[ 38.514607][ T26] audit: type=1800 audit(1554576503.981:26): pid=7583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.550134][ T26] audit: type=1800 audit(1554576503.981:27): pid=7583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 38.574750][ T26] audit: type=1800 audit(1554576503.981:28): pid=7583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.490287][ T26] audit: type=1800 audit(1554576504.981:29): pid=7583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.168' (ECDSA) to the list of known hosts. 2019/04/06 18:48:41 fuzzer started 2019/04/06 18:48:45 dialing manager at 10.128.0.26:34543 2019/04/06 18:48:45 syscalls: 2408 2019/04/06 18:48:45 code coverage: enabled 2019/04/06 18:48:45 comparison tracing: enabled 2019/04/06 18:48:45 extra coverage: extra coverage is not supported by the kernel 2019/04/06 18:48:45 setuid sandbox: enabled 2019/04/06 18:48:45 namespace sandbox: enabled 2019/04/06 18:48:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/06 18:48:45 fault injection: enabled 2019/04/06 18:48:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/06 18:48:45 net packet injection: enabled 2019/04/06 18:48:45 net device setup: enabled 18:50:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) read(r0, &(0x7f0000000200)=""/30, 0x10000038b) syzkaller login: [ 166.040234][ T7746] IPVS: ftp: loaded support on port[0] = 21 18:50:31 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000140)='\x00'/10, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 166.155582][ T7746] chnl_net:caif_netlink_parms(): no params data found [ 166.234916][ T7746] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.262889][ T7746] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.271122][ T7746] device bridge_slave_0 entered promiscuous mode [ 166.294132][ T7746] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.301267][ T7746] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.312646][ T7746] device bridge_slave_1 entered promiscuous mode [ 166.334503][ T7750] IPVS: ftp: loaded support on port[0] = 21 [ 166.350928][ T7746] bond0: Enslaving bond_slave_0 as an active interface with an up link 18:50:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x0) [ 166.375650][ T7746] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.429114][ T7746] team0: Port device team_slave_0 added [ 166.444114][ T7746] team0: Port device team_slave_1 added 18:50:32 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000004c0)={0x400000000009, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 166.555644][ T7746] device hsr_slave_0 entered promiscuous mode [ 166.682257][ T7746] device hsr_slave_1 entered promiscuous mode [ 166.741244][ T7746] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.748499][ T7746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.756219][ T7746] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.763320][ T7746] bridge0: port 1(bridge_slave_0) entered forwarding state 18:50:32 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x9, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 166.795639][ T7753] IPVS: ftp: loaded support on port[0] = 21 [ 166.809855][ T7755] IPVS: ftp: loaded support on port[0] = 21 [ 166.881954][ T7750] chnl_net:caif_netlink_parms(): no params data found [ 167.047298][ T7758] IPVS: ftp: loaded support on port[0] = 21 [ 167.085887][ T7746] 8021q: adding VLAN 0 to HW filter on device bond0 18:50:32 executing program 5: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) [ 167.097365][ T7750] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.105327][ T7750] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.115862][ T7750] device bridge_slave_0 entered promiscuous mode [ 167.168191][ T7750] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.179567][ T7750] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.188925][ T7750] device bridge_slave_1 entered promiscuous mode [ 167.201957][ T7749] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.210053][ T7749] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.219320][ T7749] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 167.288839][ T7762] IPVS: ftp: loaded support on port[0] = 21 [ 167.305230][ T7750] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 167.320233][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.328082][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.336238][ T7753] chnl_net:caif_netlink_parms(): no params data found [ 167.349881][ T7755] chnl_net:caif_netlink_parms(): no params data found [ 167.360250][ T7750] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 167.385993][ T7746] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.426734][ T7750] team0: Port device team_slave_0 added [ 167.433866][ T7750] team0: Port device team_slave_1 added [ 167.453348][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.462484][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.470814][ T251] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.477916][ T251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.538852][ T7746] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 167.549673][ T7746] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.594445][ T7750] device hsr_slave_0 entered promiscuous mode [ 167.651933][ T7750] device hsr_slave_1 entered promiscuous mode [ 167.701951][ T7755] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.709131][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.717491][ T7755] device bridge_slave_0 entered promiscuous mode [ 167.724940][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.733955][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.742445][ T2992] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.749464][ T2992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.757102][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.765702][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.774354][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.782713][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.790899][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.799319][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.807698][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.815942][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.824294][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.832601][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.843116][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.850889][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.865302][ T7753] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.872915][ T7753] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.880456][ T7753] device bridge_slave_0 entered promiscuous mode [ 167.888406][ T7753] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.895646][ T7753] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.903557][ T7753] device bridge_slave_1 entered promiscuous mode [ 167.922615][ T7753] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 167.930960][ T7755] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.938863][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.946894][ T7755] device bridge_slave_1 entered promiscuous mode [ 167.973937][ T7753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 168.026450][ T7746] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.036215][ T7753] team0: Port device team_slave_0 added [ 168.044179][ T7753] team0: Port device team_slave_1 added [ 168.051368][ T7755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 168.144528][ T7753] device hsr_slave_0 entered promiscuous mode [ 168.192235][ T7753] device hsr_slave_1 entered promiscuous mode [ 168.233275][ T7755] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 168.350571][ T7758] chnl_net:caif_netlink_parms(): no params data found [ 168.364194][ T7755] team0: Port device team_slave_0 added [ 168.371295][ T7755] team0: Port device team_slave_1 added [ 168.378523][ T7762] chnl_net:caif_netlink_parms(): no params data found [ 168.383662][ C0] hrtimer: interrupt took 45408 ns 18:50:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) read(r0, &(0x7f0000000200)=""/30, 0x10000038b) [ 168.443197][ T7750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.520716][ T7762] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.529003][ T7762] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.537342][ T7762] device bridge_slave_0 entered promiscuous mode [ 168.558616][ T7762] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.567717][ T7762] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.580150][ T7762] device bridge_slave_1 entered