5, 0x8000204007ffd, 0x0, 0xffffff6f) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 08:00:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) dup(r0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@initdev, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) fchmodat(r0, &(0x7f0000000500)='./file0\x00', 0x8) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000580)) write$binfmt_elf32(r0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001ec0)='scalable\x00', 0x9) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001fc0), &(0x7f0000002000)=0x4) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000002040), 0x4) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000002240)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) restart_syscall() 08:00:54 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) [ 554.227499][T30285] netlink: 'syz-executor.0': attribute type 22 has an invalid length. 08:00:54 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040), 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:00:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0xffd2}], 0x1}}], 0x469, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000000)=0x9, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000288, 0x0) 08:00:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x2000000011, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, 0x0}}], 0x2, 0x0) 08:00:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:54 executing program 4: unshare(0x40000000) r0 = socket$inet(0x2, 0x3, 0xff) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 554.650935][T30356] netlink: 'syz-executor.0': attribute type 22 has an invalid length. 08:00:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07001506000002000000070600000ee60000bf150000000000001f670000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 08:00:54 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) [ 554.813697][T30376] IPVS: ftp: loaded support on port[0] = 21 08:00:55 executing program 3: r0 = msgget(0x3, 0x0) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/255}, 0x107, 0x3, 0x1000) msgrcv(r0, &(0x7f0000000300)={0x0, ""/4096}, 0x1008, 0x1, 0x1000) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="03000000000000001d3575fc3031a67e9036b7e1f11731befd661547732add0b0122a0433206e3b340bb8fbc2e7f9b45184956afb24cb60987bdc6820e79c07a6aeb925d4ce667613191017f5cc492ce445a020000005a92d8db8f67fb2c872ae50bf5fd891f6240c012c9010c62972407ee13e420a2002152c154eab481ee34fa8382ad9468c0202edb3e64984fcc67bafea6088879d972a3652cecb48ee9c432069747ba51d14018f23e23bb0fa317ebb2e8018bc2837d92e66a3075682953767d8b10098b6891b0e09be42016"], 0x6a, 0x800) 08:00:55 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:55 executing program 1: modify_ldt$write2(0x11, &(0x7f00000016c0), 0x10) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x8) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 555.068423][T30376] IPVS: ftp: loaded support on port[0] = 21 08:00:55 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:00:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) write$9p(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 08:00:55 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) [ 556.662430][ C1] net_ratelimit: 16 callbacks suppressed [ 556.662454][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 556.674719][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:00:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0xffd2}], 0x1}}], 0x469, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000000)=0x9, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000288, 0x0) 08:00:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:00:56 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000025c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x2}}, 0x1c, 0x0}}, {{&(0x7f00000010c0)={0xa, 0x4e24, 0x0, @mcast2, 0x4e24}, 0x1c, 0x0}}], 0x2, 0x0) 08:00:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r1, 0x0, 0x0, 0x8001) 08:00:56 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:00:57 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000025c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x2}}, 0x1c, 0x0}}, {{&(0x7f00000010c0)={0xa, 0x4e24, 0x0, @mcast2, 0xa}, 0x1c, 0x0}}], 0x2, 0x0) 08:00:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:00:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:00:57 executing program 3: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x151, 0x0, &(0x7f0000000200)=[@release={0x400c630e}], 0xfd34, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0}) 08:00:57 executing program 1: r0 = socket$isdn(0x22, 0x2, 0x25) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, 0x0) [ 557.372707][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 557.379437][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 557.386619][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 557.393126][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 557.450682][T30725] delete_channel: no stack [ 557.452532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 557.461587][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 557.468423][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 557.475513][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 557.493516][T30725] delete_channel: no stack [ 557.511630][T30728] debugfs: File '30727' in directory 'proc' already present! [ 557.519899][T30728] binder: 30727:30728 unknown command 0 [ 557.525848][T30728] binder: 30727:30728 ioctl c0306201 200001c0 returned -22 08:00:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) 08:00:58 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0xfffffffffffffd65, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0xfd64}}, 0x0) 08:00:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:00:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="01"]) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 08:00:58 executing program 3: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x151, 0x0, &(0x7f0000000200)=[@release={0x400c630e}], 0xfd34, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0}) 08:00:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:00:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 558.360484][T30742] debugfs: File '30741' in directory 'proc' already present! 08:00:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:00:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) listen(r0, 0x26) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x4000000000000, 0x0}}], 0x400015c, 0x0, 0x0) listen(r0, 0x0) shutdown(r0, 0x0) 08:00:58 executing program 3: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x151, 0x0, &(0x7f0000000200)=[@release={0x400c630e}], 0xfd34, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0}) 08:00:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:00:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:00:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@local}, 0xfea2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 558.641399][T30859] debugfs: File '30858' in directory 'proc' already present! [ 558.677297][T30859] binder: 30858:30859 unknown command 0 [ 558.683063][T30859] binder: 30858:30859 ioctl c0306201 200001c0 returned -22 08:00:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:00:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:00:58 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x0, 0x0, 0x8001) fallocate(r0, 0x0, 0x0, 0xfff3) 08:00:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 08:00:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:00:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:00:59 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='fuseblk\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}}) [ 561.772524][ C1] net_ratelimit: 24 callbacks suppressed [ 561.772547][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 561.784829][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 08:01:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="01"]) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x4031, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 08:01:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x100000000014, 0x4, 0x8, 0x100}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000100)="f21c", 0x0}, 0x18) 08:01:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r1, 0x0, 0x0, 0x8001) fallocate(r1, 0x0, 0x0, 0xfff3) 08:01:02 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:01:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 08:01:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 08:01:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 08:01:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 08:01:02 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) kcmp(r1, r1, 0x7, 0xffffffffffffffff, 0xffffffffffffffff) 08:01:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:02 executing program 3: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x5) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) [ 562.902424][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 562.908952][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 08:01:03 executing program 5: shmat(0x0, &(0x7f0000f26000/0x4000)=nil, 0x7000) msync(&(0x7f0000f27000/0x2000)=nil, 0x2000, 0x6) 08:01:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) r5 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="1400200007000007002565"], 0xb) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYRESOCT], 0x17) write$P9_RREADLINK(r2, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 08:01:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x8) 08:01:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 08:01:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 563.496561][T31156] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.503893][T31156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.511884][T31156] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.519197][T31156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.534800][T31156] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:01:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) [ 563.542661][T31156] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:01:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0], 0x2}}, 0x0) 08:01:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 563.612765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 563.619413][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 563.626366][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 563.633232][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 563.692353][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 563.698690][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 563.776298][T12355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:01:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:03 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 08:01:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0], 0x2}}, 0x0) 08:01:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0], 