[ 33.581666] audit: type=1800 audit(1546498829.802:27): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 33.608897] audit: type=1800 audit(1546498829.802:28): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.336321] audit: type=1800 audit(1546498830.592:29): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 34.355977] audit: type=1800 audit(1546498830.592:30): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.46' (ECDSA) to the list of known hosts. 2019/01/03 07:00:37 fuzzer started 2019/01/03 07:00:39 dialing manager at 10.128.0.26:35083 2019/01/03 07:00:39 syscalls: 1 2019/01/03 07:00:39 code coverage: enabled 2019/01/03 07:00:39 comparison tracing: enabled 2019/01/03 07:00:39 setuid sandbox: enabled 2019/01/03 07:00:39 namespace sandbox: enabled 2019/01/03 07:00:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/03 07:00:39 fault injection: enabled 2019/01/03 07:00:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/03 07:00:39 net packet injection: enabled 2019/01/03 07:00:39 net device setup: enabled 07:02:25 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000140)) r4 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x50000) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc2c45512, &(0x7f0000000200)={{0x0, 0x2, 0x6, 0xc9a, '\x00', 0xffffffffffffffe0}, 0x1, [0x100000000, 0x4, 0x100000000, 0x3, 0x1, 0x7, 0x10001, 0x9ca, 0x0, 0x3f, 0x4, 0x6, 0x43c5, 0xf8ac, 0x0, 0x6, 0x1, 0x5, 0x100000001, 0x9, 0x7f, 0x9, 0x5, 0x9, 0xc433ca8, 0x101, 0x1, 0x6dbf, 0x100000000, 0x7, 0x3, 0x5, 0x8001, 0xabe, 0x8, 0x200, 0x9, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0x84, 0x5, 0x6, 0x2, 0x0, 0x1, 0xca9, 0x7f, 0x1, 0x5a7, 0xd6, 0x7ff, 0x0, 0x4c3, 0x401, 0x20, 0x80000000, 0x4, 0x80000000, 0x7, 0x6, 0x7, 0xfc, 0x400, 0x9, 0x7f66, 0x0, 0x4, 0x8, 0x28, 0x2, 0x0, 0xb057, 0x7fffffff, 0x9c, 0x100, 0xe802, 0x1d4, 0x0, 0x3f, 0x6, 0x0, 0x5, 0x0, 0x9, 0xff, 0xfd7c, 0x7fffffff, 0x4a, 0x2a5, 0x9, 0x6, 0x0, 0x5, 0x1a60, 0xf975, 0x1, 0x8, 0x5, 0x9, 0x5b52, 0x3f, 0x9, 0x100000000, 0x0, 0x20, 0x20, 0xa28, 0x4, 0x1, 0xff, 0x0, 0x7, 0x7, 0x2, 0x1, 0x100000000, 0x0, 0x1f, 0x0, 0x0, 0x2a, 0x8000, 0x4, 0x4, 0x7f, 0x6], {0x0, 0x1c9c380}}) fcntl$getownex(r2, 0x10, &(0x7f0000000500)={0x0, 0x0}) getsockname(r0, &(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f00000005c0)=0x80) r6 = add_key$user(&(0x7f0000000600)='user\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000680)="8577fab0ca4383546159490d4886f1beebc3076a91ed6de554880c063336dc6ca61854f71facb564f1a771a3366a7fcbb6c1a94c1f57437bba86e47be46b1562619c2cb2c0a9ab655afa8d89ef4980e3fa73ad01b3b3e179902521bb4e521a947e58d0bdabd44963a03ecdccb5d22e0925b4b9f78ce119840766ad6d687c1d8ca32c02889d8c871677f8cac76f43d10a6ecd3f435b4fdcc02f5cf5d6a92cdcf499fab187468902c9d376393eef1ea47147c171fa5d34939b0079a02b73f4e4469984f063d61293861478caa774603faa801a1a60d8be8f49e127693c1649191e8fb0e965c4a2fd5830b3760bf7e75b394daa0cf58e7613e559681820a5991a948e3f385ee35d16d15d51f70d804571c234f6f3f69df9b16e636378a2341518b7dff57f074e3e7fcca55b073cd19a989c8788b955b4d8c1b7c923404e2c22a397f2feeebf6e113bea1412c0a69184898293a7e1928fb8a0e0fc63481a2fb5d935b26d25972189e1bb791e0a318433030c4e146e87a10f66cb49845b557d965d2b8a74c0345825ea7a4653f27f088fa944a998dcad74f63b5cbe7399d3560f1ea5af27f9a862f8e47791a2546a9522daa72e87ea31efc9c2e3ee0f0b1cc09affa217914958816dcf258fc976479b03befa7171c6417110a62a97676b7b4c4d7687ec1f9c9ff244cd162c45062fb1f04c5b091db2142da4d338b735dfd34ed8a4e5f456ac6b7740c6f358a2a420fac1ea17344cd384f395673519500e3318d7d802e43d84a62bcb1d674bc75ae151d06642395386897022ac671f03719914d46b22f9ba836534019bc2478a75007b25994285cb74b2d9f07cf5f620c8249e1ce80ffa8d57abd5130c0139467190a12173c4f9b9d7b7858e6f364386253e68619faa24a30b8d3456735772bb2792bffd6214ec34c0df8c9ba1a4012bcfd6eb1df20be0d64b9d56205b96574cfd881dd7f219195d29ac5b4371749cb35da3bdafb658fffe459505382d6322bbdbc0efefa42457d189d63a9bf2d68b3d37dec3b890612773f963cef9271e23622fdabf1e57e4552c62f8efcf05fc73221caf5b8de4e555baa4f99d306ea6aef073cff2f34aeca6665109a00bdbc76df9ce1814de07849b24b0a996871b7bade4f783945882591cfe9e5d65ba14fe8eb504702b6beff6f322b94a2b6e7add1a960f68806f0db8cc05b012dc47e6f42b60ab1a9995ba2782bd295810efc2d947ed2e496a0fdf1d06ed84f4a587816f64b1e8a5a6bad953ba78c125f5045b14914bc3f7d800fe2733def9c066f50d3c7bb20953b463955412dbf42ef1c786b5b6c1d2605b75a086b2c168da56f60058fa9f662d3df60ca5863ef44b363dfeeb93a7e4e1d6c0bb056c6d86e6a46b0376e77e1059564d1a2f981705e2fc241539297ebd406e6dfc39fa04206e5a0956e591bc3586eaddc3070c4ed4c5f0d346979fc88cb1d13535136d3fec94c260145cb5ba0d336af196627ef0bfd2776f316b91e440691cd2d979f6626622ba3db2b3e3186044d10be06e78b99e91a132d1414495e4b56177c6f813a637e7effea73112fa695e412454020f79712752a33b3f96cf80a5dc84adee7455411dee7824dc29562146204312c35a8b93afc0c2eecc37bf9339750dfc12a640023148a26b7b1803e4d7cb4323f7e2b6432dc101b854c7f1b285794da51a1f878ecd1f6dbd7dd67fe6717d44859a130a6d3ded62f83a9e6b30084eb1bb055e5df67adaa6734271b9e54c43766be0a878fbba3d17c376310f10d057b961076359f7927d9dc91665f954a95d6179dd0f46a2778fb59fad318e44535dddf6dd6536fb30086248e34afc6b4960888d3412b2d5f1cdf0c43617907afc220f16ed3307c6f96e6a46bda8c9c30422ac3401ecf0c5341ce15bd51512f31f6228f0359bdbb28d60a72f446360454043455d1cb3b89fd4175da5552286c95c528c11fb68608311332d6aa83864e89484e408491325fed8a409f4d2c021d9b69fa29c2ec2f8e8f96ad4c17d823c30bea56504f035608b2e9fc3808611286c6547d9fcf0fd92c82075a8f6e3b4720c4c1b347527d749df9fbce146046a04c850805c618b8798fe13c56fd25dec8610d7c22804757e1f83eb7e36ba058d35b0bd4d419e9ebea23962b04a543f283b63c533ec0d74e25888e859045280d83759b01efde72b9f7820f86e900e994c98bb824a69827c1c5981316d074ddc8a2fde420a1c8efaa29898795dd166acb428e9d1493d3eae0539e9c21e84a36f3b660931721fe52e050d5f1f3d72c7ec914b98ddfd2630fd8370a0a261a73ece0cf01217757859ca5c9f4d62352cba5a102fb9344ee8ee8feb2733fb806598fc8d78ce04665e5dffab7947b91656bcd7eb2165aac17f1115e8608a8a2b3b16051267f191366b5e17966c477b2d46f592807b86ad899cdb0b696eba1ac3b0e78cb33518e8d0c822e97d1966cd17e1bd705a8c4be9949220bc161b48bed5b33c0a1c80c086e4bf3aabb58051cc8eeab1d308720d7c017138805502cffb64689f1b30dbc1dd12d9072dfb7125a756178128ffbfa8d7f5a398fb360db50e5b66caac047ca00a34056fe1da12d45cd7e14abf95707b21b976fc37739e53d591204798bcc5f8408aab44a208fccb675fe89b0969900f6693ebfcf574a785eed5dc20f87bd69ef5baf30495337fa0a905aa8b88cb7839729f03ac6b7d31901a52f963d1ea8a2cdc4364d62196b221a165c72241c5507df0b09b5f4aef70ad639a712cd2e9df41c8d3b2b4adf09aeeea315b80796657a735d7948711d036415fd8d29c17184ad7d8399a98446ced80ed482e591ff19bc99dcdd911360e7bf20bd70bb47e913443ea8b30c1e2b5fe14b2939631be464c3f65ece8af700b41aff18f0e70c3fb74d75455fd6135121d2245a35a4c548d3c27dc118801df77db10e2899c1bec2dc8102933572f1f9434207b7e2dc3b73315536333397bee015efe539292e6d8f5462dc9625715bbd9ac000320e56070d41f8a2c2d981f27fa91e5256bb2687440c2412e647b179c6d959ff37fe3756c913758e85f3d7020efb5b00eb1528615b7aabb448f2efd4f0416aaedebb9a618fad45c761a8112dc5b8074402609375ea7ce81ef1096c964584e90ebd6615ebe1d82bd3eef04af381d913d4f926f2a8d6a786e1dad305fe3b01d99778b922cac47d27e25c12829846c9fe90153e02ae698c09f30fb2bd8bcaf5635086194e3a0a0f6df046a9c45a9433f8940eeaa9c442638dd75d14a0046dd52bcdc3784a0f13e822261f03109cba4cc38e6f58ae7ff89a525f8a434727ef8dda928c4460d767978b1a4bc5313463bdcf3f52eba38df37f39b38226de4316f522a8c3d4466ef4a02c22f3b9bd76abea9a8656cc000904b95fd9d0534c61b9820383b3cedda6833e99a36d2fc774da923a4fa5a49907ae932428dedcf1e4b32c41188f0fb121c8533cc74ba8c6570ed57ec3c0e325262ddf215e6215e231bd826e7d428c112a0efb73515db0c8b3e0cde3d65c7f65ada94bb787832f39ae2b7be3b42f91df8f506a3eb0e205a9bdc154137eb71ef64173773afc18a974ac0368e414ec87622ef3615b150cb5b75c82d5dbacf798e66cd7fe1bfb2b61e4a3643312aba9b6e24029ccd6db409595bd07d1fb295aed49bb93b165b5bfc887675b924ba80144fa9d89b5342f2d1b66a81faeae8813379c59eaabc633dd57d36c9454f8e878c60797f2c76598721d2def0721e43ba9aae0762632256182c9cd1ea87e0ee4bbfb8158ecd73720e2506133df7a802c1d857da08314413ce8e011c0b82c99e22281e01c38f3d9575c668bd1fa93017a41bd6d30762b3fd2fccd0473f1dee5b0c216ea22782681f427f41851eacbe4b53879035536330e59991f2a9f9d3acd2bc493d63eb11eda3d8b5a2138a9868cdec958033b0a0c1e87a3c1da99ff2bf2f22a517075eeb93eac9439c73a540abce6758ffd4c9bdb805c1e695c0ce17bd489031d84c844f3c20afb7655767c88181bc2ac5fc8e7b0bea1be5683d0ced16963d27da81e38cb93c1c84260ce215a2250d613e3641993b843e1eaa731ad72ff34a161619659589c1cdda1b277908ce8f7c3228a49fb70aec2ad22118bb432efa7b3e3b9f46e485834749366875b7c0c6e4d5a6b89f34f36c174297850c1aa0d0c708e5cd5380e2e8cf22a14757e776bfcddc60fd38b72b76b8e3aa992d71d4bd55e882c51e0924e238cba43a05e8c554c8cd22ffeebc7f052477455c1e3ee5f9874161f9693dfd67b7960840521c78a72c06d9b84d1e547a91a7d3ed464ea9f1bde7a79cb9e46d35a306a28e97f7dffb3e55f779e551017a0b2866b84ccc287ff6296b9fc381f2cee0ce71d3ccac542310878bb2e03fc7b452a251480e2603c37bd922bb023266190b758045524e2501072d8cf2b9573c7bc6b4cee6437056f1ee83832d6d574a8b4f999472a07791fe6cd87ce39947543c78ec24516baa32882beb562b406d25