promiscuous mode 18:50:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) read(r0, &(0x7f0000000200)=""/30, 0x10000038b) [ 168.624273][ T7755] device hsr_slave_0 entered promiscuous mode [ 168.662146][ T7755] device hsr_slave_1 entered promiscuous mode [ 168.736143][ T7750] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.754296][ T7753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.761209][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.769054][ T7758] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.777268][ T7758] device bridge_slave_0 entered promiscuous mode [ 168.789852][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.797472][ T7758] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.805544][ T7758] device bridge_slave_1 entered promiscuous mode [ 168.817898][ T7749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.828627][ T7749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.868690][ T7762] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 168.892173][ T7762] bond0: Enslaving bond_slave_1 as an active interface with an up link 18:50:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) read(r0, &(0x7f0000000200)=""/30, 0x10000038b) [ 168.914634][ T7762] team0: Port device team_slave_0 added [ 168.921603][ T7762] team0: Port device team_slave_1 added [ 168.948637][ T7753] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.962849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.984876][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.997456][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.004540][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.018565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.027382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.041268][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.048358][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.063520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.071298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 18:50:34 executing program 0: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000d43000)) [ 169.152761][ T7758] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 169.176540][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.192364][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.201084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.209863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.218737][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.227856][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.236523][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.245097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.253442][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.261476][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.269890][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.278072][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.286798][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.295344][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.302458][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.309909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.318805][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.327184][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.334263][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.341961][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.349807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.370416][ T7758] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 169.424604][ T7762] device hsr_slave_0 entered promiscuous mode [ 169.442442][ T7762] device hsr_slave_1 entered promiscuous mode [ 169.523256][ T7750] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.541182][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.550104][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.559486][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 18:50:35 executing program 0: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000d43000)) [ 169.568139][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.615017][ T7753] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 169.627854][ T7753] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 169.650407][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.664543][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.676032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.688938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.705928][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.721895][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.730065][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.743008][ T7755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.752622][ T7758] team0: Port device team_slave_0 added [ 169.760289][ T7758] team0: Port device team_slave_1 added 18:50:35 executing program 0: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000d43000)) [ 169.772669][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 18:50:35 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) [ 169.834874][ T7755] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.851525][ T7753] 8021q: adding VLAN 0 to HW filter on device batadv0 18:50:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0x40405515, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], [], 0x0, 0x0, 0x0, 0x0, "36af5b929d03a121745ac01790a20e05"}) [ 169.891441][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.899397][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.944347][ T7758] device hsr_slave_0 entered promiscuous mode [ 169.981875][ T7758] device hsr_slave_1 entered promiscuous mode [ 170.057709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.068076][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.077482][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.084594][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.096336][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.105001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.113923][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.120962][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.129216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.141732][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.150537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.159090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.167414][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.175500][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.212397][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.220971][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.249502][ T7762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.268345][ T7755] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 170.279645][ T7755] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.304399][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.312866][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.321089][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.329595][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.337837][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 18:50:35 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x80) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) socket(0x10, 0x2, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {}, [{0x2, 0x2}, {}, {0x2, 0x1}], {}, [], {0x10, 0x2}}, 0x3c, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) lstat(0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) [ 170.371505][ T7755] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.384857][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.400682][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.422262][ T7762] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.444044][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.452662][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.460862][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.467941][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.476781][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.485335][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.493766][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.500797][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.509115][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.551096][ T7758] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.571377][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.589334][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.598805][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.608880][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.618332][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.627559][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.636730][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.645532][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.653925][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.662439][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.670499][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.681242][ T7762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 18:50:36 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) [ 170.718251][ T7758] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.744534][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.758963][ T251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.781899][ T7762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.789524][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.804067][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.812723][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.819761][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.827356][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.836251][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.844836][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.851923][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.859536][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.869398][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.907882][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.916907][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.931530][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.940740][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.952374][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.960534][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.968930][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.980644][ T7758] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.993145][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.006892][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.015018][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.023541][ T2992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.057766][ T7758] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.133996][ T7842] check_preemption_disabled: 1 callbacks suppressed [ 171.134076][ T7842] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/7842 [ 171.151950][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 171.152040][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 171.164351][ T7842] caller is sk_mc_loop+0x1d/0x210 [ 171.169447][ T7842] CPU: 1 PID: 7842 Comm: syz-executor.4 Not tainted 5.1.0-rc3-next-20190405 #19 [ 171.178442][ T7842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.188483][ T7842] Call Trace: [ 171.191776][ T7842] dump_stack+0x172/0x1f0 [ 171.196100][ T7842] __this_cpu_preempt_check+0x246/0x270 [ 171.201639][ T7842] sk_mc_loop+0x1d/0x210 [ 171.205875][ T7842] ip_mc_output+0x2ef/0xf70 [ 171.210361][ T7842] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 171.215449][ T7842] ? retint_kernel+0x2d/0x2d [ 171.220052][ T7842] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 171.225142][ T7842] ip_local_out+0xc4/0x1b0 [ 171.229556][ T7842] ip_send_skb+0x42/0xf0 [ 171.233782][ T7842] udp_send_skb.isra.0+0x6b2/0x1180 [ 171.238966][ T7842] udp_push_pending_frames+0x5c/0xf0 [ 171.244229][ T7842] udp_sendmsg+0x12ff/0x2820 [ 171.248799][ T7842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 171.255019][ T7842] ? ip_reply_glue_bits+0xc0/0xc0 [ 171.260025][ T7842] ? udp4_lib_lookup_skb+0x440/0x440 [ 171.265288][ T7842] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 171.270728][ T7842] ? preempt_schedule+0x4b/0x60 [ 171.275562][ T7842] ? preempt_schedule_common+0x4f/0xe0 [ 171.281005][ T7842] ? ___might_sleep+0x163/0x280 [ 171.285834][ T7842] ? __might_sleep+0x95/0x190 [ 171.290504][ T7842] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 171.296127][ T7842] ? aa_sk_perm+0x288/0x880 [ 171.300614][ T7842] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 171.306138][ T7842] inet_sendmsg+0x147/0x5e0 [ 171.310617][ T7842] ? udp4_lib_lookup_skb+0x440/0x440 [ 171.315875][ T7842] ? inet_sendmsg+0x147/0x5e0 [ 171.320531][ T7842] ? ipip_gro_receive+0x100/0x100 [ 171.325534][ T7842] sock_sendmsg+0xdd/0x130 [ 171.329927][ T7842] sock_write_iter+0x27c/0x3e0 [ 171.334668][ T7842] ? sock_sendmsg+0x130/0x130 [ 171.339353][ T7842] ? new_sync_write+0xe7/0x760 [ 171.344109][ T7842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 171.350355][ T7842] ? iov_iter_init+0xee/0x220 [ 171.355028][ T7842] new_sync_write+0x4c7/0x760 [ 171.359686][ T7842] ? default_llseek+0x2e0/0x2e0 [ 171.364518][ T7842] ? common_file_perm+0x238/0x720 [ 171.369522][ T7842] ? __fget+0x381/0x550 [ 171.373670][ T7842] ? apparmor_file_permission+0x25/0x30 [ 171.379211][ T7842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 171.385437][ T7842] ? security_file_permission+0x94/0x380 [ 171.391048][ T7842] __vfs_write+0xe4/0x110 [ 171.395367][ T7842] vfs_write+0x20c/0x580 [ 171.399592][ T7842] ksys_write+0xea/0x1f0 [ 171.403816][ T7842] ? __ia32_sys_read+0xb0/0xb0 [ 171.408558][ T7842] ? do_syscall_64+0x26/0x610 [ 171.413214][ T7842] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.419262][ T7842] ? do_syscall_64+0x26/0x610 [ 171.423922][ T7842] __x64_sys_write+0x73/0xb0 [ 171.428491][ T7842] do_syscall_64+0x103/0x610 [ 171.433060][ T7842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.438929][ T7842] RIP: 0033:0x4582b9 [ 171.442800][ T7842] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.462380][ T7842] RSP: 002b:00007f35f1736c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 171.470773][ T7842] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 171.478722][ T7842] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000006 [ 171.486669][ T7842] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 171.494619][ T7842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35f17376d4 [ 171.502566][ T7842] R13: 00000000004c7a90 R14: 00000000004ddb68 R15: 00000000ffffffff [ 171.512031][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 171.517955][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 171.565957][ T7842] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/7842 [ 171.579938][ T7842] caller is sk_mc_loop+0x1d/0x210 [ 171.585024][ T7842] CPU: 0 PID: 7842 Comm: syz-executor.4 Not tainted 5.1.0-rc3-next-20190405 #19 [ 171.594033][ T7842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.604069][ T7842] Call Trace: [ 171.607354][ T7842] dump_stack+0x172/0x1f0 [ 171.611677][ T7842] __this_cpu_preempt_check+0x246/0x270 [ 171.617250][ T7842] sk_mc_loop+0x1d/0x210 [ 171.621486][ T7842] ip_mc_output+0x2ef/0xf70 [ 171.625985][ T7842] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 171.631085][ T7842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 171.637306][ T7842] ? prandom_u32_state+0x13/0x180 [ 171.642322][ T7842] ? ip_append_data.part.0+0x170/0x170 [ 171.647798][ T7842] ? __ip_make_skb+0xf15/0x1820 [ 171.652643][ T7842] ip_local_out+0xc4/0x1b0 [ 171.657037][ T7842] ip_send_skb+0x42/0xf0 [ 171.661257][ T7842] udp_send_skb.isra.0+0x6b2/0x1180 [ 171.666443][ T7842] udp_push_pending_frames+0x5c/0xf0 [ 171.671707][ T7842] udp_sendmsg+0x12ff/0x2820 [ 171.676276][ T7842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 171.682508][ T7842] ? ip_reply_glue_bits+0xc0/0xc0 [ 171.687528][ T7842] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 171.692969][ T7842] ? udp4_lib_lookup_skb+0x440/0x440 [ 171.698231][ T7842] ? trace_hardirqs_on_caller+0x6a/0x220 [ 171.703862][ T7842] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 171.709312][ T7842] ? retint_kernel+0x2d/0x2d [ 171.713884][ T7842] ? aa_label_sk_perm+0x101/0x560 [ 171.718887][ T7842] ? debug_lockdep_rcu_enabled+0x26/0xa0 [ 171.724513][ T7842] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 171.730149][ T7842] ? aa_sk_perm+0x288/0x880 [ 171.734635][ T7842] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 171.740159][ T7842] inet_sendmsg+0x147/0x5e0 [ 171.744651][ T7842] ? udp4_lib_lookup_skb+0x440/0x440 [ 171.749922][ T7842] ? inet_sendmsg+0x147/0x5e0 [ 171.754575][ T7842] ? ipip_gro_receive+0x100/0x100 [ 171.759588][ T7842] sock_sendmsg+0xdd/0x130 [ 171.763998][ T7842] sock_write_iter+0x27c/0x3e0 [ 171.768763][ T7842] ? sock_sendmsg+0x130/0x130 [ 171.773438][ T7842] ? aa_path_link+0x460/0x460 [ 171.778094][ T7842] ? find_held_lock+0x35/0x130 [ 171.782854][ T7842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 