0x2}}, 0x0) 08:01:04 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 08:01:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 08:01:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 08:01:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:05 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 08:01:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:05 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 08:01:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000560007031dfffd946f610500070000001d00000077000000421ba3a20400ff7e", 0xfdd9}], 0x1}, 0x0) 08:01:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c0001006772"], 0x3}}, 0x0) 08:01:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c0001006772"], 0x3}}, 0x0) 08:01:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:06 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x11) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x101000, 0x0) 08:01:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:06 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:01:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c0001006772"], 0x3}}, 0x0) 08:01:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000b82000)) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 08:01:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x10012) 08:01:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c0002"], 0x3}}, 0x0) 08:01:06 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:06 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket(0x2000000000000010, 0x0, 0x0) write(r2, &(0x7f0000000140)="2400000052001f0014f9f407000904000a00071008000100040011000800000000ccecbf820000009626beb97fe84da11a0324703d1dbece3cf045fd6686ff365886ca21a1faf3bf6b2e24f5af8336130b3ff8", 0x53) ioprio_set$pid(0x3, r0, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = gettid() ioctl$LOOP_CLR_FD(r4, 0x4c01) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x28, r6, 0x10, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r5, 0x8001004000000016) 08:01:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:07 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) [ 567.052661][ C1] net_ratelimit: 17 callbacks suppressed [ 567.052683][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 567.065040][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:07 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:01:07 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c0002"], 0x3}}, 0x0) 08:01:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x20) 08:01:07 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x3ff}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100), 0x2) 08:01:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f000000b940)=[{{0x0, 0x0, &(0x7f00000059c0)=[{&(0x7f0000000fc0)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000006e80)=[{&(0x7f0000005b00)="d8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000007640)=[{&(0x7f00000070c0)="ff", 0x1}], 0x1}}], 0x3, 0x0) sendto$inet(r0, &(0x7f0000000180)='|', 0x1, 0x401c005, 0x0, 0x0) 08:01:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c0002"], 0x3}}, 0x0) 08:01:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) [ 567.772327][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 567.778905][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 567.785519][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 567.791898][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 567.907604][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 567.913978][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 567.920435][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 567.926742][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:08 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:01:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x82) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 08:01:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = creat(&(0x7f0000001540)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000001500)='./file0\x00', &(0x7f0000000040)='dax\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x23) 08:01:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600"], 0x3}}, 0x0) 08:01:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600"], 0x3}}, 0x0) 08:01:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600"], 0x3}}, 0x0) [ 568.795503][T32089] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:09 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:01:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c000200080016000101"], 0x3}}, 0x0) 08:01:09 executing program 1: 08:01:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:09 executing program 1: 08:01:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c000200080016000101"], 0x3}}, 0x0) 08:01:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:10 executing program 1: 08:01:10 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:01:10 executing program 1: 08:01:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 570.220061][T32207] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c000200080016000101"], 0x3}}, 0x0) 08:01:10 executing program 1: 08:01:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114"], 0x3}}, 0x0) 08:01:10 executing program 1: 08:01:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114"], 0x3}}, 0x0) 08:01:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:11 executing program 1: 08:01:11 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r0, 0x0, 0x1) write$FUSE_LK(r0, 0x0, 0x427) 08:01:11 executing program 1: 08:01:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 571.547943][T32248] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114"], 0x3}}, 0x0) 08:01:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:11 executing program 1: 08:01:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) [ 572.092831][ C0] net_ratelimit: 22 callbacks suppressed [ 572.092853][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 572.105550][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 572.183269][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 572.190307][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:12 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x2}}, 0x0) 08:01:12 executing program 1: 08:01:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:12 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x2}}, 0x0) [ 572.696747][T32281] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:12 executing program 1: 08:01:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/20, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x2}}, 0x0) 08:01:12 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) [ 573.292572][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 573.299462][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x2}}, 0x0) 08:01:13 executing program 1: 08:01:13 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:13 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:13 executing program 1: 08:01:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, 0x0, 0x0) 08:01:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x2}}, 0x0) 08:01:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:14 executing program 1: [ 574.012690][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 574.019166][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 574.026034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 574.032701][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:14 executing program 1: 08:01:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, 0x0, 0x0) 08:01:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x2}}, 0x0) 08:01:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e7573887200"], 0x1f) 08:01:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:14 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:14 executing program 1: 08:01:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, 0x0, 0x0) 08:01:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, 0x0, 0x0) 08:01:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:14 executing program 1: 08:01:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 08:01:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, 0x0, 0x0) 08:01:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 08:01:15 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:15 executing program 1: 08:01:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, 0x0, 0x0) 08:01:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c000000100021060000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 08:01:15 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) write$smack_current(r0, &(0x7f0000000080)='/dev/audio\x00', 0xb) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$int_in(r0, 0x80000080045002, 0x0) 08:01:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c000000100021060000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[], 0x0) 08:01:15 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c000000100021060000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 08:01:16 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[], 0x0) 08:01:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 08:01:17 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockname(r1, 0x0, &(0x7f00000001c0)) 08:01:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[], 0x0) 08:01:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 08:01:17 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:17 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) [ 577.462710][ C1] net_ratelimit: 18 callbacks suppressed [ 577.462733][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 577.475413][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) 08:01:17 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/18, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x4}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 08:01:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) 08:01:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:18 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) [ 578.172386][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 578.178766][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 578.186188][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 578.192777][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 578.252650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 578.259155][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 578.332810][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 578.339369][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='stack ::\x00\x00'], 0x1) 08:01:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/18, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:18 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) lseek(r1, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='stack ::\x00\x00'], 0x1) 08:01:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/18, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x4}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 