bff5842ef296dbf5c3a950daf5db5c3fe17fcfbfab219a7240da337f7f54f276e63ecdad187ff703220440cd83780fe420be4d586a8ca776fe4b2d55e02aaf10b3978ac29a0c4bb58e5703efe429405f3c0fd59c8ec2e6d6111481e2b1cd622f8d2b2b8b8253c741a7d2df1b692aad51cbf5b8b314c21cbb9acf4a079c478bb3ca40fa65f29776654e0d94baaefe6ce19c01734de1ac8653ec1dacf81efb4d7044f94dae84650b177c06875ebf02f4668c5fd3776ba7787e116c4deb76c4cde39f69f5b6dbe077f3ef58fb0cd35cc31ae056281f2038127e48a71f34ebdd4c4105be63287427ee3ebe4aed584deb255c0b71e559628a5ec0223045240033d56703f3de438c1aec2ceeb2f1e7e4a64b5741a45ec13be0ac7133eb84d1bd8194995b65a6dca2c0c4c07fa1196ac1198f76b404e841c7f0afea4e381b5a331801d1b2fad975d1735a37f33074d1f498349b3b85b9a37dde3a4531cc93a335c8aec4a786453e124682adbbe7ba3a81e5c0ce46d0c3b1979df49808afb7ad6eea0d9621ed97000bfc39dc88763048405373016cadeb9492646b34ba368f59d8b8234f1a67a5ad53ca71db1bb940ace6db7b5395bb3fa9ccc34a059fbd6881c8fdff5c1e236713c9871f1fab1745053895184875473de3fc298a68b1d6ff97c5b7c9f9bde7f9b7b718170ebc9d9e99193cdec74d2e251c7540506e35e7b58d1ccedef43dd9e3b9250fde81d0a9bbf70540fb8abaa6452652b21dafa7c8d5ace9160d6562b624a3148906ae796077768a14be105f0f348d1f1217b5ae032446d719631ac64e985be23f81ae5727b5fff37a6d3d499f1e2be07ca5e362de879f1262bdf391bfb4ac3959d3feee81a6887f920790447646f15fadb8c388ef663a8e745ba70c137ddb308fa1169c497d3b257ecf2d546f46028cb2723728b5cc1072ef642699f66f86a0de1af98bbe2673831918605ef004346f39a182ef9d9cf179490a087ec047c1fd9404f1d77fd9d2ab754fcb51d6d67cd6e642baeff51fe14dc349e28970ad307a738fd8754591ae96329965fa3035db633e6b032b6896bd9567ac23c19addaa818058cc75bd46758f11346b5310504e609e8defee1e9432bbd3249af4af5c2107c9a60d08a3d5a809ac31edbc8bd645db26074e5598946353d755c4cec338a8b40d51d5ff9c5c7232fd756f8caba7fbe54000a4de9c4cb532c9e2713127e3aa45cda9949553c56b465db9ff97f081ef8ce5ca06e97253640a132b63f5ea52e8b223", 0x1000, 0xfffffffffffffff8) r7 = request_key(&(0x7f0000001680)='asymmetric\x00', &(0x7f00000016c0)={'syz', 0x2}, &(0x7f0000001700)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r6, 0x2, r7) connect$caif(r0, &(0x7f0000001740)=@dgm={0x25, 0x1ae6d152}, 0x18) prctl$PR_SET_SECUREBITS(0x1c, 0x24) r8 = syz_open_dev$usb(&(0x7f0000001780)='/dev/bus/usb/00#/00#\x00', 0x20, 0x80) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f00000017c0)=""/143, &(0x7f0000001880)=0x8f) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000018c0)=r5) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001900), &(0x7f0000001940)=0x4) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f00000019c0)={0x12, 0x10, 0xfa00, {&(0x7f0000001980), r1, r0}}, 0x18) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/sequencer\x00', 0x10001, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000001a40)={0x3}, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/rtc0\x00', 0xc200, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r9, 0x6430) prctl$PR_GET_FPEXC(0xb, &(0x7f0000001ac0)) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000001b00)={@multicast2, @multicast1, 0x0}, &(0x7f0000001b40)=0xc) sendmsg$can_raw(r4, &(0x7f0000001c40)={&(0x7f0000001b80)={0x1d, r10}, 0x10, &(0x7f0000001c00)={&(0x7f0000001bc0)=@can={{0x1, 0x1, 0x3f, 0x3}, 0x4, 0x3, 0x0, 0x0, "78c8238b732a7772"}, 0x10}, 0x1, 0x0, 0x0, 0x4000081}, 0x20000081) connect$l2tp(r8, &(0x7f0000001c80)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x0, 0x1, 0x3}}, 0x2e) r11 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001cc0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r11, 0x6, 0x1f, &(0x7f0000001d00)='tls\x00', 0x4) syzkaller login: [ 149.589495] IPVS: ftp: loaded support on port[0] = 21 07:02:25 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6e3f, 0x802) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x2) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x102, 0x6, {0x4, 0x10000, 0x3f}}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0405405, &(0x7f00000000c0)={{0x3, 0x3, 0x7, 0x3, 0x101}, 0x101, 0x2762, 0x6}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={0x0, 0xfffffffffffffffe, 0x30, 0x5}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x2e00000000}, &(0x7f00000001c0)=0xc) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) accept4$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)={'veth0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a40)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000bc0)={@loopback, 0x0}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000c40)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000001f80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001fc0)={'team0\x00', 0x0}) recvmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000002000)=@un=@abs, 0x80, &(0x7f0000002540)=[{&(0x7f0000002080)=""/193, 0xc1}, {&(0x7f0000002180)=""/227, 0xe3}, {&(0x7f0000002280)=""/111, 0x6f}, {&(0x7f0000002300)=""/129, 0x81}, {&(0x7f00000023c0)=""/134, 0x86}, {&(0x7f0000002480)=""/188, 0xbc}], 0x6, &(0x7f0000002580)=""/188, 0xbc}, 0xbda1}, {{&(0x7f0000002640)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002700)=[{&(0x7f00000026c0)=""/23, 0x17}], 0x1, &(0x7f0000002740)=""/208, 0xd0}, 0x80000000}, {{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000003c00)=[{&(0x7f00000028c0)=""/161, 0xa1}, {&(0x7f0000002980)=""/15, 0xf}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f00000039c0)=""/225, 0xe1}, {&(0x7f0000003ac0)=""/54, 0x36}, {&(0x7f0000003b00)=""/251, 0xfb}], 0x6, &(0x7f0000003c40)=""/197, 0xc5}, 0x100000000}, {{&(0x7f0000003d40)=@ax25={{0x3, @netrom}, [@netrom, @remote, @null, @default, @remote, @null, @rose]}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003dc0)=""/102, 0x66}, {&(0x7f0000003e40)=""/130, 0x82}, {&(0x7f0000003f00)=""/39, 0x27}, {&(0x7f0000003f40)=""/102, 0x66}, {&(0x7f0000003fc0)}, {&(0x7f0000004000)=""/126, 0x7e}], 0x6, &(0x7f00000040c0)=""/129, 0x81}, 0xffffffffffffff81}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000004180)=""/95, 0x5f}, {&(0x7f0000004200)=""/194, 0xc2}], 0x2}, 0x7}, {{&(0x7f0000004340)=@generic, 0x80, &(0x7f00000044c0)=[{&(0x7f00000043c0)=""/245, 0xf5}], 0x1, &(0x7f0000004500)=""/141, 0x8d}, 0x5}], 0x6, 0x0, &(0x7f0000004680)={0x0, 0x989680}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000047c0)={0x0, @multicast1, @initdev}, &(0x7f0000004800)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004840)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004900)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000005080)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000005040)={&(0x7f0000004940)={0x6d8, r2, 0xa04, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r6}, {0x13c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7, 0x9, 0x7, 0x100000000}, {0x1, 0xd8, 0x3}]}}}]}}, {{0x8, 0x1, r9}, {0x138, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r12}, {0x10c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0xe000000000000, 0x7, 0xffffffffffffffc0, 0xff}, {0x4, 0x6, 0xbc, 0xffffffffffff71fb}, {0x1, 0x23c00000000, 0x401, 0xfffffffffffffc01}, {0x6f8, 0x3, 0x0, 0x101}, {0xd199, 0x2, 0x3ff, 0x6}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}]}}, {{0x8}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3de5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x600000000000000}}}]}}, {{0x8, 0x1, r15}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r16}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}]}, 0x6d8}, 0x1, 0x0, 0x0, 0x4000}, 0x1) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) fremovexattr(r0, &(0x7f00000050c0)=@random={'trusted.', 'notify_peers_count\x00'}) r18 = request_key(&(0x7f0000005100)='pkcs7_test\x00', &(0x7f0000005140)={'syz', 0x0}, &(0x7f0000005180)='GPLvboxnet1\x00', 0xfffffffffffffffb) r19 = add_key$keyring(&(0x7f0000005200)='keyring\x00', &(0x7f0000005240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r18, &(0x7f00000051c0)=@encrypted_load={'load ', 'default', 0x20, 'user:', 'mode\x00', 0x20, 0x6, 0x20, [0x7b, 0x75]}, 0x30, r19) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000005380)={&(0x7f0000005280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000052c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000005300)=[0x0, 0x0, 0x0], &(0x7f0000005340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x5, 0x3, 0xa}) keyctl$session_to_parent(0x12) [ 149.679769] chnl_net:caif_netlink_parms(): no params data found [ 149.737425] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.746572] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.757383] device bridge_slave_0 entered promiscuous mode [ 149.782045] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.788457] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.795928] device bridge_slave_1 entered promiscuous mode [ 149.840280] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 149.859566] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 