171.789084][ T7842] ? iov_iter_init+0xee/0x220 [ 171.793779][ T7842] new_sync_write+0x4c7/0x760 [ 171.798438][ T7842] ? default_llseek+0x2e0/0x2e0 [ 171.803277][ T7842] ? trace_hardirqs_on_caller+0x6a/0x220 [ 171.808929][ T7842] __vfs_write+0xe4/0x110 [ 171.813240][ T7842] vfs_write+0x20c/0x580 [ 171.817462][ T7842] ksys_write+0xea/0x1f0 [ 171.821693][ T7842] ? __ia32_sys_read+0xb0/0xb0 [ 171.826449][ T7842] __x64_sys_write+0x73/0xb0 [ 171.831016][ T7842] ? do_syscall_64+0x5b/0x610 [ 171.835689][ T7842] do_syscall_64+0x103/0x610 [ 171.840275][ T7842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.846154][ T7842] RIP: 0033:0x4582b9 [ 171.850038][ T7842] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.869616][ T7842] RSP: 002b:00007f35f1736c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 171.878001][ T7842] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 171.885956][ T7842] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 000000000000000a [ 171.893916][ T7842] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 171.901875][ T7842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35f17376d4 18:50:37 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002a40)={&(0x7f000000afb8)={0x4, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) 18:50:37 executing program 0: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000d43000)) 18:50:37 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc02c5625, &(0x7f0000000040)={0xf0f000}) 18:50:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x81) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r3) dup2(r0, r2) accept4(r1, 0x0, 0x0, 0x0) 18:50:37 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff}) splice(r0, 0x0, r0, 0x0, 0x5e5, 0x0) 18:50:37 executing program 5: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) bind$xdp(r0, &(0x7f0000000080), 0x10) [ 171.909837][ T7842] R13: 00000000004c7a90 R14: 00000000004ddb68 R15: 00000000ffffffff [ 171.984202][ T7849] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7849 [ 171.994227][ T7849] caller is ip6_finish_output+0x335/0xdc0 [ 172.000020][ T7849] CPU: 1 PID: 7849 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 172.009032][ T7849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.019079][ T7849] Call Trace: [ 172.022384][ T7849] dump_stack+0x172/0x1f0 [ 172.026729][ T7849] __this_cpu_preempt_check+0x246/0x270 [ 172.032290][ T7849] ip6_finish_output+0x335/0xdc0 [ 172.037242][ T7849] ip6_output+0x235/0x7f0 [ 172.041590][ T7849] ? ip6_finish_output+0xdc0/0xdc0 [ 172.046720][ T7849] ? ip6_fragment+0x3980/0x3980 [ 172.051593][ T7849] ip6_xmit+0xe41/0x20c0 [ 172.055853][ T7849] ? ip6_finish_output2+0x2550/0x2550 [ 172.061236][ T7849] ? mark_held_locks+0xf0/0xf0 [ 172.066016][ T7849] ? ip6_setup_cork+0x1870/0x1870 [ 172.071069][ T7849] inet6_csk_xmit+0x2fb/0x5d0 [ 172.075766][ T7849] ? inet6_csk_update_pmtu+0x190/0x190 [ 172.081231][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.087487][ T7849] ? csum_ipv6_magic+0x20/0x80 [ 172.092270][ T7849] __tcp_transmit_skb+0x1a32/0x3750 [ 172.097488][ T7849] ? __tcp_select_window+0x8b0/0x8b0 [ 172.102791][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.102828][ T7849] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 172.102849][ T7849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 172.102865][ T7849] tcp_connect+0x1e47/0x4280 [ 172.102887][ T7849] ? tcp_push_one+0x110/0x110 [ 172.102902][ T7849] ? secure_tcpv6_ts_off+0x24f/0x360 [ 172.102919][ T7849] ? secure_dccpv6_sequence_number+0x280/0x280 [ 172.125707][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.125724][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.125744][ T7849] ? prandom_u32_state+0x13/0x180 [ 172.159282][ T7849] tcp_v6_connect+0x150b/0x20a0 [ 172.164133][ T7849] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 172.164155][ T7849] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 172.164168][ T7849] ? __switch_to_asm+0x34/0x70 [ 172.164180][ T7849] ? __switch_to_asm+0x40/0x70 [ 172.164205][ T7849] ? find_held_lock+0x35/0x130 [ 172.189095][ T7849] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 172.194743][ T7849] __inet_stream_connect+0x83f/0xea0 [ 172.200376][ T7849] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 172.205773][ T7849] ? __inet_stream_connect+0x83f/0xea0 [ 172.211248][ T7849] ? inet_dgram_connect+0x2e0/0x2e0 [ 172.211267][ T7849] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 172.211282][ T7849] ? rcu_read_lock_sched_held+0x110/0x130 [ 172.211308][ T7849] ? kmem_cache_alloc_trace+0x354/0x760 [ 172.233185][ T7849] ? __lock_acquire+0x548/0x3fb0 [ 172.238138][ T7849] tcp_sendmsg_locked+0x231f/0x37f0 [ 172.243355][ T7849] ? mark_held_locks+0xf0/0xf0 [ 172.248130][ T7849] ? mark_held_locks+0xa4/0xf0 [ 172.252907][ T7849] ? tcp_sendpage+0x60/0x60 [ 172.257413][ T7849] ? lock_sock_nested+0x9a/0x120 [ 172.262360][ T7849] ? trace_hardirqs_on+0x67/0x230 [ 172.267404][ T7849] ? lock_sock_nested+0x9a/0x120 [ 172.267424][ T7849] ? __local_bh_enable_ip+0x15a/0x270 [ 172.267448][ T7849] tcp_sendmsg+0x30/0x50 [ 172.267471][ T7849] inet_sendmsg+0x147/0x5e0 [ 172.286649][ T7849] ? ipip_gro_receive+0x100/0x100 [ 172.291681][ T7849] sock_sendmsg+0xdd/0x130 [ 172.296103][ T7849] __sys_sendto+0x262/0x380 [ 172.300621][ T7849] ? __ia32_sys_getpeername+0xb0/0xb0 [ 172.306008][ T7849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 172.306039][ T7849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.306060][ T7849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.323184][ T7849] ? do_syscall_64+0x26/0x610 [ 172.327862][ T7849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 18:50:37 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 18:50:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 172.333939][ T7849] __x64_sys_sendto+0xe1/0x1a0 [ 172.338714][ T7849] do_syscall_64+0x103/0x610 [ 172.343329][ T7849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.349240][ T7849] RIP: 0033:0x4582b9 [ 172.353137][ T7849] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.372739][ T7849] RSP: 002b:00007fdf1d3dfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 172.372761][ T7849] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 172.372768][ T7849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 172.372777][ T7849] RBP: 000000000073bf00 R08: 000000002031e000 R09: 000000000000001c [ 172.372785][ T7849] R10: 0000000020000004 R11: 0000000000000246 R12: 00007fdf1d3e06d4 [ 172.372794][ T7849] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 172.419982][ T7871] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7871 [ 172.434475][ T7871] caller is ip6_finish_output+0x335/0xdc0 [ 172.440208][ T7871] CPU: 1 PID: 7871 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 172.449218][ T7871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.459276][ T7871] Call Trace: [ 172.460574][ T7864] input: syz1 as /devices/virtual/input/input5 [ 172.462569][ T7871] dump_stack+0x172/0x1f0 [ 172.462595][ T7871] __this_cpu_preempt_check+0x246/0x270 [ 172.462614][ T7871] ip6_finish_output+0x335/0xdc0 [ 172.462637][ T7871] ip6_output+0x235/0x7f0 [ 172.462655][ T7871] ? ip6_finish_output+0xdc0/0xdc0 [ 172.462676][ T7871] ? ip6_fragment+0x3980/0x3980 [ 172.473156][ T7871] ip6_xmit+0xe41/0x20c0 [ 172.473185][ T7871] ? ip6_finish_output2+0x2550/0x2550 [ 172.473202][ T7871] ? mark_held_locks+0xf0/0xf0 [ 172.473221][ T7871] ? ip6_setup_cork+0x1870/0x1870 [ 172.473264][ T7871] inet6_csk_xmit+0x2fb/0x5d0 [ 172.483841][ T7871] ? inet6_csk_update_pmtu+0x190/0x190 [ 172.493250][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.493275][ T7871] ? csum_ipv6_magic+0x20/0x80 [ 172.493301][ T7871] __tcp_transmit_skb+0x1a32/0x3750 [ 172.493327][ T7871] ? __tcp_select_window+0x8b0/0x8b0 [ 172.493353][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.493374][ T7871] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 172.560716][ T7871] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 172.566974][ T7871] tcp_connect+0x1e47/0x4280 [ 172.571579][ T7871] ? tcp_push_one+0x110/0x110 [ 172.576256][ T7871] ? secure_tcpv6_ts_off+0x24f/0x360 [ 172.581539][ T7871] ? secure_dccpv6_sequence_number+0x280/0x280 [ 172.587689][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.593926][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 172.600166][ T7871] ? prandom_u32_state+0x13/0x180 [ 172.605194][ T7871] tcp_v6_connect+0x150b/0x20a0 [ 172.610041][ T7871] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 172.615415][ T7871] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 172.620713][ T7871] ? find_held_lock+0x35/0x130 [ 172.625478][ T7871] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 172.631116][ T7871] __inet_stream_connect+0x83f/0xea0 [ 172.636398][ T7871] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 172.641678][ T7871] ? __inet_stream_connect+0x83f/0xea0 [ 172.647141][ T7871] ? inet_dgram_connect+0x2e0/0x2e0 [ 172.652335][ T7871] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 172.657706][ T7871] ? rcu_read_lock_sched_held+0x110/0x130 [ 172.663426][ T7871] ? kmem_cache_alloc_trace+0x354/0x760 [ 172.668967][ T7871] ? __lock_acquire+0x548/0x3fb0 [ 172.673940][ T7871] tcp_sendmsg_locked+0x231f/0x37f0 [ 172.679137][ T7871] ? mark_held_locks+0xf0/0xf0 [ 172.683902][ T7871] ? mark_held_locks+0xa4/0xf0 [ 172.688667][ T7871] ? tcp_sendpage+0x60/0x60 [ 172.693168][ T7871] ? lock_sock_nested+0x9a/0x120 [ 172.698099][ T7871] ? trace_hardirqs_on+0x67/0x230 [ 172.703118][ T7871] ? lock_sock_nested+0x9a/0x120 [ 172.708054][ T7871] ? __local_bh_enable_ip+0x15a/0x270 [ 172.713433][ T7871] tcp_sendmsg+0x30/0x50 [ 172.717670][ T7871] inet_sendmsg+0x147/0x5e0 [ 172.722169][ T7871] ? ipip_gro_receive+0x100/0x100 [ 172.727190][ T7871] sock_sendmsg+0xdd/0x130 [ 172.731604][ T7871] __sys_sendto+0x262/0x380 [ 172.736106][ T7871] ? __ia32_sys_getpeername+0xb0/0xb0 [ 172.741491][ T7871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 172.747737][ T7871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.753197][ T7871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.758652][ T7871] ? do_syscall_64+0x26/0x610 [ 172.763326][ T7871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.769407][ T7871] __x64_sys_sendto+0xe1/0x1a0 [ 172.774186][ T7871] do_syscall_64+0x103/0x610 [ 172.778781][ T7871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.784669][ T7871] RIP: 0033:0x4582b9 [ 172.788558][ T7871] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.808158][ T7871] RSP: 002b:00007fdf1d3bec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 172.816567][ T7871] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 172.824533][ T7871] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 18:50:37 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc02c5625, &(0x7f0000000040)={0xf0f000}) [ 172.832498][ T7871] RBP: 000000000073bfa0 R08: 0000000020000040 R09: 000000000000001c [ 172.840462][ T7871] R10: 0000000020000003 R11: 0000000000000246 R12: 00007fdf1d3bf6d4 [ 172.848426][ T7871] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff 18:50:38 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) [ 172.907312][ T7880] input: syz1 as /devices/virtual/input/input6 18:50:38 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc02c5625, &(0x7f0000000040)={0xf0f000}) [ 173.006250][ T7887] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7887 [ 173.015888][ T7887] caller is ip6_finish_output+0x335/0xdc0 [ 173.021908][ T7887] CPU: 1 PID: 7887 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 173.030930][ T7887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.040975][ T7887] Call Trace: [ 173.041020][ T7887] dump_stack+0x172/0x1f0 [ 173.041047][ T7887] __this_cpu_preempt_check+0x246/0x270 [ 173.041074][ T7887] ip6_finish_output+0x335/0xdc0 [ 173.049924][ T7849] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7849 [ 173.054320][ T7887] ip6_output+0x235/0x7f0 [ 173.054347][ T7887] ? ip6_finish_output+0xdc0/0xdc0 [ 173.054369][ T7887] ? ip6_fragment+0x3980/0x3980 [ 173.059299][ T7849] caller is ip6_finish_output+0x335/0xdc0 [ 173.068559][ T7887] ip6_xmit+0xe41/0x20c0 [ 173.068584][ T7887] ? ip6_finish_output2+0x2550/0x2550 [ 173.068606][ T7887] ? mark_held_locks+0xf0/0xf0 [ 173.103203][ T7887] ? ip6_setup_cork+0x1870/0x1870 [ 173.108229][ T7887] ? inet6_csk_route_socket+0x715/0xf40 [ 173.113793][ T7887] inet6_csk_xmit+0x2fb/0x5d0 [ 173.118468][ T7887] ? inet6_csk_update_pmtu+0x190/0x190 [ 173.123922][ T7887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.130165][ T7887] ? csum_ipv6_magic+0x20/0x80 [ 173.134935][ T7887] __tcp_transmit_skb+0x1a32/0x3750 [ 173.140140][ T7887] ? __tcp_select_window+0x8b0/0x8b0 [ 173.145421][ T7887] ? lockdep_hardirqs_on+0x418/0x5d0 [ 173.150704][ T7887] ? trace_hardirqs_on+0x67/0x230 [ 173.155729][ T7887] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 173.161460][ T7887] tcp_write_xmit+0xe39/0x5660 [ 173.166227][ T7887] ? tcp_established_options+0x29d/0x4d0 [ 173.171888][ T7887] __tcp_push_pending_frames+0xb4/0x350 [ 173.177440][ T7887] tcp_send_fin+0x149/0xbb0 [ 173.181948][ T7887] tcp_close+0xddf/0x10c0 [ 173.186274][ T7887] ? ip_mc_drop_socket+0x211/0x270 [ 173.191381][ T7887] ? __sock_release+0x89/0x2b0 [ 173.196149][ T7887] inet_release+0x105/0x1f0 [ 173.200655][ T7887] inet6_release+0x53/0x80 [ 173.205073][ T7887] __sock_release+0xd3/0x2b0 [ 173.209658][ T7887] ? __sock_release+0x2b0/0x2b0 [ 173.214502][ T7887] sock_close+0x1b/0x30 [ 173.218651][ T7887] __fput+0x2e5/0x8d0 [ 173.222630][ T7887] ____fput+0x16/0x20 [ 173.226608][ T7887] task_work_run+0x14a/0x1c0 [ 173.232082][ T7887] exit_to_usermode_loop+0x273/0x2c0 [ 173.237372][ T7887] do_syscall_64+0x52d/0x610 [ 173.241966][ T7887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.247848][ T7887] RIP: 0033:0x4582b9 [ 173.251736][ T7887] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.271347][ T7887] RSP: 002b:00007fdf1d39dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 173.279764][ T7887] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 00000000004582b9 [ 173.287727][ T7887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 173.295697][ T7887] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 18:50:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 173.303662][ T7887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf1d39e6d4 [ 173.311624][ T7887] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 00000000ffffffff [ 173.319615][ T7849] CPU: 0 PID: 7849 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 173.328634][ T7849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.338677][ T7849] Call Trace: [ 173.341968][ T7849] dump_stack+0x172/0x1f0 [ 173.341992][ T7849] __this_cpu_preempt_check+0x246/0x270 [ 173.342012][ T7849] ip6_finish_output+0x335/0xdc0 18:50:38 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc02c5625, &(0x7f0000000040)={0xf0f000}) 18:50:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000080), 0xfffffffffffffffc) [ 173.342034][ T7849] ip6_output+0x235/0x7f0 [ 173.342053][ T7849] ? ip6_finish_output+0xdc0/0xdc0 [ 173.342082][ T7849] ? ip6_fragment+0x3980/0x3980 [ 173.371108][ T7849] ip6_xmit+0xe41/0x20c0 [ 173.375363][ T7849] ? ip6_finish_output2+0x2550/0x2550 [ 173.380737][ T7849] ? mark_held_locks+0xf0/0xf0 [ 173.385515][ T7849] ? ip6_setup_cork+0x1870/0x1870 [ 173.390543][ T7849] ? inet6_csk_route_socket+0x715/0xf40 [ 173.396109][ T7849] inet6_csk_xmit+0x2fb/0x5d0 [ 173.400800][ T7849] ? inet6_csk_update_pmtu+0x190/0x190 [ 173.406262][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.412509][ T7849] ? csum_ipv6_magic+0x20/0x80 [ 173.412535][ T7849] __tcp_transmit_skb+0x1a32/0x3750 [ 173.412560][ T7849] ? __tcp_select_window+0x8b0/0x8b0 [ 173.412574][ T7849] ? lockdep_hardirqs_on+0x418/0x5d0 [ 173.412590][ T7849] ? trace_hardirqs_on+0x67/0x230 [ 173.412610][ T7849] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 173.412629][ T7849] tcp_write_xmit+0xe39/0x5660 [ 173.412649][ T7849] ? tcp_established_options+0x29d/0x4d0 [ 173.427880][ T7849] __tcp_push_pending_frames+0xb4/0x350 [ 173.427900][ T7849] tcp_send_fin+0x149/0xbb0 [ 173.464277][ T7849] tcp_close+0xddf/0x10c0 [ 173.468612][ T7849] ? ip_mc_drop_socket+0x211/0x270 [ 173.473728][ T7849] ? __sock_release+0x89/0x2b0 [ 173.478519][ T7849] inet_release+0x105/0x1f0 [ 173.483031][ T7849] inet6_release+0x53/0x80 [ 173.487460][ T7849] __sock_release+0xd3/0x2b0 [ 173.492063][ T7849] ? __sock_release+0x2b0/0x2b0 [ 173.496920][ T7849] sock_close+0x1b/0x30 [ 173.501078][ T7849] __fput+0x2e5/0x8d0 [ 173.505069][ T7849] ____fput+0x16/0x20 [ 173.509054][ T7849] task_work_run+0x14a/0x1c0 [ 173.513655][ T7849] exit_to_usermode_loop+0x273/0x2c0 [ 173.518943][ T7849] do_syscall_64+0x52d/0x610 [ 173.523541][ T7849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.529428][ T7849] RIP: 0033:0x4582b9 [ 173.533351][ T7849] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.553046][ T7849] RSP: 002b:00007fdf1d3dfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 173.561453][ T7849] RAX: 0000000000000005 RBX: 0000000000000002 RCX: 00000000004582b9 [ 173.569420][ T7849] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 173.577386][ T7849] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 