08:01:19 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(0xffffffffffffffff, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/19, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='stack ::\x00\x00'], 0x1) 08:01:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x24}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 08:01:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e75"], 0x1) 08:01:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/19, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e75"], 0x1) 08:01:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000210600"/19, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008001600010114bb"], 0x3}}, 0x0) 08:01:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e75"], 0x1) 08:01:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) listen(r0, 0x26) shutdown(r0, 0x0) 08:01:20 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(0xffffffffffffffff, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e757388"], 0x1) 08:01:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000000000000000000007000000861500da408fe6ca98366c44764857ea5800342c00062138"], 0x28}, 0x0) 08:01:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') write$binfmt_misc(r0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) 08:01:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e757388"], 0x1) 08:01:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@dev}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 08:01:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1}}, 0xf0}}, 0x0) 08:01:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e757388"], 0x1) 08:01:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_RMID(0x0, 0x0) 08:01:21 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(0xffffffffffffffff, 0x0, 0x1) write$FUSE_LK(r1, 0x0, 0x427) 08:01:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='ceph\x00', 0x0, &(0x7f0000000340)="b7", 0x1, r0) 08:01:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1}}, 0xf0}}, 0x0) [ 581.900054][ T717] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:22 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 08:01:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e75738872"], 0x1) 08:01:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2b}, {@in6=@dev}, @in6=@mcast1}}, 0xf0}}, 0x0) 08:01:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e75738872"], 0x1) 08:01:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_RMID(0x0, 0x0) 08:01:22 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x0) write$FUSE_LK(r1, 0x0, 0x427) [ 582.492614][ C0] net_ratelimit: 22 callbacks suppressed [ 582.492635][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 582.505027][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 582.572482][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 582.579160][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="737461636b203a3a00007ca3bd2e75738872"], 0x1) 08:01:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:01:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_RMID(0x0, 0x0) 08:01:23 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x10000, &(0x7f00000006c0)) 08:01:23 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x0) write$FUSE_LK(r1, 0x0, 0x427) 08:01:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_RMID(0x0, 0x0) 08:01:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) [ 583.458362][ T948] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 583.692565][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 583.699146][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x6d1) 08:01:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa9\x9d]\xce\xaa#\x87X\xb0\xbf9\n\x9f!A&$F\x86\xfd\x17\x95me\xd0\x19G\bP5\xa4\x05\x00\xb8\xee\xb3X(\x83\xc2\xee8\\\xa5\xb1\x1aed\x94\x9b\xfb\x1d\x1f\xf2\xccr\x0fV\x88\xdf-\xd5N\x1d+ \xa5\xa1Fm\x85\v\xa1\xf87GAV\"%y\xfas\xdd9\x9e\x96R\x16\x19\xa2Y\x92z\xabc\xec\"A\x90\xcf\x83\xf2\xbb\xdb\xe1\xfb\x90JF\xa8\x80\xa9\xe0\xc8\xf3j\x03\xb4\x911.\x86\xcb\xe8\x05\xdd\x1dRV\x9d \x8c\n7\xe6\xb7ys\xcd \xb5\x92\x913\xddV\xb5\xaa\xd8\"\aj(\xe4\xfc}\xcc*\x1a,_\xb7\xf6\xa4SQ\x1c\xb3\xbe\x1e\tK\x9co\x17pR\xb5\"\xb2Jl2\x0f\xd5\xa5v9\xcc\x8c\x98\xb1\xe3\x00\xc6\n#\x82Up#\x96\xd4L\xa6\x00z\xc7\xfaF_\xf5:5\x0f\xb4sQD\x9c\x14?\x04-\xa3\xea9\xd1\xfc\x03z\x86\x14\xa4M\x8fu\xf9\xcb\xe4\xca\xd1\xf6\xba\xbd\x8dM\xb9\xb6\xc8\x94\xf2\v;\xde\xd1\xf0!\f\xb2\x1b\xb3\xba\xcaL\x95\x15\x88\x9c_\xcc\x8eZ\xae\xc5\xc9\x9e\xbdPMpW\xeeNt\x05S&\xdf\t\x98\xe7\xe8#\xa7\xa0\x9f>\x18e\x1c!\x01\xa8\xae-\xc7\xc1\xda#P\x03\xe4\xee\x91\x84\xd9\xf9|4\xb94\xa2\xa2V\x14\xe7\x99\xf1\xafM\xbbT\xa8\x7f\xb8M\x00\xa3X\xae\x996sb\x80M=\xd4\x9af\x8d\x8c\x16b\xe4\xb2\xb5\b\xcd+p\x9c\x88k8:8OD\vo{(\xca\xa8\xb0\x89\x18\xfa\x9f\xf70xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x0) write$FUSE_LK(r1, 0x0, 0x427) 08:01:24 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000007060501ff0080fffdffbf2e0a0000000c0001"], 0x17}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:01:24 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, 0x0, 0x0) 08:01:24 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x151, 0x0, &(0x7f0000000200)=[@release={0x400c630e}], 0xfd34, 0x0, 0x0}) [ 584.867324][ T1190] debugfs: File '1180' in directory 'proc' already present! [ 584.901479][ T1192] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:24 executing program 3: r0 = semget$private(0x0, 0x1, 0x10) stat(0x0, 0x0) stat(0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000580)={{0x4}}) [ 584.918022][ T1190] binder: 1180:1190 unknown command 0 [ 584.923675][ T1190] binder: 1180:1190 ioctl c0306201 200001c0 returned -22 08:01:25 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x803, 0x3) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 08:01:25 executing program 4: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x151, 0x0, &(0x7f0000000200)=[@release={0x400c630e}], 0xfd34, 0x0, 0x0}) 08:01:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)="04"}, 0x20) 08:01:25 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)="04"}, 0x20) [ 585.295958][ T1306] debugfs: File '1305' in directory 'proc' already present! [ 585.355609][ T1306] binder: 1305:1306 unknown command 0 [ 585.361264][ T1306] binder: 1305:1306 ioctl c0306201 200001c0 returned -22 08:01:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x100000000014, 0x4, 0x8, 0x100}, 0x2c) close(r0) 08:01:26 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000580)={{0x4}, 0x8, 0xfffffffffffffffc, 0x8}) 08:01:26 executing program 1: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) 08:01:26 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x427) 08:01:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000040)=""/60, 0x3c) 08:01:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) close(0xffffffffffffffff) [ 586.258530][ T1525] debugfs: File '1524' in directory 'proc' already present! 08:01:26 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) [ 586.380647][ T1580] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x100000000014, 0x4, 0x8, 0x100}, 0x2c) close(r0) 08:01:26 executing program 0: clock_gettime(0xe3e7b485db38ab08, 0x0) 08:01:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 08:01:26 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r0, 0x3e, 0x1) 08:01:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x2a8, 0x0, 0x0, 0x0, 0x4}) 08:01:27 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:27 executing program 1: gettid() wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080)=0x80000000, 0x4) r1 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000440)={0xc, 0xfffffffffffffffe, {0x57, 0x0, 0x9, {0x7ff, 0xb0b74f8}, {0x7, 0x450}, @ramp={0x14000000000000, 0xffffc00000000000, {0xffffffff, 0x8, 0xffffffffffff0000, 0xfffffffffffffeff}}}, {0x51, 0xc9a0, 0x4, {0x100, 0x5}, {0x6}, @cond=[{0x0, 0x8, 0x0, 0x5, 0x4, 0x4}, {0x0, 0x8, 0x9, 0x4, 0x1800000000, 0xc}]}}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) getgroups(0x4, &(0x7f00000003c0)=[0x0, 0xee01, 0x0, 0x0]) getegid() syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="071ccbfe499f3c114ecdcdea7922f929afa33a923f89eb0b520512c87182cd675921a48c72921ea174246e7017568e3589828a93e15773", 0x37, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000400)="d02079e355fd652444e3057d94bd1684aaac76685c8f4e53ab2372", 0x1b, 0xfffffffffffffffa) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) 08:01:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x2000000000000002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0xfffffffffffffffd, @remote}, 0x10) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130001000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) 08:01:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000020d000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002f8fc8)={0x0, 0x0, 0x0}, 0x8001) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/172, 0xac}], 0x1}}], 0x1, 0x0, 0x0) sendto(r1, &(0x7f0000000180)="be", 0x1, 0x0, 0x0, 0x0) 08:01:27 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x427) 08:01:27 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) [ 587.694432][ T1882] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:27 executing program 3: gettid() wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080)=0x80000000, 0x4) r1 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000440)={0xc, 0xfffffffffffffffe, {0x57, 0x0, 0x9, {0x7ff, 0xb0b74f8}, {0x7, 0x450}, @ramp={0x14000000000000, 0xffffc00000000000, {0xffffffff, 0x8, 0xffffffffffff0000, 0xfffffffffffffeff}}}, {0x51, 0xc9a0, 0x4, {0x100, 0x5}, {0x6}, @cond=[{0x0, 0x8, 0x0, 0x5, 0x4, 0x4}, {0x0, 0x8, 0x9, 0x4, 0x1800000000, 0xc}]}}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) getgroups(0x4, &(0x7f00000003c0)=[0x0, 0xee01, 0x0, 0x0]) getegid() syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="071ccbfe499f3c114ecdcdea7922f929afa33a923f89eb0b520512c87182cd675921a48c72921ea174246e7017568e3589828a93e15773", 0x37, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) 08:01:27 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) r2 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r3 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x800, 0x0, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x20, 0x5, 0xdd9a, 0x4}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) io_setup(0x4, 0x0) io_setup(0x0, 0x0) sendfile(r1, r2, 0x0, 0x102002700) dup2(r0, r1) socket$inet_udp(0x2, 0x2, 0x0) [ 587.862411][ C1] net_ratelimit: 18 callbacks suppressed [ 587.862434][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 587.874930][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000009000)=@newsa={0x138, 0x10, 0x301, 0x0, 0x0, {{@in=@broadcast}, {@in6=@loopback, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@algo_auth={0x48, 0x1, {{'sha256\x00'}}}]}, 0x138}}, 0x0) 08:01:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) 08:01:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x4) ioprio_get$pid(0x2, 0x0) 08:01:28 executing program 