149.871213] IPVS: ftp: loaded support on port[0] = 21 [ 149.891307] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.898857] team0: Port device team_slave_0 added [ 149.906012] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.913886] team0: Port device team_slave_1 added [ 149.920734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 07:02:26 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x3, @empty, 0x8}, r1}}, 0x38) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x58, 0x40f2, 0x1, 0x4e0}, {0xfffffffffffffffd, 0x7fffffff, 0x8, 0x101}, {0xa764, 0xffffffffffff6a54, 0x0, 0x5fd6}, {0x6, 0x0, 0x100000000, 0x7}, {0x2, 0x0, 0x7c, 0x800}, {0xfffffffffffffffa, 0x400, 0x7, 0x4}]}, 0x8) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "924c384e210af51b4c14a99c3fb21f0fca89b604"}, 0x15, 0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000026c0)={0x8, 0x0, [{0x5004, 0x96, &(0x7f0000000280)=""/150}, {0x6000, 0x43, &(0x7f0000000340)=""/67}, {0xf001, 0xb0, &(0x7f00000003c0)=""/176}, {0xf004, 0x1000, &(0x7f0000000480)=""/4096}, {0x100000, 0xdc, &(0x7f0000001480)=""/220}, {0x6, 0x94, &(0x7f0000001580)=""/148}, {0x0, 0x1000, &(0x7f0000001640)=""/4096}, {0x3000, 0x70, &(0x7f0000002640)=""/112}]}) mremap(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x4000, 0x2, &(0x7f0000ff9000/0x4000)=nil) mremap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000002800)='reno\x00', 0x5) getsockname$inet(r0, &(0x7f0000002840)={0x2, 0x0, @loopback}, &(0x7f0000002880)=0x10) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000028c0)=0x0) ptrace$pokeuser(0x6, r2, 0x0, 0xfffffffffffffff9) write$selinux_attr(r0, &(0x7f0000002900)='system_u:object_r:modem_device_t:s0\x00', 0x24) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000002940)={@multicast1, @multicast2, 0x0}, &(0x7f0000002980)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000029c0)={'team0\x00', r3}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000002a00)={0x0, @in6={{0xa, 0x4e23, 0x70, @loopback, 0x1}}}, &(0x7f0000002ac0)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000002b00)={r4, 0xa01e, 0x9c, "1bd5a8f3e478f8a8af0d2b3e2b3b9412c0b774605354df1c1a78ec5fc490c885080561a412484182a37be0d0664b20cdb8d8c4ce18da61e6e198b953e973176e888ddf13951e0f4c263cfe363c7bd3c648eca8feb8632425b9bb34ef77f73852ac7cf7de8c2842f9de453b7f584385219ed6bcd560739c7c3dc1da94d84436c524c65876b761494d23fe327052e8c9c4dc3f4030856b655001b535dd"}, 0xa4) prctl$PR_SVE_SET_VL(0x32, 0x32ed) r5 = request_key(&(0x7f0000002bc0)='trusted\x00', &(0x7f0000002c00)={'syz', 0x0}, &(0x7f0000002c40)='!keyring\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, r5) write$nbd(r0, &(0x7f0000002c80)={0x67446698, 0x0, 0x2, 0x2, 0x2, "549907ed1efa9ed2a81506d9c9ae7e940d8a87fb13bf1de465f415ed6b9c366cc60c17ffb085b2af2f6ee7bc719219b44763585141ae7a08279fbd1b5095b729f3abe960229c007428a62e5baca5b77185d08101b363250664a7d7aee909b16b24f5c37bb1564c465c7d4d4fd4738211bd23ee43aa2ec29b2e5400302275aedacb88a888b63efb7a3ad64d724c865c143a9af76256"}, 0xa5) syz_open_dev$loop(&(0x7f0000002d40)='/dev/loop#\x00', 0xc9, 0x20000) socket$kcm(0x29, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000002d80)='/dev/vhci\x00', 0x400) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000002dc0)={r4, 0x5e13}, 0xc) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000002e40)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000002f00)={&(0x7f0000002e00)={0x10, 0x0, 0x0, 0x8c21080}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002e80)={0x30, r6, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getdents64(r0, &(0x7f0000002f40)=""/37, 0x25) perf_event_open(&(0x7f0000002fc0)={0x5, 0x70, 0x8af, 0x7, 0x1, 0x5, 0x0, 0x7, 0x4440, 0x4, 0x7, 0x2, 0x0, 0x1ed, 0xe6e3, 0x5, 0x1, 0x1f, 0x5, 0x7, 0x2, 0x63d, 0x80, 0x401, 0x7fff, 0xa62, 0x1, 0x80008000, 0x4, 0x4, 0x7, 0x80000000, 0x7, 0x8, 0x1, 0x6, 0x800, 0x40, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000002f80), 0xc}, 0x2000, 0x9, 0xff, 0x0, 0x7, 0x101, 0x40}, r2, 0xffffffffffffffff, r0, 0x8) syz_open_dev$radio(&(0x7f0000003040)='/dev/radio#\x00', 0x3, 0x2) [ 149.941688] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 150.012785] device hsr_slave_0 entered promiscuous mode [ 150.050207] device hsr_slave_1 entered promiscuous mode [ 150.058211] IPVS: ftp: loaded support on port[0] = 21 [ 150.089998] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 150.102985] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 150.158112] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.164578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.171539] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.177992] bridge0: port 1(bridge_slave_0) entered forwarding state 07:02:26 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1f, 0x800) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000040)={0x5, 0xff, 0xffffffff7fffffff}) ioctl$int_in(r0, 0x0, &(0x7f0000000080)) write$P9_RVERSION(r0, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x200, 0x8, '9P2000.u'}, 0x15) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000180)={{0x20, 0x4}, {0x2, 0x1f}, 0xaec, 0x3, 0x7f}) write$P9_RSYMLINK(r0, &(0x7f0000000200)={0x14, 0x11, 0x2, {0x0, 0x1, 0x3}}, 0x14) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) setreuid(r1, r2) write$P9_RLCREATE(r0, &(0x7f0000000380)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x4}, 0xff}}, 0x18) renameat2(r0, &(0x7f00000003c0)='./file0\x00', r0, &(0x7f0000000400)='./file0\x00', 0x1) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x80, r5, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffd}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x8001) r6 = syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x140000, 0x400000) ioctl$BLKFLSBUF(r6, 0x1261, &(0x7f0000000640)=0x8) lchown(&(0x7f0000000680)='./file0\x00', r1, r3) clock_getres(0x2, &(0x7f00000006c0)) setsockopt$inet_dccp_buf(r0, 0x21, 0xcf, &(0x7f0000000700)="e1f4e96fd46050e3813b042cbc389a94141a4aee106a2ab015187e5d8bb0bd3e6bd18b20bd8539cecaa9e7d02d2570e20b27f29c86dafce5e05c1b11c232c8f2b3052543cd422e2690321d2cf12ee22aeadda55bd35281da815f1ff1635d8e2d6268229ae8054c5a03c29676cbbdfbcf578d2cc07e1e23042439a09a08864b233b5cd17c46df7c6a5857e0cf2e9a59a58de1aba643a5ff41d11c88418d9d555cbfdc64b0585c9e471845492e994a30e8232e64ab236c214ab20869", 0xbb) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000007c0)={r6, r4, 0x9, 0x1}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000800)=@assoc_id=0x0, &(0x7f0000000840)=0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000880)=@assoc_value={r7, 0x8}, &(0x7f00000008c0)=0x8) restart_syscall() socket$rxrpc(0x21, 0x2, 0xa) syncfs(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000009c0)={0xffffffffffffffff}, 0x106, 0xcdfa779d41aaac68}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000a40)={0xb, 0x10, 0xfa00, {&(0x7f0000000900), r8, 0x8}}, 0x18) getsockopt$sock_buf(r6, 0x1, 0x1c, &(0x7f0000000a80)=""/3, &(0x7f0000000ac0)=0x3) clone(0x100000, &(0x7f0000000b00)="aee35e9d271b6efecdbdcedf709168ea16c070bcf386dbe05a4dcedc6d51373152", &(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)="8a794f6f2e00633d06a108cbe3b7a58c765c7a69f7e49e7f5f05f8938005754b1eb24a120e8543ed2d70487ac99b80d5c586f7cd9d96ae1f6887ed2fafefaf8f9a7782b1ccce0ddeeb9eeed18dc564ddc920602ede97e2a005caadd253ee159c50d882098798d05285646e2731f645d89ae40e9d67cd235fa944bdad089de22d964f75e73c5e5ccbafd0309f99985aabd05ed1d33d8719e897d9257f482c8b1395e8307624aa907d2ee40262b4a531277b03356501de98cec611822a9114d33e6f8e520854159459aac494cce19a2e217dc7bdedac17d816f6a0d793579bb0407b3c2ac255ff05db188f04ba0b5039adf56ae4ad19e9f132c331dccac69600c1c90907ea80eb085e7f1a5c3db0634a1f0b0b53d0cf4ef1c79b94ce6a3405518d91c2b77e2c8d5a693c5bd55021acc5f36a41b66e4bae204b73789384d69b18c6b542f050247e65dcbac22c7a115a95f33499b953cd54109a7b41faadaef175bd3a6767787327c57bea36b3d000b89a380972233411f003e3e64f48d417ec2ab020da101ce470b6d52a3f99e96ec3fe14293fa63b76c3b73d208db1afe5f5e81e2048c2df6240973d30c8533c53de8df7a49f39f42334443cd78e0cc58ab605067b64f3dd9fd17452c741b97c10f93bec7b04b3fe3015da6b44b87fa9ce858f9d0cc9f76e56f6236d558cfc9580d63a85341f801fdc45e1815af6d76a4c47114fd0d0a9dfe2aaf47ff90cce072d30a53d304f2219521d5d325e37e1ab7dc176e72ce29fec4b5a94d55fc21adefab7fb54e9896dcfb3db80798beb3f34ed48c833f237fe854ebc3f89368a390441ca21f3a70f8fbe2c92cf9d0e0d95ea695d12206c8408e7543192163c840dde64537deb19b5d15e5c12a72481e3ca33d57504b8eb538432ba55de30542fc9117098c2f03617a7aeb293901e5d186f49d81d52988cabf0720a83a1a3dc0e5f3e754ad3b13e8076a07645e19d08dd9aa72a687aded026a8c08cf387c9a046b53ebbcf8f9feb8a025baac2311e9684eec119f226d23cf0ecef5c8ce18a3b74571842283060fbdd9d35f670dfbb467b0b45c20be9d06d6495a5ca6dc30f665d588c0f7d6e8c530536abbe7b78ba907c36601b016f15cc8257772ee77608f6f203c346abe2f4afe9d04b0423708a7537567279aaf77690144cc3ceb8b799088fa64a8526f6