173.585351][ T7849] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf1d3e06d4 [ 173.593317][ T7849] R13: 00000000004be777 R14: 00000000004cf3f0 R15: 00000000ffffffff [ 173.665112][ T7871] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7871 [ 173.674591][ T7871] caller is ip6_finish_output+0x335/0xdc0 [ 173.680323][ T7871] CPU: 0 PID: 7871 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 173.689341][ T7871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.699397][ T7871] Call Trace: [ 173.702698][ T7871] dump_stack+0x172/0x1f0 [ 173.707051][ T7871] __this_cpu_preempt_check+0x246/0x270 [ 173.712622][ T7871] ip6_finish_output+0x335/0xdc0 [ 173.717577][ T7871] ip6_output+0x235/0x7f0 [ 173.717599][ T7871] ? ip6_finish_output+0xdc0/0xdc0 [ 173.717622][ T7871] ? ip6_fragment+0x3980/0x3980 [ 173.717646][ T7871] ip6_xmit+0xe41/0x20c0 [ 173.736140][ T7871] ? ip6_finish_output2+0x2550/0x2550 [ 173.741517][ T7871] ? mark_held_locks+0xf0/0xf0 [ 173.746287][ T7871] ? ip6_setup_cork+0x1870/0x1870 [ 173.751336][ T7871] inet6_csk_xmit+0x2fb/0x5d0 [ 173.756019][ T7871] ? inet6_csk_update_pmtu+0x190/0x190 [ 173.761486][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.767734][ T7871] ? csum_ipv6_magic+0x20/0x80 [ 173.772523][ T7871] __tcp_transmit_skb+0x1a32/0x3750 [ 173.777742][ T7871] ? __tcp_select_window+0x8b0/0x8b0 [ 173.779026][ T7849] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7849 [ 173.783045][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.783063][ T7871] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 173.783079][ T7871] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 173.783097][ T7871] tcp_connect+0x1e47/0x4280 [ 173.783127][ T7871] ? tcp_push_one+0x110/0x110 [ 173.783145][ T7871] ? secure_tcpv6_ts_off+0x24f/0x360 [ 173.783169][ T7871] ? secure_dccpv6_sequence_number+0x280/0x280 [ 173.792491][ T7849] caller is ip6_finish_output+0x335/0xdc0 [ 173.798669][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.842907][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.849146][ T7871] ? prandom_u32_state+0x13/0x180 [ 173.854177][ T7871] tcp_v6_connect+0x150b/0x20a0 [ 173.859026][ T7871] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 173.864400][ T7871] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 173.869677][ T7871] ? perf_trace_lock+0xeb/0x510 [ 173.874541][ T7871] ? find_held_lock+0x35/0x130 [ 173.879302][ T7871] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 173.884937][ T7871] __inet_stream_connect+0x83f/0xea0 [ 173.890219][ T7871] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 173.895502][ T7871] ? __inet_stream_connect+0x83f/0xea0 [ 173.900967][ T7871] ? inet_dgram_connect+0x2e0/0x2e0 [ 173.906166][ T7871] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 173.911538][ T7871] ? rcu_read_lock_sched_held+0x110/0x130 [ 173.917254][ T7871] ? kmem_cache_alloc_trace+0x354/0x760 [ 173.922798][ T7871] ? __lock_acquire+0x548/0x3fb0 [ 173.927732][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.933983][ T7871] ? debug_smp_processor_id+0x3c/0x280 [ 173.939450][ T7871] tcp_sendmsg_locked+0x231f/0x37f0 [ 173.944677][ T7871] ? mark_held_locks+0xf0/0xf0 [ 173.949450][ T7871] ? mark_held_locks+0xa4/0xf0 [ 173.954215][ T7871] ? tcp_sendpage+0x60/0x60 [ 173.958719][ T7871] ? lock_sock_nested+0x9a/0x120 [ 173.963662][ T7871] ? trace_hardirqs_on+0x67/0x230 [ 173.968682][ T7871] ? lock_sock_nested+0x9a/0x120 [ 173.973620][ T7871] ? __local_bh_enable_ip+0x15a/0x270 [ 173.978996][ T7871] tcp_sendmsg+0x30/0x50 [ 173.983241][ T7871] inet_sendmsg+0x147/0x5e0 [ 173.987744][ T7871] ? ipip_gro_receive+0x100/0x100 [ 173.992780][ T7871] sock_sendmsg+0xdd/0x130 [ 173.997196][ T7871] __sys_sendto+0x262/0x380 [ 174.001700][ T7871] ? __ia32_sys_getpeername+0xb0/0xb0 [ 174.007088][ T7871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 174.013343][ T7871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.018809][ T7871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.024268][ T7871] ? do_syscall_64+0x26/0x610 [ 174.028943][ T7871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.035018][ T7871] __x64_sys_sendto+0xe1/0x1a0 [ 174.039795][ T7871] do_syscall_64+0x103/0x610 [ 174.044392][ T7871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.050276][ T7871] RIP: 0033:0x4582b9 [ 174.054171][ T7871] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.076122][ T7871] RSP: 002b:00007fdf1d3bec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 174.084530][ T7871] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 174.092500][ T7871] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 174.100884][ T7871] RBP: 000000000073bfa0 R08: 000000002031e000 R09: 000000000000001c [ 174.108853][ T7871] R10: 0000000020000004 R11: 0000000000000246 R12: 00007fdf1d3bf6d4 [ 174.116822][ T7871] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 174.124834][ T7849] CPU: 1 PID: 7849 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 174.128668][ T7896] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program [ 174.133856][ T7849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.133863][ T7849] Call Trace: [ 174.133888][ T7849] dump_stack+0x172/0x1f0 [ 174.133912][ T7849] __this_cpu_preempt_check+0x246/0x270 [ 174.133938][ T7849] ip6_finish_output+0x335/0xdc0 [ 174.170614][ T7849] ip6_output+0x235/0x7f0 [ 174.174947][ T7849] ? ip6_finish_output+0xdc0/0xdc0 [ 174.180063][ T7849] ? ip6_fragment+0x3980/0x3980 [ 174.184923][ T7849] ip6_xmit+0xe41/0x20c0 [ 174.189178][ T7849] ? ip6_finish_output2+0x2550/0x2550 [ 174.197159][ T7849] ? mark_held_locks+0xf0/0xf0 [ 174.201927][ T7849] ? ip6_setup_cork+0x1870/0x1870 [ 174.206970][ T7849] inet6_csk_xmit+0x2fb/0x5d0 [ 174.211647][ T7849] ? inet6_csk_update_pmtu+0x190/0x190 [ 174.217106][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.223359][ T7849] ? csum_ipv6_magic+0x20/0x80 [ 174.228251][ T7849] __tcp_transmit_skb+0x1a32/0x3750 [ 174.233463][ T7849] ? __tcp_select_window+0x8b0/0x8b0 [ 174.238759][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.244997][ T7849] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 174.250473][ T7849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.256718][ T7849] tcp_connect+0x1e47/0x4280 [ 174.261335][ T7849] ? tcp_push_one+0x110/0x110 [ 174.266016][ T7849] ? secure_tcpv6_ts_off+0x24f/0x360 [ 174.271297][ T7849] ? secure_dccpv6_sequence_number+0x280/0x280 [ 174.277449][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.283686][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.289928][ T7849] ? prandom_u32_state+0x13/0x180 [ 174.294958][ T7849] tcp_v6_connect+0x150b/0x20a0 [ 174.299811][ T7849] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 174.305191][ T7849] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 174.310478][ T7849] ? perf_trace_lock+0xeb/0x510 [ 174.315355][ T7849] ? find_held_lock+0x35/0x130 [ 174.320123][ T7849] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 174.325769][ T7849] __inet_stream_connect+0x83f/0xea0 [ 174.331050][ T7849] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 174.336329][ T7849] ? __inet_stream_connect+0x83f/0xea0 [ 174.341802][ T7849] ? inet_dgram_connect+0x2e0/0x2e0 [ 174.347003][ T7849] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 174.352377][ T7849] ? rcu_read_lock_sched_held+0x110/0x130 [ 174.358099][ T7849] ? kmem_cache_alloc_trace+0x354/0x760 [ 174.363657][ T7849] ? __lock_acquire+0x548/0x3fb0 [ 174.368587][ T7849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.374828][ T7849] ? debug_smp_processor_id+0x3c/0x280 [ 174.380298][ T7849] tcp_sendmsg_locked+0x231f/0x37f0 [ 174.385502][ T7849] ? mark_held_locks+0xf0/0xf0 [ 174.390271][ T7849] ? mark_held_locks+0xa4/0xf0 [ 174.395038][ T7849] ? tcp_sendpage+0x60/0x60 [ 174.399540][ T7849] ? lock_sock_nested+0x9a/0x120 [ 174.404475][ T7849] ? trace_hardirqs_on+0x67/0x230 [ 174.409495][ T7849] ? lock_sock_nested+0x9a/0x120 [ 174.414449][ T7849] ? __local_bh_enable_ip+0x15a/0x270 [ 174.419836][ T7849] tcp_sendmsg+0x30/0x50 [ 174.424084][ T7849] inet_sendmsg+0x147/0x5e0 [ 174.428587][ T7849] ? ipip_gro_receive+0x100/0x100 [ 174.433617][ T7849] sock_sendmsg+0xdd/0x130 [ 174.438038][ T7849] __sys_sendto+0x262/0x380 [ 174.442552][ T7849] ? __ia32_sys_getpeername+0xb0/0xb0 [ 174.447948][ T7849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 174.454206][ T7849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.459663][ T7849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.465126][ T7849] ? do_syscall_64+0x26/0x610 [ 174.469800][ T7849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.475884][ T7849] __x64_sys_sendto+0xe1/0x1a0 [ 174.480657][ T7849] do_syscall_64+0x103/0x610 [ 174.485251][ T7849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.491143][ T7849] RIP: 0033:0x4582b9 [ 174.495046][ T7849] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.514654][ T7849] RSP: 002b:00007fdf1d3dfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 174.523067][ T7849] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 174.531035][ T7849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 174.538999][ T7849] RBP: 000000000073bf00 R08: 0000000020000040 R09: 000000000000001c [ 174.546980][ T7849] R10: 0000000020000003 R11: 0000000000000246 R12: 00007fdf1d3e06d4 [ 174.554976][ T7849] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 174.579634][ T7847] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7847 [ 174.589028][ T7847] caller is ip6_finish_output+0x335/0xdc0 [ 174.594828][ T7847] CPU: 1 PID: 7847 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 174.602334][ T7896] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program [ 174.603843][ T7847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.603848][ T7847] Call Trace: [ 174.603869][ T7847] dump_stack+0x172/0x1f0 [ 174.603892][ T7847] __this_cpu_preempt_check+0x246/0x270 [ 174.603919][ T7847] ip6_finish_output+0x335/0xdc0 [ 174.614552][ T7871] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/7871 [ 174.622461][ T7847] ip6_output+0x235/0x7f0 [ 174.622480][ T7847] ? ip6_finish_output+0xdc0/0xdc0 [ 174.622500][ T7847] ? ip6_fragment+0x3980/0x3980 [ 174.622522][ T7847] ip6_xmit+0xe41/0x20c0 [ 174.622545][ T7847] ? ip6_finish_output2+0x2550/0x2550 [ 174.625820][ T7871] caller is ip6_finish_output+0x335/0xdc0 [ 174.630127][ T7847] ? mark_held_locks+0xf0/0xf0 [ 174.684075][ T7847] ? ip6_setup_cork+0x1870/0x1870 [ 174.689099][ T7847] ? inet6_csk_route_socket+0x715/0xf40 [ 174.694656][ T7847] inet6_csk_xmit+0x2fb/0x5d0 [ 174.699327][ T7847] ? inet6_csk_update_pmtu+0x190/0x190 [ 174.704791][ T7847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.711031][ T7847] ? csum_ipv6_magic+0x20/0x80 [ 174.715800][ T7847] __tcp_transmit_skb+0x1a32/0x3750 [ 174.721006][ T7847] ? __tcp_select_window+0x8b0/0x8b0 [ 174.726285][ T7847] ? lockdep_hardirqs_on+0x418/0x5d0 [ 174.731563][ T7847] ? trace_hardirqs_on+0x67/0x230 [ 174.736595][ T7847] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 174.742312][ T7847] tcp_write_xmit+0xe39/0x5660 [ 174.747074][ T7847] ? tcp_established_options+0x29d/0x4d0 [ 174.752722][ T7847] __tcp_push_pending_frames+0xb4/0x350 [ 174.758275][ T7847] tcp_send_fin+0x149/0xbb0 [ 174.762788][ T7847] tcp_close+0xddf/0x10c0 [ 174.767160][ T7847] ? sock_fasync+0x101/0x160 [ 174.771748][ T7847] inet_release+0x105/0x1f0 [ 174.776262][ T7847] inet6_release+0x53/0x80 [ 174.780677][ T7847] __sock_release+0xd3/0x2b0 [ 174.785272][ T7847] ? __sock_release+0x2b0/0x2b0 [ 174.790130][ T7847] sock_close+0x1b/0x30 [ 174.794287][ T7847] __fput+0x2e5/0x8d0 [ 174.798272][ T7847] ____fput+0x16/0x20 [ 174.802254][ T7847] task_work_run+0x14a/0x1c0 [ 174.806847][ T7847] exit_to_usermode_loop+0x273/0x2c0 [ 174.812135][ T7847] do_syscall_64+0x52d/0x610 [ 174.816725][ T7847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.822615][ T7847] RIP: 0033:0x412071 [ 174.826503][ T7847] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 174.846100][ T7847] RSP: 002b:00007ffcc9ffc160 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 174.854503][ T7847] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000412071 [ 174.862465][ T7847] RDX: 0000000000000000 RSI: 00000000007407a0 RDI: 0000000000000006 [ 174.870426][ T7847] RBP: 0000000000000000 R08: 0000000000029f9e R09: 0000000000029f9e [ 174.878392][ T7847] R10: 00007ffcc9ffc090 R11: 0000000000000293 R12: 0000000000000001 [ 174.886359][ T7847] R13: 00007ffcc9ffc1a0 R14: 0000000000000000 R15: 00007ffcc9ffc1b0 [ 174.894347][ T7871] CPU: 0 PID: 7871 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 174.903368][ T7871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.903373][ T7871] Call Trace: [ 174.903396][ T7871] dump_stack+0x172/0x1f0 [ 174.903419][ T7871] __this_cpu_preempt_check+0x246/0x270 [ 174.903440][ T7871] ip6_finish_output+0x335/0xdc0 [ 174.903461][ T7871] ip6_output+0x235/0x7f0 [ 174.935858][ T7871] ? ip6_finish_output+0xdc0/0xdc0 [ 174.940982][ T7871] ? ip6_fragment+0x3980/0x3980 [ 174.941008][ T7871] ip6_xmit+0xe41/0x20c0 [ 174.941032][ T7871] ? ip6_finish_output2+0x2550/0x2550 [ 174.950097][ T7871] ? mark_held_locks+0xf0/0xf0 [ 174.950118][ T7871] ? ip6_setup_cork+0x1870/0x1870 [ 174.950141][ T7871] ? inet6_csk_route_socket+0x715/0xf40 [ 174.960255][ T7871] inet6_csk_xmit+0x2fb/0x5d0 [ 174.960274][ T7871] ? inet6_csk_update_pmtu+0x190/0x190 [ 174.960296][ T7871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.975507][ T7871] ? csum_ipv6_magic+0x20/0x80 [ 174.975533][ T7871] __tcp_transmit_skb+0x1a32/0x3750 [ 174.975558][ T7871] ? __tcp_select_window+0x8b0/0x8b0 [ 174.987222][ T7871] ? lockdep_hardirqs_on+0x418/0x5d0 [ 174.987239][ T7871] ? trace_hardirqs_on+0x67/0x230 [ 174.987260][ T7871] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 174.987279][ T7871] tcp_write_xmit+0xe39/0x5660 [ 174.987294][ T7871] ? tcp_established_options+0x29d/0x4d0 [ 174.987326][ T7871] __tcp_push_pending_frames+0xb4/0x350 [ 174.987347][ T7871] tcp_send_fin+0x149/0xbb0 [ 174.997281][ T7871] tcp_close+0xddf/0x10c0 [ 174.997298][ T7871] ? ip_mc_drop_socket+0x211/0x270 [ 174.997314][ T7871] ? __sock_release+0x89/0x2b0 [ 174.997336][ T7871] inet_release+0x105/0x1f0 [ 175.057528][ T7871] inet6_release+0x53/0x80 [ 175.061943][ T7871] __sock_release+0xd3/0x2b0 [ 175.066529][ T7871] ? __sock_release+0x2b0/0x2b0 [ 175.071394][ T7871] sock_close+0x1b/0x30 [ 175.075554][ T7871] __fput+0x2e5/0x8d0 [ 175.079534][ T7871] ____fput+0x16/0x20 [ 175.083515][ T7871] task_work_run+0x14a/0x1c0 [ 175.088106][ T7871] exit_to_usermode_loop+0x273/0x2c0 [ 175.093391][ T7871] do_syscall_64+0x52d/0x610 [ 175.098479][ T7871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.104375][ T7871] RIP: 0033:0x4582b9 [ 175.108262][ T7871] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.127872][ T7871] RSP: 002b:00007fdf1d3bec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 175.136290][ T7871] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004582b9 [ 175.144258][ T7871] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 175.152226][ T7871] RBP: 000000000073bfa0 R08: 000000002031e000 R09: 000000000000001c [ 175.160193][ T7871] R10: 0000000020000004 R11: 0000000000000246 R12: 00007fdf1d3bf6d4 [ 175.168162][ T7871] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff 18:50:40 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x200001d}) 18:50:40 executing program 1: bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x20007c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x10000000, 0x400100]}, 0x2c) 18:50:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ed, 0x0) 18:50:40 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@delpolicy={0x6c, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast1, @in6=@dev}}, [@encap={0x1c, 0x8, {0x0, 0x0, 0x0, @in=@loopback}}]}, 0x6c}, 0x8}, 0x0) 18:50:40 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:40 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:40 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ed, 0x0) 18:50:41 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x1d}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [0x42]}, 0x48) 18:50:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000780)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 18:50:41 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) 18:50:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) 18:50:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x1d}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [0x42]}, 0x48) 18:50:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x800000000000f) r2 = dup2(r1, r1) write$apparmor_current(r2, 0x0, 0x0) 18:50:41 executing program 1: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:41 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) 18:50:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x1d}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [0x42]}, 0x48) 18:50:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x2ff, 0x0, 0x0, "21f3fc3b59603cb2ad203c95a232e2ebaebbf5b41a00"}) fgetxattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/219, 0xfffffffffffffdc7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3fff) syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x99, 