4: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000380)=0x651) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) read(r1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgrp(0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x243, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2, 0x14, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(0x0, 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000a80)='./file0\x00', 0x0, &(0x7f0000000b00)='TRUE', 0x4, 0x2) writev(0xffffffffffffffff, &(0x7f0000000b40), 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x37b) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) syz_open_dev$evdev(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x102) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1b, 0x1, 0x800, 0x0}, 0x20) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000080)={0x0, 0x19, 0x6, 0xfffffffffffffff8, "3c7ccdcbe85721b6c1c080c885626181dfab1b3e1e5c0264471de8a389335122"}) [ 588.572621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 588.579158][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 588.586095][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 588.592628][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 588.652844][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 588.659365][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 588.732839][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 588.739421][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:29 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:29 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r1, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x427) 08:01:29 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) write$smack_current(r0, &(0x7f0000000100)='/dev/audio\x00', 0xfffffd09) ioctl$int_in(r0, 0x80000000005001, 0x0) 08:01:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:01:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000003440)=[{&(0x7f0000000240)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000280)='r', 0x1}], 0x1, &(0x7f00000016c0)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 589.459974][ T2385] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000180)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="280000000000000029000000390000000002020100000000000000e53a91dcab2747a4e8cd000800002000000000000000000044e5b12ee65c994df54af9d19b27b15c13ed4643eb785a621c90c7b19e770330b6858d6a3f9e074c1e4403ca8a92f6c8a85edb73967295a87781ba95deee7cc08f0dd5ab27f9a23a466222b9d7a045a24e7af73b23be5c7b14db3e0bb8132e2c183109f2ff4ab5ffe1d11b21cd02b8"], 0x28}, 0x0) 08:01:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x34, 0x0, 0x229, 0x0, 0xffffffffffffffae}}], 0x400000000000235, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0) 08:01:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) ioctl$int_in(r1, 0x80000000005000, 0x0) 08:01:30 executing program 2: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x9000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) 08:01:30 executing program 1: 08:01:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000800)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7a, 0x0, [0x4000009f], [0x0, 0x4]}) 08:01:31 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 08:01:31 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:31 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) read$char_usb(r1, &(0x7f0000000500)=""/4096, 0x1000) tkill(r0, 0x1000000000016) 08:01:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) [ 591.179965][ T2763] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 591.247640][ T2794] mmap: syz-executor.1 (2794) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 08:01:31 executing program 3: 08:01:31 executing program 3: 08:01:31 executing program 3: 08:01:31 executing program 0: 08:01:32 executing program 3: 08:01:32 executing program 1: 08:01:32 executing program 0: 08:01:32 executing program 2: 08:01:32 executing program 3: 08:01:32 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:32 executing program 0: 08:01:32 executing program 1: 08:01:32 executing program 2: 08:01:32 executing program 3: 08:01:32 executing program 4: [ 592.892555][ C0] net_ratelimit: 22 callbacks suppressed [ 592.892579][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 592.904900][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:33 executing program 1: 08:01:33 executing program 3: [ 592.972900][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 592.979630][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:33 executing program 4: 08:01:33 executing program 2: [ 593.030554][ T2927] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:33 executing program 0: 08:01:33 executing program 3: 08:01:33 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:33 executing program 2: 08:01:33 executing program 4: 08:01:33 executing program 1: 08:01:33 executing program 0: 08:01:33 executing program 3: [ 593.907187][ T2945] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:34 executing program 1: 08:01:34 executing program 0: 08:01:34 executing program 4: 08:01:34 executing program 2: 08:01:34 executing program 3: [ 594.092514][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 594.099208][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:34 executing program 1: 08:01:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:34 executing program 4: 08:01:34 executing program 0: 08:01:34 executing program 3: 08:01:34 executing program 2: 08:01:34 executing program 1: [ 594.812734][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 594.819329][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 594.826288][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 594.832850][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:34 executing program 0: 08:01:35 executing program 2: 08:01:35 executing program 1: [ 595.011200][ T2974] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:35 executing program 4: 08:01:35 executing program 3: 08:01:35 executing program 0: 08:01:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:35 executing program 2: 08:01:35 executing program 1: 08:01:35 executing program 3: 08:01:35 executing program 4: 08:01:35 executing program 0: 08:01:36 executing program 0: 08:01:36 executing program 3: 08:01:36 executing program 4: [ 595.966413][ T2996] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:36 executing program 1: 08:01:36 executing program 2: 08:01:36 executing program 1: 08:01:36 executing program 0: 08:01:36 executing program 3: 08:01:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:36 executing program 4: 08:01:36 executing program 2: 08:01:36 executing program 1: 08:01:37 executing program 4: 08:01:37 executing program 3: 08:01:37 executing program 2: 08:01:37 executing program 1: 08:01:37 executing program 0: [ 597.068441][ T3020] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:37 executing program 4: 08:01:37 executing program 3: 08:01:37 executing program 2: 08:01:37 executing program 1: 08:01:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:37 executing program 0: 08:01:37 executing program 4: 08:01:37 executing program 3: 08:01:38 executing program 4: 08:01:38 executing program 3: 08:01:38 executing program 0: 08:01:38 executing program 1: [ 598.083839][ T3045] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:38 executing program 2: 08:01:38 executing program 4: 08:01:38 executing program 0: [ 598.252665][ C1] net_ratelimit: 18 callbacks suppressed [ 598.252692][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.265024][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:38 executing program 4: 08:01:38 executing program 3: 08:01:38 executing program 1: 08:01:38 executing program 2: 08:01:38 executing program 0: 08:01:39 executing program 1: [ 598.972378][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.978742][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 598.985328][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.991629][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 599.005419][ T3067] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:39 executing program 0: [ 599.052792][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 599.059438][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:39 executing program 4: 08:01:39 executing program 2: 08:01:39 executing program 3: [ 599.132994][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 599.139909][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:39 executing program 0: 08:01:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:39 executing program 1: 08:01:39 executing program 3: 08:01:39 executing program 2: 08:01:39 executing program 4: 08:01:39 executing program 0: 08:01:40 executing program 3: 08:01:40 executing program 1: 08:01:40 executing program 2: 08:01:40 executing program 0: 08:01:40 executing program 4: [ 600.078032][ T3090] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:40 executing program 3: 08:01:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:40 executing program 4: 08:01:40 executing program 2: 08:01:40 executing program 1: 08:01:40 executing program 3: 08:01:40 executing program 0: 08:01:41 executing program 3: 08:01:41 executing program 2: [ 600.972102][ T3111] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:41 executing program 1: 08:01:41 executing program 4: 08:01:41 executing program 0: 08:01:41 executing program 3: 08:01:41 executing program 1: 08:01:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:41 executing program 0: 08:01:41 executing program 4: 08:01:41 executing program 3: 08:01:41 executing program 2: 08:01:41 executing program 0: 08:01:41 executing program 2: 08:01:42 executing program 1: 08:01:42 executing program 3: 08:01:42 executing program 4: [ 602.035533][ T3133] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 08:01:42 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) rt_sigsuspend(&(0x7f0000000040), 0x8) 08:01:42 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x42c00) 08:01:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1}, 0xc) 08:01:42 executing program 4: rt_sigaction(0x0, &(0x7f0000000180)={0x0, {0x2}, 0x0, 0x0}, 0x0, 0x236, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x800, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x2000000000000009) 08:01:42 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @local}, 0x8, {0x2, 0x0, @multicast2}, 'irlan0\x00'}) 08:01:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r0, &(0x7f0000000040), 0x22d, 0x0) 08:01:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004044, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r0) [ 602.954365][ T3269] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:01:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1d) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) close(r0) 08:01:43 executing program 4: r0 = socket(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x40) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) 08:01:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x03\x02\xff', @ifru_names='bond_slave_1\x00'}) 