bd9ed7e5186e3fef03ba1354ff9b418ceafdaff90faa34f14eb76a4a454eb47c1d2cbf55d83645f82dab0aee41e3b5e10faed033feecb77be3805733ebe09b696efaa2c2d0e0daa152a9e7b3a0ac885f77322767cc2c18704ae1899380a36e10873245ffbec71a1e1de4d7bc0d2fea070e18a5f9eac83bc0ccd4bbae9a60c4a18451f45bbab18fd76d19e81acd2ae580af79fba6e6cc61985b5e306e5d8518075011e22c62b314ca0117ed243c0e2a4751a9bebcff768ead0f839ab75e2350038e6fa658b9da0ea99a9d7222e3421584eaf147e3d57c33cd40fc4af8475a57edea197f80878c0952bbc0769cd149d648eebea65727412791c61672ccd648b42f2b9611332908af3a118fdffaf2919776c68d48b7c7c263bee90f891b8230417ebc3a20c84b2c08674f869916c706c49ba900cbaba032ca1a58f0c5e9e9f8de09cb991ca0e7d96d3007cfbf8c2033a8cf5ca6f927108d2063d8dde3ecf46bcd7c0786c1e6935ffbb57e577674fcdeb68f7c0c3b2d53f05a305aa1f1b52061add621c3e90456fc706042af9eef8310647d8cd7d526150f8fc02c9de3f98a66edd5b7c721a9597a5c80f574cd79477ad8b194fc025536e655b7a710762b9987e2db85d21f5f3244582bb6ed1d42e1c79e2ed3b41767e5ac61d84ae053b1deb2d2b46f74f4a28e97ad5263c5eb0b123a81292ada066fdd146e938e2f178edefa793644cc5bdc4e9721e2d74121b78fe232859d902bb6fe96cbbfa06fe86b0a700023caccc3f375433b1e4f6646e937839f564b3f9297f733a3105e42895c5c72e8b84b92d017afc4a254908f47386394f0559adfe6df6f9f90063997750911472a666d338b1295507c231dec32e38736f7b879b67fd090c8504a6ce8a1bbc2b05bd4bb3b61136399e888dc65903298d642bc85f1f7e7f00d7854e199e289d01f7ad3772e9aa607efb0e16a135184a613c56408df2eeed671eaa6617f074e1cb68b60e3dafbc01d5004729b7ecc845b848ef0f42bcb09286e0524ff719bb8a2a568237fc810d1187584cff132fb21dcc433812e6b1bdb6eef3009b0943448902b41d13b0d066822f1de6faa7c54549d0941cadf02885a52dc45306572f880dbdfe5c0f444e9e4910c40665d1391cbae1ff5ea1511af9870a9107b1a995e8d448f71896fcabf192400865ed0d4df5ba532bbd776f1eaf759d655696a025c1d8018c41cebab130fe71fd9a2961991689ba8bef0f3b6ea53d5f90f6633a707b413c8b4b4f29a7fcbfd992fa0d005ff69c2874c04d487e701452db44079a14e792b77e00d55a192dec15d3e7f23a02503bd78efd6797155aa33275389be4dff46ef748fcceac9c5c24dd22668fdd7f3042cd345076c1e074eb078815f148c33ece5085bb0b3dd2f210598cf48d49d601fc90623f4fa55ee25e1a835b06cd52c8687c99aeb4950147455ca6f267d7d0d7bc369dcd6cd3d633c4e77a8858021a7eedc7fe4c69cff61bb9faa08fb1e83b4d9477a0eb9750cabce91f3e48a47b0c4707e81d4655f09b43d301efb744105a571c7c5b99c6475399d2e9294148ee863bd561f69ffa3d2cd388f7ab92daa8cbaecffb29d61ac176211a6b3de7a117e859bd89ccc88bcb7a9609610175ecc7a913f38b31e00f3843176fea0a98de35a625bdcab409796a59f97c6e88244d0c0d9b20e1ccc7aed3b80017e5164781699aa374ae7df5c090583ebfab04b7175f031877ce72c09836a9a568a9e1c93519f93b6b587a70143cd326be899005dc4a5bfccc228c4e0a2abc5202f7decb0e2b727303f43d99b2394fcf515928a9fc4bd59d3994c2da2ca773febe53f71d0a585cb2a324ec9c0b0c9fe808d53ea44044ca602736a6fd8f268098929a5cf076dba3b567fb09d8e8285dec44316c2d6bd43d1a034b10302d07ae4232d6127ac08754e369c0996f4a96ade5c8e0d023f90e23d00c697ea48012c2c2014d5ab1e9fa20c96cbe57291a596fcf41de61a3b8da34933bbce86e19a6c50190aa78c31f82b07d5ceaa3c8ecab29e567784ff7961c2b6088e9782b789809df86e1b51ec472cde5acad238b826004b682058f4fa91a80146e008d8d213f45858e409167e187da54450319b1ea3023697efba3eed995008553d018b7c892bcf78989cda7aff131feb43a2361a823489877d6efd105108bae5a92e1a530c783f2f1d681b49edc40448472819186b903a8cbd0ca86ea89989f8fd785635dfb717aff90fb3ffd138398b0bce1b23b6228a0e22f9eda4a5cdd9055da2a498e470abbf6c79c72fabe9c9596acf9c4c53e5ef39ee9c87a52916f1119f79e064320da72dd43793826038d11980ab5e874863e7ccca1cd0c9a2537c5410da9fe89e50648ee7027061ec5213c7b58f33e5eb4faa8037061bcd379d9dcf9a8746a004044fcce80c998d62c5800c27f797268957b82d722748fc790118de0c6733e5cf8811f11bfed205781644dae2ac919489bc55ef69fc68e3f8a9bcdef76e318ea2d579353899472248fbace5007d99212128c295601be1aa3ad9c52d08101d2356023507d9e1e614a9fb3f05cc888b245890633ae069d9903a1e4c803073319d8306e7c52bd99ff90e3b4f3e7fa57999031122ff48fa6c78a49104fbb4d0afbdce7c42b98c0ea9d05bcdfe1849373ec72de066c051f7198ced05bc63a6987167c492d0d4795f6d2c2af54023606839902d308e3581bf7b97ce073b4484f08451ef51ed11729a243d83ddaafc04ad68216d7c15a8a4a9d92da4bef34879b8920360cf72d7e15fb2244386d33ad9317cf00be361ded9ea4b2a6f9fc547a412409853b677cd021e46e89f8697e4c37ff9d97bcc7c2fd7363a60a9c24affa8688e2c01d9d65f96f52d600e007f8b8934fdfc41402bf1ba3713a9e4ff043a7c833523a1bf2030b0b20728d719338fff40c84324a16a555fcddc78bcaa41200ea45b9e18b0e84844f7e7f10ddf639cb1cb92d5a0ba9dd77f6ac7384a17918d400a2102c4d289bb9c22746c8bc37c489eeaea31f15803bf278a1ffad816b2a846638a4a406c1084286d400650f14e048bbfb1ddf7fe1f8de121cd16c6b3ee3e9bb69e184745df874434bf4ccf079246129f133a7379600f0a603eca0b5de3079fa9464d92183c82226cd885176e175d171604e5e94f0960746905dc3a359873b3b995aefeb31035156c6dac6341b845f2039988fc3a8242ead2e7e83b1bdaa8bf6367972ae05a6431489726b2bd8a008edb4e797bab5a0d65b2c365feacd01a13cfd50100910d14fe54c4756e650c2b3114aabe7a5aec9358f9ae812af0f740f7332698cc3692865431d3558f018523cca039e55a6e9f5244acdae09bcabe5b0ae25934aa19f0d670c78c1034f6fc910bd92c422a8767ead67dcdaf4651f18558bc0e4033265fdca10e9ec8f6181b7f31d287e2daa4a6f1ed02fd7a259c717e77bd5d35e3dec34b67811adc5116f26de3154fa12a6a442881b1ad63ddd4034617c15ce2b6b533ec1eb33099970a762c3edd71732ef9d98d793bf8c68ad4d1bdf6887dc878b92482bfe19530d27b58f8dbed4ac2de8ce892f590043bb39e853c35775488d9e94bf4dd0f106bc6e518df562885d4133f89ff0e0a753ce4a50503b821dfae49ed823c6d18d607ecd1e6aa4b8fc0e1e4616fe7ff497f341434acb03d72acfd74f228eeb29ee14d07c2d5babff00ca16449656abc8e917c17da002d8c5bcc3abf30cd3647720de9e11b56479007df9b75d60baa0e8370710f3830791540fcce024bb7189cdea5a4c879e1f0c521ff32e29e7cbfa97e875b7337382a238d70a093c3edeae8d5f40b5a883923490993fdef81b542b52fb965f3e3a3327804181473b426e14af61d39275a1ca23102f34d3bba755b773dae08b04ab3bd90c928b2e03e7e02fbb94249b7d8d85d7da76675c6984705a38df75ce4c0b9f4ae7a069107be142cc7b4ddd34346e597db49b1c7023af956541bd91bc9a9edb7899c7518ed4fc1ab6be68f8daafb031c1abc06c9fe524ef6a572f4113c84449a64e13ebf94f59785536cf6e275cc7a9fb4d6fba837f63513c099861d69e16a941e26873682bfad97b254b44439a2da8f09dad447e61a3e33e80bd80b95b23569176509df2c83ea09ffd2f8dfd61b64628dbfff7729eedf0f124a5fcf95bfbad823ecbacc697425d1f17dd3165cf85b05ca5d72ca0e33163197c2b690d618e44305a33e3d17df582609423fee5bef74af0ba447439bda9efd5e18a5638a18df755e3f4326749b9616691506a420ccc9e48f17ab035687306c04f83368e62857501adadc49548ae3ae86be694972d62d9d0afe1b30fc4ce695de7418bba7478dfc59372c687c3527170a84b571263fd62b95fa10a312c6dd3ae764ad1a617cb9f9a598857f8222d40dd83ba2c68c957d2087aea41d4b7c888c1658a7a980fb08b016085fd59283eb1222d1054c0381c1c1bca3fb9a750bbebba2289199e93fa692b0e9891e356856ac4cbe12c5dc7b5c81f9d846ee419c6ae9537e070d1383cca2d53abc736a51dc91aef49866926a7a79c8308e1f15cedfe25f83f9eaf05d25e760979832fb") [ 150.242179] chnl_net:caif_netlink_parms(): no params data found [ 150.309656] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 150.315855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.333999] chnl_net:caif_netlink_parms(): no params data found [ 150.362535] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 150.390476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.409621] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.432078] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.450133] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 150.469849] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 150.475923] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.492578] IPVS: ftp: loaded support on port[0] = 21 [ 150.503831] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.511457] bridge0: port 1(bridge_slave_0) entered disabled state 07:02:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x410000, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast1, @rand_addr=0x800}, 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400402}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x829}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x20000000) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000001c0)={'ah\x00'}, &(0x7f0000000200)=0x1e) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) write$P9_RGETLOCK(r0, &(0x7f0000000280)={0x30, 0x37, 0x2, {0x2, 0xe811, 0x20, r2, 0x12, '/proc/capi/capi20\x00'}}, 0x30) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000002c0)=r0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000300)={0x9, 0x14af, 0x3b2, 0x101, 0x0, 0xfffffffffab89191}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) setxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) ioctl$VIDIOC_ENUMSTD(r0, 0xc0405619, &(0x7f0000000440)={0xfffffffffffff58e, 0x40000, "354d5abc4363ac674646b82214c32981f7f486cd7446d574", {0x1, 0x4}, 0x6a}) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000480)=0x3f) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000600)={@multicast2, @remote, r3}, 0xc) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000640)=""/78, &(0x7f00000006c0)=0x4e) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000700), 0x4) r4 = inotify_add_watch(r0, &(0x7f0000000740)='./file0\x00', 