0x2201c0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x80000000, 0x0, 0x5, 0x1d, 0x10, "7a54169c995a00d77162631a4acce4ca08dc74836851536fab74c7713532987b2dc2d65c500f65dff32e0e34811e9ece4c99be0ac228a402907390adaee93d62", "8a2f279b5a221f8712daa0d8606f7bab5e464ee7afbbd9109735783ae8f7f2ac2b791b72a9f271297e7fd4350dfb18f1cbf37fb8e65472d7206a15745a6db0e8", "ae184b3e2cae57079e7daf7b054fb6f9881462cf0f0bab9ecf14c003956a10da", [0x1, 0x4]}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x542a, 0x0, 0x0, 0x0, 0x80000000}}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000440)) clock_adjtime(0x3, &(0x7f0000000900)={0x8000, 0x0, 0x6, 0x800, 0x1, 0x0, 0x4, 0x3, 0x5, 0x8, 0xfffffffffffffff9, 0x5, 0x7, 0x8, 0x8, 0x3ff, 0x56a5, 0x1b, 0x8000, 0x1, 0x3e, 0x4, 0x4, 0x0, 0x8, 0x3f}) listen(r5, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x9, 0x404402) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, 0x0, 0x0) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01810b0be8366315000000727b7d1e6794e1220000000000", @ANYRES32=0x0], 0x0) accept$unix(r5, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x14, "98963a9c802cc7d9ec485ad3e4d85a472b9d4eafd264e74f44c6de1b80c80846e7dbbe7639f9c5ee2dbec5603a9246d373602c8c7b6c9fe6d7e93603f38581dc", "19fe2c16a44a1847741f7a776be430e1032c4a7a787f90918ad99a2547b52cdb", [0x5, 0x2]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/7, 0x7}], 0x1, 0x0) close(r1) 18:50:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x1d}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [0x42]}, 0x48) 18:50:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x800000000000f) r2 = dup2(r1, r1) write$apparmor_current(r2, 0x0, 0x0) 18:50:42 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) 18:50:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x84, 0x76, &(0x7f0000000180)={'ipvs\x00\x00\x00i\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000200)=0x1e) 18:50:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_capability(r1, &(0x7f00000006c0)='security.capability\x00', &(0x7f0000000700)=@v2, 0x14, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) 18:50:42 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) 18:50:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x28}, 0x28) 18:50:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x800000000000f) r2 = dup2(r1, r1) write$apparmor_current(r2, 0x0, 0x0) [ 177.408728][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:50:43 executing program 1: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:43 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) 18:50:43 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000040)={{0x6, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 18:50:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, 0x0, 0x0, 0x4) 18:50:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x800000000000f) r2 = dup2(r1, r1) write$apparmor_current(r2, 0x0, 0x0) 18:50:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000664f0000028000fe840800000000000095"], 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x27}], &(0x7f0000000300)='GPL\x00', 0x1, 0xa7, &(0x7f00000004c0)=""/167}, 0x48) 18:50:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, 0x0, 0x0, 0x4) 18:50:43 executing program 0: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:43 executing program 4: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000664f0000028000fe840800000000000095"], 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x27}], &(0x7f0000000300)='GPL\x00', 0x1, 0xa7, &(0x7f00000004c0)=""/167}, 0x48) 18:50:43 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) 18:50:43 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, 0x0, 0x0, 0x4) 18:50:44 executing program 1: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000664f0000028000fe840800000000000095"], 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x27}], &(0x7f0000000300)='GPL\x00', 0x1, 0xa7, &(0x7f00000004c0)=""/167}, 0x48) 18:50:44 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwrite64(r0, 0x0, 0x0, 0x4) 18:50:44 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) 18:50:44 executing program 0: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000664f0000028000fe840800000000000095"], 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x27}], &(0x7f0000000300)='GPL\x00', 0x1, 0xa7, &(0x7f00000004c0)=""/167}, 0x48) 18:50:44 executing program 5: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:44 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) 18:50:44 executing program 4: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:44 executing program 2: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) [ 178.978153][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:50:44 executing program 3: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff87, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:50:44 executing program 3: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff87, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:50:45 executing program 1: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:45 executing program 3: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff87, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:50:45 executing program 0: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:45 executing program 3: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff87, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:50:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS(r1, 0x5457, &(0x7f0000000000)) 18:50:45 executing program 5: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:45 executing program 4: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:45 executing program 2: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(0xffffffffffffffff, 0x2000000079, 0x8, r6, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r7, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000480)=0x800000000, 0x2) listen(r0, 0x4ffffffffff) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) connect(r1, &(0x7f00000004c0)=@xdp={0x2c, 0x4, r8, 0x22}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000000"]) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') getsockopt$bt_sco_SCO_OPTIONS(r5, 0x11, 0x1, &(0x7f0000000340)=""/125, &(0x7f0000000100)=0x7d) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r9, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 18:50:46 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) write$P9_RRENAMEAT(r0, &(0x7f0000000140)={0x7}, 0x7) 18:50:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x75, &(0x7f0000000100)={0x3f00}, 0x8) close(0xffffffffffffffff) 18:50:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4d85503dd6fb72a09d2c6d4927255ca32c0246f51a9ca956eea47fc35ad11e6f"}}) 18:50:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4d85503dd6fb72a09d2c6d4927255ca32c0246f51a9ca956eea47fc35ad11e6f"}}) 18:50:46 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x84ea, 0x0) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000180)=0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in=@empty, @in=@remote, 0x0, 0x100000000, 0x4e20, 0x0, 0x0, 0x0, 0x20, 0x67, r4}, {0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0xcfa9, 0x55d5}, {0x0, 0x40, 0x80000001}, 0xc9, 0x6e6bbc, 0x0, 0x0, 0x0, 0x2}, {{@in6=@empty}, 0xa, @in=@multicast1, 0x3501, 0x3, 0x3, 0x2000000000000000, 0x10000, 0x0, 0x8}}, 0xe8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000380)={'ip6gre0\x00', @remote}) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000140)={0x3, 0x8}) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$inet(r0, &(0x7f00000001c0), 0x10) 18:50:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4d85503dd6fb72a09d2c6d4927255ca32c0246f51a9ca956eea47fc35ad11e6f"}}) 18:50:46 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x84ea, 0x0) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000180)=0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in=@empty, @in=@remote, 0x0, 0x100000000, 0x4e20, 0x0, 0x0, 0x0, 0x20, 0x67, r4}, {0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0xcfa9, 0x55d5}, {0x0, 0x40, 0x80000001}, 0xc9, 0x6e6bbc, 0x0, 0x0, 0x0, 0x2}, {{@in6=@empty}, 0xa, @in=@multicast1, 0x3501, 0x3, 0x3, 0x2000000000000000, 0x10000, 0x0, 0x8}}, 0xe8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000380)={'ip6gre0\x00', @remote}) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000140)={0x3, 0x8}) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$inet(r0, &(0x7f00000001c0), 0x10) 18:50:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4d85503dd6fb72a09d2c6d4927255ca32c0246f51a9ca956eea47fc35ad11e6f"}})