08:01:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xe8, &(0x7f00000000c0)=""/232, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:01:43 executing program 2: [ 603.292821][ C0] net_ratelimit: 22 callbacks suppressed [ 603.292844][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 603.305206][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:43 executing program 3: [ 603.382934][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 603.389554][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:44 executing program 4: 08:01:44 executing program 2: 08:01:44 executing program 0: 08:01:44 executing program 1: 08:01:44 executing program 3: 08:01:44 executing program 2: 08:01:44 executing program 3: 08:01:44 executing program 1: 08:01:44 executing program 0: 08:01:44 executing program 4: 08:01:44 executing program 3: [ 604.502636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.509357][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:45 executing program 1: 08:01:45 executing program 2: 08:01:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:45 executing program 3: 08:01:45 executing program 4: 08:01:45 executing program 0: 08:01:45 executing program 1: 08:01:45 executing program 3: 08:01:45 executing program 4: 08:01:45 executing program 2: 08:01:45 executing program 0: [ 605.212612][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 605.219280][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 605.226147][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 605.232699][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:45 executing program 2: 08:01:45 executing program 0: 08:01:45 executing program 3: 08:01:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:46 executing program 1: 08:01:46 executing program 4: 08:01:46 executing program 2: 08:01:46 executing program 0: 08:01:46 executing program 3: 08:01:46 executing program 1: 08:01:46 executing program 0: 08:01:46 executing program 2: 08:01:46 executing program 4: 08:01:46 executing program 3: 08:01:46 executing program 1: 08:01:47 executing program 4: 08:01:47 executing program 3: 08:01:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:47 executing program 0: 08:01:47 executing program 2: 08:01:47 executing program 1: 08:01:47 executing program 3: migrate_pages(0x0, 0x209, &(0x7f0000000480), &(0x7f00000004c0)=0x4) 08:01:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) accept4$tipc(r1, 0x0, 0x0, 0x0) 08:01:47 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 08:01:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x8) 08:01:47 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x1, 0x0, 0x10001}) 08:01:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000240)="abe3b50defce4475f19acd277834e49aa72efc08356ca52c3c558be37ae4fcf6643ea09eabd843b730f0d73b0f30e26aca3648abc4c17e94210db16f0f244160590886a5eb5707d137292c45e6f81268c03c482b5d1a34f38f11e789aae19d5697e61e0096e5ddd687ca66446a3bbb7cff34ad16eb1443f4fc05b13f0cdd1c625cda169f86b515bb039f8cd2d4fa58f491548d76bbd65a9472c7d90da01c874fcadfbe935af0a0c6df", 0xff78, 0x1f4, 0x0, 0x30e) 08:01:47 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000a00)=[{&(0x7f00000000c0)="7f", 0x1}], 0x1, 0x0) 08:01:47 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="d00806ee0c7a77820262a73a086237664731894b15b9151cc6", 0x19}], 0x1) [ 607.696191][ T3619] input: syz1 as /devices/virtual/input/input12 08:01:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000029008151e00f80ecdb4cb904034865161a0007000500039f0089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) 08:01:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000200)='./file0\x00', 0x0) read(r0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) 08:01:48 executing program 0: r0 = socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130003000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) 08:01:48 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000140)) 08:01:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="d00806ee0c7a77820262a73a086237664731894b15b9151cc6", 0x19}], 0x1) [ 608.311818][ T3631] netlink: 'syz-executor.1': attribute type 7 has an invalid length. [ 608.334790][ T3636] input: syz1 as /devices/virtual/input/input14 08:01:48 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05604, &(0x7f0000000040)={0x2}) 08:01:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) 08:01:48 executing program 1: syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) 08:01:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="d00806ee0c7a77820262a73a086237664731894b15b9151cc6", 0x19}], 0x1) [ 608.636027][ T3649] input: syz1 as /devices/virtual/input/input15 [ 608.662867][ C1] net_ratelimit: 18 callbacks suppressed [ 608.662887][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 608.675295][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3d7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x400000000000001) r3 = syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f00000001c0)={0x2, 0x0, [{}, {}]}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000040)="66b91200000066b81f4a000066ba000000000f30660fd7e80f01c4c16303046783f305b800008ec80f320f0091557a660f3839f4f30f1efa", 0x38}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:01:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="d00806ee0c7a77820262a73a086237664731894b15b9151cc6", 0x19}], 0x1) [ 609.038634][ T3761] input: syz1 as /devices/virtual/input/input16 [ 609.372641][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 609.379010][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 609.385752][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 609.392201][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 609.452682][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 609.459235][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 609.542719][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 609.549295][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:49 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @random="9c72e0571040", [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x2c}, @initdev, {[@lsrr={0x83, 0x3, 0x9680}, @rr={0x7, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) 08:01:49 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x0, 0x5, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\v935'}, 0x0, 0x0, @offset, 0x4}) 08:01:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x5) ftruncate(r1, 0x1000000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000000)={0x528000, 0x10, [0x5, 0x1, 0x80000001, 0x101]}) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:01:49 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000200)='./file0\x00', 0x0) read(r0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) [ 609.655421][ T3772] input: syz1 as /devices/virtual/input/input17 08:01:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:01:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 08:01:50 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 610.107569][ T3792] input: syz1 as /devices/virtual/input/input18 08:01:50 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 08:01:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xa0b) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0xa64, "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"}, &(0x7f00000011c0)=0xa6c) 08:01:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x5) ftruncate(r1, 0x1000000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000000)={0x528000, 0x10, [0x5, 0x1, 0x80000001, 0x101]}) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 610.674515][ T3800] input: syz1 as /devices/virtual/input/input19 08:01:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:51 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 08:01:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:01:51 executing program 2: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x80045300, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "2dd6d6bd7bec23da", "618135205a744a0f38865894d231fc8eeb2c2c017d0f7a35bd5a1eb24cfe57af"}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 08:01:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) [ 611.665002][ T4023] input: syz1 as /devices/virtual/input/input20 08:01:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000600)={0x0, 0x0, {0x0, 0x3, 0x10001, 0x2, 0x200}}) r4 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10) getsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f00000001c0)=""/2, &(0x7f00000002c0)=0x2) msgrcv(r2, 0x0, 0x0, 0x0, 0x1000) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) msgsnd(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0108000004000000a11a96162ad9fe7307a9920eacedd4e5029b720010c92673fa08179682a1bb86017dd9792fbbb44acceb5a24c08d4fc6daede71cabdbe0fe75ac81e5"], 0x1, 0x93ddc99ea35a8a9b) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000680)={0x0, 0x37, "7b5ec28a6ed7b09d96bd63aecaf559568ab02363210a096813e722a4151ed5433ab158ede401548893dfa3f266d4be5a0a35b1a7a84b4c"}, &(0x7f00000006c0)=0x3f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000700)={r6}, 0x0) msgctl$IPC_RMID(r2, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x1, 0x1) timer_create(0x3, &(0x7f0000000100)={0x0, 0x34, 0x0, @thr={&(0x7f0000000300)="d995b88774afd98ee491613b23616f186acbf816f9b096ce3d393d4f1895c27b596f5408445e77dd42cef98a14185ab7e5e38171beda167d3ad67450f079a72b4fbf377d45e82290b981be8c28bf751c256b0aada4928ed6f3c10e59078a9303bfe51e2f3a9ed119fb0378710a814286484e995459dfd61500baae3942fb60c67b2b0eea8963fffb97decf68e0402c86a5d4a0d671a2b680b19b3e01becde9cff9c44c1cb5a6d490f9b5f0ffa2de2f31c9a63fda40373caa8677fbc9e730bca9efcd25dc5eb74d8dd193f8945be3e863d6beb98a", &(0x7f0000000400)}}, 0x0) timer_getoverrun(0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1, 0x1}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000080)={r7, 0xa}, 0x8) 08:01:51 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00\xe2Q*\xcf\x17F\xad6\xc5\x06\xb5\xe1^tCt\v\x9c(\xba\xc4}\t}\x91f\xa2\xfaH\xe1\xc9\xc4\xcdV\xcf\x17\xeb{\f0\x87\xea\x06\xd9\xac\x14n.^z\x99I4Su\x94FpQ\xe7\xde\x05y\xd3\xc6\xcc\xce\x9b\xf0\x15`Ah\xd4\xc2HT>O5\xb1\x8b\x9a\xd4:^O\x03f\xc7/\x80\b\xdb\xaan\xd9\xaf\x88\xb4\x98[\xae\xc3\xf2?