0x4) inotify_rm_watch(r0, r4) ioctl$TIOCSCTTY(r0, 0x540e, 0x10000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000780)=0x88, 0x4) r5 = syz_open_procfs(r2, &(0x7f00000007c0)='net/igmp6\x00') fcntl$addseals(r5, 0x409, 0x8) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000800)=0x3) ioctl$UDMABUF_CREATE_LIST(r5, 0x40087543, &(0x7f0000000840)={0x0, 0x4, [{r5, 0x0, 0xfffff000}, {r0, 0x0, 0x1000, 0x14000}, {r5, 0x0, 0xfffffffff0010000}, {r0, 0x0, 0x1000100000000, 0x4000}]}) r6 = add_key$keyring(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$assume_authority(0x10, r6) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000940)={0x0, 0x4}, &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f00000009c0)=@assoc_id=r7, 0x4) openat$vfio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vfio/vfio\x00', 0x400, 0x0) [ 150.518793] device bridge_slave_0 entered promiscuous mode [ 150.544107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.553252] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.559663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.569435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.577185] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.583578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.626365] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.637034] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.645957] device bridge_slave_1 entered promiscuous mode [ 150.677357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.686676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.694591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.716124] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.723465] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.740250] device bridge_slave_0 entered promiscuous mode [ 150.752245] IPVS: ftp: loaded support on port[0] = 21 [ 150.760351] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.766777] bridge0: port 2(bridge_slave_1) entered disabled state 07:02:27 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8000, 0x200) ioctl$UI_END_FF_UPLOAD(r0, 0x406055c9, &(0x7f0000000080)={0x2, 0x80000001, {0x0, 0x7, 0x2, {0x7, 0x8}, {0x6, 0x3}, @ramp={0x7, 0xfd, {0x5, 0xff, 0xfc54, 0x9e}}}, {0x57, 0x7ff, 0x2, {0x7, 0x3ff}, {0x80}, @period={0x0, 0xfffffffffffffd26, 0x6, 0xffffffffffffffe0, 0x8, {0x4, 0x1f, 0x0, 0x10000}, 0x9, &(0x7f0000000040)=[0x86, 0x64356c7f, 0x7, 0x1, 0x5, 0x1, 0x401, 0x6, 0x3]}}}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/igmp6\x00') r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x80000, 0x0) write$P9_RWRITE(r3, &(0x7f00000001c0)={0xb, 0x77, 0x2, 0x4}, 0xb) write$P9_RMKNOD(r3, &(0x7f0000000200)={0x14, 0x13, 0x1, {0xc2, 0x2, 0x8}}, 0x14) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0485510, &(0x7f0000000380)={0xfffffffffffffff9, 0x5, 0x9, 0x80, &(0x7f0000000240)=[{}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000400)=""/4096, &(0x7f0000001400)=0x1000) fallocate(r0, 0x8, 0x5, 0x5) r4 = syz_open_dev$adsp(&(0x7f0000001440)='/dev/adsp#\x00', 0x8001, 0x2200) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000001480)={0x1000201e}) prctl$PR_GET_TSC(0x19, &(0x7f00000014c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001500)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000001580)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib={0x1b, 0x20, 0x7, {"ff4dc1df1c8fb785d11d81b476158c1d"}, 0x7, 0x7, 0x561}}}, 0x90) r6 = open(&(0x7f0000001640)='./file0\x00', 0x240000, 0x0) write$FUSE_INTERRUPT(r4, &(0x7f0000001680)={0x10, 0x0, 0x5}, 0x10) setxattr$trusted_overlay_upper(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='trusted.overlay.upper\x00', &(0x7f0000001740)={0x0, 0xfb, 0xc5, 0x3, 0x100000000, "433e590c57940eabb71b7199a3244f8e", "0766e74f0e4935206814025fbb5cc908f38c5b15515a321e48f017e01e1a7af9180f0f477db4632f34e8aba54bf3b60e1144640fd3da6c899d28d96037ddff5a29057d78f6cd7bbfb41c1de539304c695f0e8da75a6b82f82e946eae7726b1f722195ec1a75e96dff37bc7a480f2f7a0a823fbf0928460722e4e550edb9ce3b15a6e9037f67e34327e0c42687c00c0ec2df3b3a0395b1a87bbcb3ef2cb779e81cd7fa8ecb7531c6d9ad43ac1fe48b37c"}, 0xc5, 0x3) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000001840)=@assoc_id=0x0, &(0x7f0000001880)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000018c0)={r7, 0x3, 0x10}, &(0x7f0000001900)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000001940)={0x1f, 0x10000, 0x800, 0x6, 0x21, 0x1, 0x5}, 0x2c) syz_open_dev$sndmidi(&(0x7f0000001980)='/dev/snd/midiC#D#\x00', 0x100, 0x400) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000019c0)={r8, 0x1d8, 0x8c48, 0xffffffff, 0x960, 0xfffffffffffffffd}, &(0x7f0000001a00)=0x14) wait4(r1, &(0x7f0000001a40), 0x40000003, 0x0) r9 = add_key$user(&(0x7f0000001a80)='user\x00', &(0x7f0000001ac0)={'syz', 0x1}, &(0x7f0000001b00)="d074dd1d880f86666ef84a35397a6cde789b2588c6c6357f93f566e38af997f3ed0429d279d03225e94cabfccb1d0d4b2a8e200467d1ceab6447aac90ed8b344b04fd2a636610c0f184fa661a4b0c4b8b036f2ab2a8c3771d968c39b3841d3667996ab715e57a2", 0x67, 0xfffffffffffffff9) keyctl$revoke(0x3, r9) ioctl$KVM_SET_CLOCK(r6, 0x4030ae7b, &(0x7f0000001b80)={0x6fffb317, 0x8}) r10 = syz_genetlink_get_family_id$fou(&(0x7f0000001c00)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x3c, r10, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001e00)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001d00)="8adf89979aa1a109301e4044c2d6974e1709a64b709eaee59d69c9e2054d5ab5899cadabc23d50a493dc187885fe643bd2693167dec0a3ef0bca6d0625a2bb58595aee9cbd1197e408b619a913deb618d3043ba954d5d73b024aab6a36df62a6f4ce140ef85b3700005c35df19da598378669f197f5e8ce1d4a6edc3dd6e24a6721503a37e01b8e504665d66f5c2bf0699af20fdf335d52880436ecfde830e8bcf8733a85d1efa6fe9303960e6c308d6f7d1d39c76a8cd8be2bc6c90e1f4dff30d4e953869ed8db12528399b3433cad681f511c91c399c7537102b888efe261a5bf7da37c000466020f4665e", 0xec, r2}, 0x68) [ 150.780891] device bridge_slave_1 entered promiscuous mode [ 150.798559] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.808734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 150.835402] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 150.855357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.863569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.878129] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 150.885691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.888263] IPVS: ftp: loaded support on port[0] = 21 [ 150.902574] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 150.918203] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 150.939460] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 150.953782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 150.994319] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 151.001949] team0: Port device team_slave_0 added [ 151.015383] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 151.023096] team0: Port device team_slave_0 added [ 151.031712] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 151.038827] team0: Port device team_slave_1 added [ 151.045447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.055030] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 151.062384] team0: Port device team_slave_1 added [ 151.067626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 151.091176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 151.098320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 151.155741] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 07:02:27 executing program 0: syz_emit_ethernet(0x2a7, &(0x7f0000000cc0)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) [ 151.207882] Unknown ioctl -2146391550 [ 151.216857] Unknown ioctl -2146391550 07:02:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x0, 0x0, 0x1f, 0x0, 0x100000000}) futex(&(0x7f0000000040)=0x1, 0x8c, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x1, 0x2) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 151.262361] device hsr_slave_0 entered promiscuous mode [ 151.289716] device hsr_slave_1 entered promiscuous mode [ 151.370798] device hsr_slave_0 entered promiscuous mode [ 151.409314] device hsr_slave_1 entered promiscuous mode [ 151.461459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 151.478290] chnl_net:caif_netlink_parms(): no params data found [ 151.490081] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready 07:02:27 executing program 0: r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x800) readahead(r0, 0x1, 0x7) r1 = socket(0x1, 0x3, 0x2) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x10}}], 0x1, 0x0) [ 151.508669] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 151.530057] chnl_net:caif_netlink_parms(): no params data found [ 151.538022] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 07:02:27 executing program 0: clone(0xfffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x5, 0x2) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000001c0)={0x0, @reserved}) connect$pptp(r0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000540)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aum>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13\x8b\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa9_H\xed}\xe4\x9b\xbb\xe80x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x2710}, 0x13, 0x80000001, 0x5641}, {{0x77359400}, 0x17, 0x4, 0x4}, {{r1, r2/1000+10000}, 0x2, 0x8, 0x7}, {{0x0, 0x2710}, 0x0, 0x7fffffff, 0xfffffffffffffffe}, {{0x77359400}, 0x1f, 0x934a, 0x338}, {{}, 0x1f, 0x0, 0x7}, {{0x77359400}, 0x0, 0xa6, 0x8000}, {{0x0, 0x2710}, 0x17, 0x0, 0x2}], 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./bus\x00') open(&(0x7f00000000c0)='./bus\x00', 0x47b, 0x0) [ 151.681697] chnl_net:caif_netlink_parms(): no params data found [ 151.707278] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.718847] bridge0: port 1(bridge_slave_0) entered disabled state 07:02:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4}}, &(0x7f0000000000)=0xe8) connect$can_bcm(r0, &(0x7f0000000200)={0x1d, r1}, 0x1) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x3f, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "97e05e10c95fbe8a"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) [ 151.727131] device bridge_slave_0 entered promiscuous mode [ 151.746235] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.754662] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.763890] device bridge_slave_1 entered promiscuous mode [ 151.789966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 151.819008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.827710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 151.835635] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.842374] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.850213] device bridge_slave_0 entered promiscuous mode [ 151.878198] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 151.892031] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.898370] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.905859] device bridge_slave_1 entered promiscuous mode [ 151.924605] bond0: Enslaving bond_slave_0 as an active interface with an up link 07:02:28 executing program 0: r0 = socket(0xa, 0x5, 0x2) delete_module(&(0x7f0000000000)='mime_type\x00', 0x200) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'hsr0\x00', r1}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r2}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b32a1c94585526540488", 0xe, 0x0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a45323, &(0x7f0000000100)={{0xea, 0x8}, 'port0\x00', 0x10, 0x44, 0x7fffffff, 0xc5, 0x40, 0x35f, 0x3, 0x0, 0x1, 0x1}) [ 151.939600] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.958201] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 151.966244] team0: Port device team_slave_0 added [ 151.973556] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 151.999257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.006215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.020075] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 152.026131] 8021q: adding VLAN 0 to HW filter on device team0 [ 152.037663] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 152.045804] team0: Port device team_slave_1 added [ 152.065737] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 152.073360] team0: Port device team_slave_0 added [ 152.084967] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.094948] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.103016] device bridge_slave_0 entered promiscuous mode [ 152.114328] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.121847] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.129722] device bridge_slave_1 entered promiscuous mode [ 152.140985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.153378] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 152.160993] team0: Port device team_slave_1 added [ 152.166967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 152.176564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.182934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.193884] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 152.203840] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 152.212803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.220749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.228236] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.234604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.241764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.248784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.259471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 152.274243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 152.286773] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.352005] device hsr_slave_0 entered promiscuous mode [ 152.399466] device hsr_slave_1 entered promiscuous mode [ 152.474222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.482605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.490431] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.497008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.508407] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 152.517162] team0: Port device team_slave_0 added [ 152.523273] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 152.533047] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 152.539749] 8021q: adding VLAN 0 to HW filter on device team0 [ 152.546081] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 152.613679] device hsr_slave_0 entered promiscuous mode [ 152.669703] device hsr_slave_1 entered promiscuous mode [ 152.730275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.737253] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 152.747968] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 152.755269] team0: Port device team_slave_1 added [ 152.761615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.768717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.775818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 152.787771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 152.795785] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 152.802953] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 152.811879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.818983] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.827742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.835780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.843660] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.850042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.856821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.864931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.882432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.890765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.898323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 152.906383] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.914415] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.923566] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 152.936205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 152.944239] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 152.953509] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 152.974126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.984770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.992617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.000580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.008134] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.014483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.023392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 153.061738] device hsr_slave_0 entered promiscuous mode [ 153.109471] device hsr_slave_1 entered promiscuous mode [ 153.159324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.166973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.182323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 153.192063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 153.200071] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 153.207171] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 153.215115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.222885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.230633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 153.240074] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.246072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.266522] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 153.275667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 