\x10\x1b\xe2\xe63&\xb4\x13o\xde\xa5W\x85p\xa2\x16\xc3\x88s\x1b>\x92\xe6g\xe0\xeeF\xd6B\vQ\xef\xbaID\xd8y#\xb8Y>A_U\xde\xc3M\x14\xbd\xc7\x86\xee\xf3\xe4Z\x8c-\x938e\xc7\xff4\x96{\xe6\xa0R<\xfft7\xcc\x17\xaf\xf8\x1fl\x92\x1e\x9f\x84A\xae\xba\xb4\xa6\x91\xf9\xc1\x9al\xd4\xba\xd4@\xdd\xcc6\xb5\xbcO\xd6\xd2Zr') lseek(r0, 0x33, 0x1) 08:01:52 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x40}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000080)) 08:01:52 executing program 4: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 08:01:52 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip6_tables_targets\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001b3, 0x10400003) 08:01:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000024c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 08:01:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000000000", 0x40}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 08:01:53 executing program 4: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 08:01:53 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 08:01:53 executing program 3: syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x0, 0x4000000000000000) write$binfmt_aout(r0, &(0x7f0000000580)={{0x107, 0x200000000000000, 0x8, 0x29c, 0x105, 0x7, 0x3a4, 0x4}, "d611b7c9048206adf97c43d1305f5bb7fd931c00ee632867fe88185cc90944f53a1e9a58c0f0599d332ae4fa9274c67c34b8c8d35093db99907dacef1658b99e27", [[], [], [], []]}, 0x461) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x101800, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) write$eventfd(r3, &(0x7f0000000080), 0xfffffe5e) fdatasync(r3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) fadvise64(r2, 0x0, 0x0, 0x5) 08:01:53 executing program 4: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 08:01:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0x2}) 08:01:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:53 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x100000000000000a) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYBLOB="42fffcb146f48af279e9672ce2f07c2f689eb23927494b319013dfe3c324f01baa12f5d50a30000000000000000804f534b12d5b756dcdb5f528c57a496e4bac71e9d3248fd2184e2de0f111c1f2baa4d64c710c6e8128c5aee6f54d8f09bd57b8e5c4b66f757d90370b70ce5c654a01bab2d7d7b113", @ANYRES64, @ANYBLOB="598c87e3febbd2538a7360ff15c621f43453abb3fdc38a9a3fc0679e7376246c19399a5800ebfc395c08cf753cdf1226337231624254a848345b0a8d3e2de07ef4c2a0d7239099ea10bff1e66f5b4cee33ef633279a17123aaf5ad95cc3bfcc555d83b3c55a654bd71358862896b533f45949ebedd68c7e7d94568dbb2a1be800cd67bb44cae317d59cc38265f360e2eba9849214e0bca2dd9bbbd6500fc6f774b293e93bcd243c589fc5295082772b14be5e4e7a2b6d4742d1931cc8f3167ad2a0934ad921a8f1adb9af98cca31d5d42161c51b71b9ad360b94ac97396372fe1d0b1a76553236a0d3949cca05", @ANYPTR], 0x4e2bc324) splice(r0, 0x0, r2, 0x0, 0x2000000080002, 0x0) 08:01:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) [ 613.692691][ C0] net_ratelimit: 22 callbacks suppressed [ 613.692722][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 613.705111][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 613.772617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 613.779227][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:54 executing program 2: timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = gettid() semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1, 0x0) tkill(r0, 0x1000000000016) 08:01:54 executing program 0: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xbe}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 08:01:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000027c0)=[{&(0x7f00000003c0)="376d517b383922c836fe810b7bee8ae1d3c001214fce23217d118d28db7f026f0002dd8364cbaab5b2c5102069d1ae714863a10caa98020a", 0x38}], 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x109002) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x0, 0x13}) write(r1, &(0x7f0000000000), 0xffffff86) 08:01:54 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0}) 08:01:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:54 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 08:01:54 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000027c0)=[{&(0x7f00000003c0)="376d517b383922c836fe810b7bee8ae1d3c001214fce23217d118d28db7f026f0002dd8364cbaab5b2c5102069d1ae714863a10caa98020a", 0x38}], 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x109002) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x0, 0x13}) write(r1, &(0x7f0000000000), 0xffffff86) 08:01:54 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x10, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x32) fcntl$setstatus(r1, 0x4, 0x80000000002c04) 08:01:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0) [ 614.902663][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 614.909279][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:55 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x356, 0x0, 0x0, 0xffffffffffffffb9) 08:01:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040), &(0x7f0000000100)=0x4) 08:01:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, "00bafedf5e018411590c6f7ec0b14cf1659487389b622414d8f8ab841b8b107a"}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_open_procfs$namespace(0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) [ 615.612631][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 615.619190][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 615.626032][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 615.632540][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:01:55 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:01:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:55 executing program 2: shmat(0x0, &(0x7f0000005000/0x3000)=nil, 0x6000) madvise(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x9) 08:01:55 executing program 1: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000680)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000200)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 08:01:56 executing program 1: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000005c0)) 08:01:56 executing program 0: syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000100)={0x3}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x101800, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) write$eventfd(r1, &(0x7f0000000080), 0xfffffe5e) fdatasync(r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) 08:01:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) [ 616.776845][ T4654] input: syz1 as /devices/virtual/input/input22 [ 616.846897][ T4680] input: syz1 as /devices/virtual/input/input23 08:01:56 executing program 1: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 08:01:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0x2, 0x2}) 08:01:57 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 08:01:57 executing program 1: syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x356, 0x0, 0x0, 0x0) 08:01:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0x2, 0x1}) 08:01:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "3f000000912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0x422) 08:01:58 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 08:01:58 executing program 1: syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:58 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000005300)='/dev/null\x00', 0x8484f9d9e5dffb21, 0x0) 08:01:58 executing program 1: syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 08:01:58 executing program 0: 08:01:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x296, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:01:58 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 08:01:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, 0x0, 0x0) 08:01:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000002340)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000680)={'syz1\x00', {}, 0x0, [], [], [0x8]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000200)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4]}, 0x45c) [ 618.525412][ T4923] kvm [4916]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0x187 data 0x4d00000000f [ 618.587277][ T4923] kvm [4916]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0x186 data 0x4d00000000f [ 618.602047][ T4926] input: syz1 as /devices/virtual/input/input24 [ 618.634113][ T4923] kvm [4916]: vcpu0, guest rIP: 0x8a ignored wrmsr: 0x11e data 0x4d00000000f [ 618.670630][ T4930] input: syz1 as /devices/virtual/input/input25 [ 619.052483][ C1] net_ratelimit: 18 callbacks suppressed [ 619.052506][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 619.064851][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:01:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 08:01:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, 0x0, 0x0) 08:01:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:01:59 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x2000100, 0x0, 0x0, 0x0, 0x0) 08:01:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000007, &(0x7f0000000200)=0x78, 0x4) 08:01:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x183602, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000002916a8da5d489318e5e7f20715ed8e4865320b2f7ba73cd26c1eb9603866dc07774e34a5c318e45c4b3e2ed84de4909893f3797a77b5983dff6ea34cc005e5ef674e210b2760f026e8d1bc282733535af40ad1200c5db967dd5c7cc671adea469880ebc526c8b40d65018d5d6f0e8e7e9d91b8cb4485c9dea59300104965ba9b864d32cdc85bbbab2e13"], 0xaa) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)) 08:01:59 executing program 2: 08:01:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, 0x0, 0x0) 08:01:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 08:01:59 executing program 3: 08:01:59 executing program 2: 08:01:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040), 0x0) [ 619.772528][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.779141][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 619.785983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.792473][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 619.852815][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.859479][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:02:00 executing program 3: [ 619.932767][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.939453][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:02:00 executing program 0: 08:02:00 executing program 2: 08:02:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:00 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 08:02:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040), 0x0) 08:02:00 executing program 0: 08:02:00 executing program 3: 08:02:00 executing program 0: 08:02:00 executing program 2: 08:02:00 executing program 3: 08:02:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040), 0x0) 08:02:00 executing program 0: 08:02:00 executing program 4: 08:02:01 executing program 3: 08:02:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 08:02:01 executing program 2: 08:02:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:01 executing program 3: 08:02:01 executing program 0: 08:02:01 executing program 4: 08:02:01 executing program 0: 08:02:01 executing program 4: 08:02:01 executing program 3: 08:02:01 executing program 2: 08:02:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 08:02:02 executing program 3: 08:02:02 executing program 4: 08:02:02 executing program 2: 08:02:02 executing program 0: 08:02:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369", 0x1c}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 08:02:02 executing program 4: 08:02:02 executing program 3: 08:02:02 executing program 4: 08:02:02 executing program 0: 08:02:02 executing program 2: 08:02:02 executing program 3: 08:02:02 executing program 1: 08:02:03 executing program 0: 08:02:03 executing program 4: 08:02:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369", 