153.290250] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 153.297127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 153.304974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 153.312665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 153.320320] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 153.333168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 153.344156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 153.352370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 153.362902] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 153.383444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.391690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 153.399183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.406587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.423379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 153.433436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.443725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.454443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.464111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.471679] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.477667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.487699] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.496866] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.512247] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.518418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.534981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.546107] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 153.557750] 8021q: adding VLAN 0 to HW filter on device team0 07:02:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000)=0x10001, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r1 = dup(r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x0, 0xfffffffffffffffb, 0xe2, 0x607, @scatter={0x1, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/163, 0xa3}]}, &(0x7f0000000200)="d69f147f3616b9e1eedcf1a6f395a438cc00fc6f8c8ef1e43fb7b970e552f3a8b46f981b5f5a168a9911e50cc1af079dd43148604541b187a67cf1081f2ee32716c6a6acef2e82f5fa5931a5895537e7a63f20851ebd0a558fef24d08115f8b0b9cf06a4f2a89f906fabde0d89af2a9d8a338fcb4049aedbfb8a523c82d9f79b11b19ffc90ac7bc12f6312b7ba8ffe1fd4fbbc7e677dd447579fd7a1fd8fa687e5e4acfaf2c5d5f59d0011396b002984d7ee987e8b65d2d3c60a94a1634430fd2bf519dcf3582346d159fab3e2dff975c5c021e3696cbae4039a3d3bf156efd7e21d", &(0x7f0000000180)=""/38, 0xffffffffffffffe9, 0x10004, 0xffffffffffffffff, &(0x7f0000000300)}) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2, &(0x7f00000001c0)=0x7, 0x4) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) [ 153.570395] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 153.579905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.589705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.596586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.605083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.613829] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.620225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.628250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.635843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.643991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.662766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.677634] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 153.684818] 8021q: adding VLAN 0 to HW filter on device team0 [ 153.696790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 153.712347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.725089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.735833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.744312] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.750695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.757744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.765878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.773452] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.779802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.786763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.800526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.822852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 153.833700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 153.853959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 153.862126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 07:02:30 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x3) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc2c45512, &(0x7f0000000800)={{0x7}}) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x4, 0x5, 0xe, 0x0, 0x0, 0xffffffffffffffff, 0x12}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x40000000) r1 = dup(0xffffffffffffffff) write$P9_ROPEN(r1, &(0x7f00000003c0)={0x18, 0x71, 0x2, {{}, 0x81}}, 0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) listen(0xffffffffffffffff, 0x20000) socket$inet6(0xa, 0x5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000001080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r4, 0x3, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"d0fda24b6d61078df1a7a8bd55d8ddc6"}, 0x18, 0xd2d6e28, 0x5}, @in={0x2, 0x0, @dev}}}, 0x118) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @multicast1}, &(0x7f0000000600)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000640)={@mcast2, 0x48, r5}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000240)={{0x2, 0x4e21, @multicast1}, {0x306, @random="fbdf6e1f027b"}, 0x46, {0x2, 0x4e22, @multicast2}, 'bpq0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000005c0)=0x1, 0x4) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x3, 0x9ec6, 0x1, 0x2, 0x9, 0x5, 0x85, 0xffffffff00000000, 0x0, 0xfffffffffffffff7, 0x1f, 0xf93, 0x1, 0x0, 0x1, 0x136, 0x3, 0x2, 0xe77, 0x5, 0x2, 0x3, 0x9, 0x8000, 0x0, 0x9, 0x527, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x75b, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x9) [ 153.875977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.884193] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.890574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.913445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.924977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 153.933889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 153.942467] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.948606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 153.956632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 153.962461] hrtimer: interrupt took 20284 ns [ 153.964827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.975363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.984511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 154.000328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 154.008652] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 154.024702] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.035457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.046783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.058003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.059635] IPVS: ftp: loaded support on port[0] = 21 [ 154.073031] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.097015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 154.107262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 154.116479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 154.136275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 154.144019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.158849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.167093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.181133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.188709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.199763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.207227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.215250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.222986] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.229376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.238367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 154.247353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 154.309170] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.316220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.323480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.331158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.338530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.346310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.356578] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 154.363583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 