0x1c}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:03 executing program 1: 08:02:03 executing program 2: 08:02:03 executing program 3: 08:02:03 executing program 0: 08:02:03 executing program 4: 08:02:03 executing program 2: 08:02:03 executing program 4: 08:02:03 executing program 3: 08:02:03 executing program 0: 08:02:03 executing program 1: 08:02:04 executing program 2: [ 624.095630][ C0] net_ratelimit: 22 callbacks suppressed [ 624.095653][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 624.107771][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 624.172617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 624.179161][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:02:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369", 0x1c}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:04 executing program 3: 08:02:04 executing program 4: 08:02:04 executing program 0: 08:02:04 executing program 1: 08:02:04 executing program 2: 08:02:04 executing program 0: 08:02:04 executing program 1: 08:02:04 executing program 3: 08:02:04 executing program 2: 08:02:04 executing program 4: 08:02:05 executing program 0: [ 625.292548][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 625.299110][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:02:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000", 0x2a}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:05 executing program 1: 08:02:05 executing program 3: 08:02:05 executing program 2: 08:02:05 executing program 4: 08:02:05 executing program 0: 08:02:05 executing program 1: 08:02:05 executing program 4: 08:02:05 executing program 0: 08:02:05 executing program 2: 08:02:05 executing program 3: 08:02:06 executing program 4: [ 626.012617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 626.019241][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 626.026206][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 626.032774][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:02:06 executing program 0: 08:02:06 executing program 2: 08:02:06 executing program 3: 08:02:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000", 0x2a}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:06 executing program 1: 08:02:06 executing program 4: 08:02:06 executing program 1: 08:02:06 executing program 0: 08:02:06 executing program 3: 08:02:06 executing program 4: 08:02:06 executing program 2: 08:02:07 executing program 1: 08:02:07 executing program 4: 08:02:07 executing program 0: 08:02:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000", 0x2a}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:07 executing program 0: 08:02:07 executing program 3: 08:02:07 executing program 2: 08:02:07 executing program 1: 08:02:07 executing program 4: 08:02:07 executing program 4: 08:02:07 executing program 3: 08:02:07 executing program 1: 08:02:08 executing program 0: 08:02:08 executing program 2: 08:02:08 executing program 3: 08:02:08 executing program 1: 08:02:08 executing program 4: 08:02:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:02:08 executing program 0: 08:02:08 executing program 2: 08:02:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b", 0x31}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:08 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000001940)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000440)={0x0, 0x0, @ioapic={0x4000}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000000)={0x1}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:02:08 executing program 0: 08:02:08 executing program 4: 08:02:09 executing program 2: 08:02:09 executing program 0: [ 629.046195][ T5293] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 08:02:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001080)='net/tcp6\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/108, 0x6c}, {&(0x7f0000000140)=""/255, 0xff}], 0x2, 0x0) 08:02:09 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x26) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x81, 0x0, 0x0, 0x0, 0xc4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 629.452595][ C1] net_ratelimit: 18 callbacks suppressed [ 629.452616][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 629.464994][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:02:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b", 0x31}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:09 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x26) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x81, 0x0, 0x0, 0x0, 0xc4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:02:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x0) 08:02:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000040)="66b91200000066b81f4a000066ba000000000f30660fd7e80f01c4c16303046783f305b800008ec80f320f0091557a660f3839f4f30f1efa", 0x38}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:02:09 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x0) sched_getattr(0x0, &(0x7f0000000080)={0x30}, 0x30, 0x0) 08:02:09 executing program 1: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/14, 0xe}], 0x1) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0xfffffffffffffffc) 08:02:10 executing program 3: request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) 08:02:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x100000000011, 0x8, 0x8}, 0xd) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f0000000200)="c7", &(0x7f00000002c0)=""/133}, 0x18) 08:02:10 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() capset(&(0x7f0000000000)={0x20080522, r0}, 0x0) [ 630.172744][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 630.179258][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 630.186623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 630.193105][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 630.252601][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 630.259113][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:02:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='proc\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) [ 630.332636][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 630.339271][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:02:10 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='net/packet\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x2b) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x100000001000) 08:02:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x188) writev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="1f0000000203193b020007000000068100023b050900030000134000030058", 0x1f}], 0x1) [ 630.628823][ T5622] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 630.671523][ T5647] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 08:02:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b", 0x31}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dc980d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x7fff) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000180)={&(0x7f00000009c0)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000a40)="b2", 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) 08:02:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x1}, 0x20) 08:02:11 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r0, 0x80000080045017, 0x0) 08:02:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dc980d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000001702000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d640500000000001704000000ffffffd604000000000000b704000010000020720700fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 08:02:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x1}, 0x20) 08:02:11 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb40}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x8) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000240)={r2}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x9adb, 0xc281], 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x5) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) 08:02:11 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 08:02:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dc980d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x7fff) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000180)={&(0x7f00000009c0)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000a40)="b2", 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) 08:02:12 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x10, 0x0, 0x7f}) 08:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dc980d5e0bcfe47bf070") r1 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000000), 0x4) 08:02:13 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb40}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x8) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000240)={r2}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x9adb, 0xc281], 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:02:13 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x101000, 0x2) getdents64(r0, &(0x7f0000000280)=""/121, 0x1ad3cc2f) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)='security\x00', 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x2e, 0xf2}, &(0x7f0000000300)={'enc=', 'raw', ' hash=', {'sha384-ce\x00'}}, &(0x7f0000000180)="a0464dac423e33afb7f2071f954b70be00cfacaccf9d314ac32448749f93f7d99ddda44ccdd892d7dcefbc35ebd1", &(0x7f00000003c0)="68fb5cbe0418d46e5ed3428298f4a810e0f1e5bd62adb73757c0bd0e10e5023475bbb5a2c5bf050aadc3063db9971e42663fdaf65842476a8d7fe56b4b30268a4c585032b26e2894e464121c28cf72237191ef0833b88098d4bbfade9018e50fe51f3abae4e6d17486bfab2bc435b261192f721d3d42286daba0e7ca670c95c5cb9c20d459d886cec7d409b29af25e487dc9eb4e0e30eb0975c6e8cfbfaa1640e4649df45f4d7ec59cd8b4cf659c08904bf226801cb3a5c7ae406c3b0bc7a6cb03fee979834539126d66f9bac45f3f449722146eee39458ef208592381a8953efbbe074729e7a7ec81b7a4635232c5b2123e") 08:02:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dc980d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x7fff) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000180)={&(0x7f00000009c0)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000a40)="b2", 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) 08:02:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="1f0000000203193b020007000000068100023b050900050000134000030058", 0x1f}], 0x1) 08:02:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc13", 0x35}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080), 0xc) recvmmsg(r1, &(0x7f0000005cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000005c0)=0x1, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x40001c0, 0x0) [ 633.049897][ T6103] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 08:02:13 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x151, 0x0, &(0x7f0000000200)=[@release={0x400c630e}], 0xfd34, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0xaf14113f02c18c41, 0x0, &(0x7f0000000680)}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="10630840"], 0x0, 0x0, 0x0}) 08:02:13 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b9fc08f19c0408cd8036"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYPTR64, @ANYRESOCT, @ANYBLOB="6f3c55bbe3b07cc220e504035826fd2ee5461e31f4698e624c0bf119e4464508a0a4a69bd4fbf2786e29dfd750514435182dd99827a00b8642f452eac7e2f555424ad1f4fbe4ff751a30ea9b171dd209d2c116675d5d4e4666b4c478311b5c23", @ANYRESHEX, @ANYBLOB="88bc5acbe4c809221e465ea8474b1a519a34d04a27e9c29dd1515d71c136898814b4feb45453aaae6b7370cf2530cb1761f15c6e8a407fec1cb61fa8b6fc90c2392bb45f687c0e9fd76593ecc17443a8ef01de9143adcf103c033f6d482a68f8cd8e453a6da56eb5ccb57860d6ad73501163f015bb63feec210d644a5e1c206ff130aaad568424f3c5ba967284075736255fc76872d29f6289bad7b324ce43a074b1c2d4656b35a31e316db6ef5e28920a899ddb9ae3e67d09ddb3a75381c75a30d8f24be0", @ANYRESHEX, @ANYPTR64], 0x0, 0x170}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:02:13 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000001180)=[{&(0x7f0000000080)=""/167, 0xa7}], 0x1, 0x1) [ 633.322738][ T6162] debugfs: File '6150' in directory 'proc' already present! [ 633.356909][ T6162] binder: 6150:6162 unknown command 0 [ 633.362536][ T6162] binder: 6150:6162 ioctl c0306201 200001c0 returned -22 08:02:13 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb40}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x8) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000240)={r2}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x9adb, 0xc281], 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:02:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) 08:02:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x13a) 08:02:13 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_AIE_ON(r0, 0x7001) 08:02:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc13", 0x35}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='8'], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:02:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x401000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setuid(0xee01) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 08:02:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x800000020) dup3(r0, r1, 0x0) 08:02:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000180)={@dev}, 0x142) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 08:02:14 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b9fc08f19c0408cd8036"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYPTR64, @ANYRESOCT, @ANYBLOB="6f3c55bbe3b07cc220e504035826fd2ee5461e31f4698e624c0bf119e4464508a0a4a69bd4fbf2786e29dfd750514435182dd99827a00b8642f452eac7e2f555424ad1f4fbe4ff751a30ea9b171dd209d2c116675d5d4e4666b4c478311b5c23", @ANYRESHEX, @ANYBLOB="88bc5acbe4c809221e465ea8474b1a519a34d04a27e9c29dd1515d71c136898814b4feb45453aaae6b7370cf2530cb1761f15c6e8a407fec1cb61fa8b6fc90c2392bb45f687c0e9fd76593ecc17443a8ef01de9143adcf103c033f6d482a68f8cd8e453a6da56eb5ccb57860d6ad73501163f015bb63feec210d644a5e1c206ff130aaad568424f3c5ba967284075736255fc76872d29f6289bad7b324ce43a074b1c2d4656b35a31e316db6ef5e28920a899ddb9ae3e67d09ddb3a75381c75a30d8f24be07c67a06f73", @ANYRESHEX, @ANYPTR64], 0x0, 0x175}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:02:14 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb40}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x8) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000240)={r2}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r6, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x9adb, 0xc281], 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:02:14 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xaefc6b33) fchmod(r0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') [ 634.492732][ C0] net_ratelimit: 22 callbacks suppressed [ 634.492763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 634.505192][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:02:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000800)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7a, 0x0, [0x40000002], [0x0, 0x4]}) 08:02:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000001e40)={0x14, 0x69, 0x109}, 0x14}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 634.582630][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 634.589300][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 634.795025][ T6517] ================================================================== [ 634.803256][ T6517] BUG: KMSAN: uninit-value in nh_valid_get_del_req+0x6f1/0x8c0 [ 634.810823][ T6517] CPU: 1 PID: 6517 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 634.818765][ T6517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.828825][ T6517] Call Trace: [ 634.832155][ T6517] dump_stack+0x191/0x1f0 [ 634.836511][ T6517] kmsan_report+0x162/0x2d0 [ 634.841127][ T6517] __msan_warning+0x75/0xe0 [ 634.845663][ T6517] nh_valid_get_del_req+0x6f1/0x8c0 [ 634.850972][ T6517] ? rtnetlink_rcv_msg+0x115a/0x1580 [ 634.856296][ T6517] rtm_del_nexthop+0x1b1/0x610 [ 634.861094][ T6517] ? rtm_new_nexthop+0x98e0/0x98e0 [ 634.866218][ T6517] rtnetlink_rcv_msg+0x115a/0x1580 [ 634.871406][ T6517] ? local_bh_enable+0x36/0x40 [ 634.876327][ T6517] ? __dev_queue_xmit+0x304d/0x4270 [ 634.881590][ T6517] ? kmsan_set_origin+0x26d/0x340 [ 634.886631][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 634.892702][ T6517] netlink_rcv_skb+0x431/0x620 [ 634.897488][ T6517] ? rtnetlink_bind+0x120/0x120 [ 634.902376][ T6517] rtnetlink_rcv+0x50/0x60 [ 634.906853][ T6517] netlink_unicast+0xf6c/0x1050 [ 634.911777][ T6517] netlink_sendmsg+0x110f/0x1330 [ 634.916815][ T6517] ? netlink_getsockopt+0x1430/0x1430 [ 634.922265][ T6517] ___sys_sendmsg+0x14ff/0x1590 [ 634.927128][ T6517] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 634.933232][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 634.939273][ T6517] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 634.945354][ T6517] ? balance_callback+0x48/0x260 [ 634.950311][ T6517] ? kmsan_internal_check_memory+0x27a/0x8d0 [ 634.956298][ T6517] ? kmsan_get_metadata_or_null+0x208/0x290 [ 634.962205][ T6517] ? __msan_get_context_state+0x9/0x20 [ 634.967676][ T6517] ? rcu_all_qs+0x23/0x240 [ 634.972191][ T6517] __sys_sendmmsg+0x53a/0xae0 [ 634.976925][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 634.982928][ T6517] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 634.989003][ T6517] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 634.994915][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 635.000919][ T6517] __se_sys_sendmmsg+0xbd/0xe0 [ 635.005707][ T6517] __x64_sys_sendmmsg+0x56/0x70 [ 635.010571][ T6517] do_syscall_64+0xbc/0xf0 [ 635.015006][ T6517] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 635.021025][ T6517] RIP: 0033:0x459829 [ 635.024933][ T6517] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.044666][ T6517] RSP: 002b:00007f1a4c840c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 635.053084][ T6517] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 635.061061][ T6517] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 635.069035][ T6517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 635.077011][ T6517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a4c8416d4 [ 635.085074][ T6517] R13: 00000000004c7017 R14: 00000000004dc660 R15: 00000000ffffffff [ 635.093181][ T6517] [ 635.095519][ T6517] Uninit was created at: [ 635.099770][ T6517] kmsan_internal_poison_shadow+0x53/0xa0 [ 635.105503][ T6517] kmsan_slab_alloc+0xaa/0x120 [ 635.110282][ T6517] __kmalloc_node_track_caller+0xb55/0x1320 [ 635.116368][ T6517] __alloc_skb+0x306/0xa10 [ 635.120791][ T6517] netlink_sendmsg+0x783/0x1330 [ 635.125658][ T6517] ___sys_sendmsg+0x14ff/0x1590 [ 635.130525][ T6517] __sys_sendmmsg+0x53a/0xae0 [ 635.135209][ T6517] __se_sys_sendmmsg+0xbd/0xe0 [ 635.139981][ T6517] __x64_sys_sendmmsg+0x56/0x70 [ 635.144836][ T6517] do_syscall_64+0xbc/0xf0 [ 635.149297][ T6517] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 635.155209][ T6517] ================================================================== [ 635.163300][ T6517] Disabling lock debugging due to kernel taint [ 635.169459][ T6517] Kernel panic - not syncing: panic_on_warn set ... [ 635.176058][ T6517] CPU: 1 PID: 6517 Comm: syz-executor.4 Tainted: G B 5.3.0-rc3+ #17 [ 635.185620][ T6517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.195678][ T6517] Call Trace: [ 635.199136][ T6517] dump_stack+0x191/0x1f0 [ 635.203495][ T6517] panic+0x3c9/0xc1e [ 635.207448][ T6517] kmsan_report+0x2ca/0x2d0 [ 635.211979][ T6517] __msan_warning+0x75/0xe0 [ 635.216511][ T6517] nh_valid_get_del_req+0x6f1/0x8c0 [ 635.221764][ T6517] ? rtnetlink_rcv_msg+0x115a/0x1580 [ 635.227074][ T6517] rtm_del_nexthop+0x1b1/0x610 [ 635.231875][ T6517] ? rtm_new_nexthop+0x98e0/0x98e0 [ 635.236994][ T6517] rtnetlink_rcv_msg+0x115a/0x1580 [ 635.242140][ T6517] ? local_bh_enable+0x36/0x40 [ 635.246916][ T6517] ? __dev_queue_xmit+0x304d/0x4270 [ 635.252165][ T6517] ? kmsan_set_origin+0x26d/0x340 [ 635.257230][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 635.263248][ T6517] netlink_rcv_skb+0x431/0x620 [ 635.268021][ T6517] ? rtnetlink_bind+0x120/0x120 [ 635.272904][ T6517] rtnetlink_rcv+0x50/0x60 [ 635.277334][ T6517] netlink_unicast+0xf6c/0x1050 [ 635.282249][ T6517] netlink_sendmsg+0x110f/0x1330 [ 635.287247][ T6517] ? netlink_getsockopt+0x1430/0x1430 [ 635.292633][ T6517] ___sys_sendmsg+0x14ff/0x1590 [ 635.297492][ T6517] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 635.303593][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 635.309585][ T6517] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 635.315662][ T6517] ? balance_callback+0x48/0x260 [ 635.320629][ T6517] ? kmsan_internal_check_memory+0x27a/0x8d0 [ 635.326617][ T6517] ? kmsan_get_metadata_or_null+0x208/0x290 [ 635.332525][ T6517] ? __msan_get_context_state+0x9/0x20 [ 635.337992][ T6517] ? rcu_all_qs+0x23/0x240 [ 635.342458][ T6517] __sys_sendmmsg+0x53a/0xae0 [ 635.347178][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 635.353173][ T6517] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 635.359250][ T6517] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 635.364977][ T6517] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 635.370976][ T6517] __se_sys_sendmmsg+0xbd/0xe0 [ 635.375773][ T6517] __x64_sys_sendmmsg+0x56/0x70 [ 635.380634][ T6517] do_syscall_64+0xbc/0xf0 [ 635.385088][ T6517] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 635.390989][ T6517] RIP: 0033:0x459829 [ 635.394891][ T6517] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.414503][ T6517] RSP: 002b:00007f1a4c840c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 635.422921][ T6517] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 635.430893][ T6517] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 635.438866][ T6517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 635.446838][ T6517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a4c8416d4 [ 635.454833][ T6517] R13: 00000000004c7017 R14: 00000000004dc660 R15: 00000000ffffffff [ 635.463934][ T6517] Kernel Offset: disabled [ 635.468281][ T6517] Rebooting in 86400 seconds..