154.371921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.409226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 154.419610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.427293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.435036] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.441405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.448221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.455776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.465660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 154.535678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.546678] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 154.576001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.586038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 154.595398] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 154.606409] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 154.612769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 154.663991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 154.672954] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 154.679901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.687454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.694923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.703304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.716708] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 154.728179] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 154.758545] IPVS: ftp: loaded support on port[0] = 21 [ 154.795797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 154.809778] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.816723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.824885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.852552] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 154.913598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 154.943809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.951811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.966223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 154.973527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 07:02:31 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) sendmsg$nl_xfrm(r1, &(0x7f0000000900)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x214000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="300400001c00040026bd7000ffdbdf252be4000600e000000200000000000000000000000000000000000000000000ffffe00000024e2100004e2300010a0020a02b000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="e0000002000000000000000000000000000004d43300000000000fff0000000000000000000000000700000000000000018000000000000002000000000000000010000000000000800000000000000000000000010000000000000000000000080000000000000004000000000000004000000000000000ffff00000000000000000000ffffffff09000000b3010000030000002bbd700007350000020004f720000000000000000c001c00", @ANYRES32=0x0, @ANYBLOB="0200000028001a0000000000000000000000000000000001ac1e00010000000000000000000000000a00000810000a002dbd700027bd700000000000ac000700ff020000000000000000000000000001fe8800000000000000000000000001014e2400064e2200000a00a0a07f000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="0400000000000000b7c5000000000000ffff000011000000000400000000000000000000000000001f00000000000000df0a000000000000cf90000000000000810300000000000000000000010000000101000000000000ff0f00000000000002000000b26b6e0001010100000000002c001300ac1e0101000000000000000000000000ac1414aa000000000000000000000000000000000a00000024000900a200000000000000ffffffff0000000001000000000000000500000000000000000000"], 0x430}, 0x1, 0x0, 0x0, 0x1}, 0x801) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x22, 0x3, 0xa, 0x1c, 0xfffffffffffffffe, 0x8003, 0x5, 0x118, 0x1}) r6 = socket$packet(0x11, 0x802, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r6, &(0x7f000000c7c0)=[{{&(0x7f0000000200)=@in6={0xa, 0x0, 0x5, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) [ 155.018153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.033470] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 155.048432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.114791] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 155.157111] 8021q: adding VLAN 0 to HW filter on device batadv0 07:02:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000200)=0x7) 07:02:31 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x0, 0x1, 0x0, &(0x7f0000000400)=""/156, 0x0, 0x400000000}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000008c0)={0x1, 0x0, 0x0, &(0x7f0000000700)=""/29, 0x0}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000140)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0xfffffffffffffffc) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) 07:02:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x10000000000000ea) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000080)={0xffffffffffffff99}) io_setup(0x200000000001, &(0x7f00000001c0)=0x0) io_submit(r3, 0x2000064f, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x800000000000802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f00485bc04fef7001c0a0b49ffed000000800008000800100001000000", 0x24) 07:02:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xd01, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)=""/216, 0xd8}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/166, 0xa6}], 0x3, &(0x7f0000000280)=""/29, 0x1d}, 0x12000) 07:02:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000), 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) [ 155.444964] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 07:02:31 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x121002) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0xfffffffffffffffe, 0x1, {0x1, 0x5, 0x9, 0x2, 0x18b, 0x7, {0x0, 0x3ff, 0xf7, 0x0, 0x1f, 0x8, 0x4, 0x10001, 0x2, 0x7fff, 0x6, r1, r2, 0x0, 0x6}}}, 0x90) write$FUSE_BMAP(r0, &(0x7f00000000c0)={0x18}, 0x18) 07:02:31 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x4) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x101, 0x40000) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x7ff, 0x7, 0x24, &(0x7f0000ffa000/0x4000)=nil, 0x2}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40186417, &(0x7f0000000080)={0x9, 0x4, 0x48cb, 0x1, 0xf, 0x10000000000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e20}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0x6}, @in6={0xa, 0x4e20, 0x100000001, @local, 0x7}, @in6={0xa, 0x4e24, 0x1, @remote, 0x8}, @in6={0xa, 0x4e22, 0x7, @loopback, 0x4}], 0x9c) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) 07:02:31 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000180)={0x100000001}, 0x8, 0x80800) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x2) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) read(r2, 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000000)={0x14000000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000200)={r3, 0x80000, r2}) 07:02:32 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) socket(0x4, 0x80000, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0xdced) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r1, 0x10, &(0x7f00000000c0)={&(0x7f0000000080), 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) recvmmsg(r0, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10040, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) [ 155.801110] [drm:drm_calc_timestamping_constants] *ERROR* crtc 31: Can't calculate constants, dotclock = 0! [ 155.957540] syz-executor1 (7691) used greatest stack depth: 19112 bytes left 07:02:34 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xbac794ab780de24a, 0x1, 0x0, 0x0, 0x3, r1}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)='lo:&\xb7`Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000000)) 07:02:34 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x121002) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0xfffffffffffffffe, 0x1, {0x1, 0x5, 0x9, 0x2, 0x18b, 0x7, {0x0, 0x3ff, 0xf7, 0x0, 0x1f, 0x8, 0x4, 0x10001, 0x2, 0x7fff, 0x6, r1, r2, 0x0, 0x6}}}, 0x90) write$FUSE_BMAP(r0, &(0x7f00000000c0)={0x18}, 0x18) 07:02:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0), 0x73) getrlimit(0xf, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000004b40), 0x36a, &(0x7f0000004bc0)}}], 0x31e9cd3487dc94, 0x20004bc0) 07:02:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000140)) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x301000) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') write$UHID_GET_REPORT_REPLY(r2, &(0x7f00000002c0)={0xa, 0x1, 0xfff, 0x9}, 0x2c6) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x4e23, 0x3ff, @mcast1}, 0x4, [0x7, 0x4, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x3]}, 0x5c) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000200)={0x9, 0x2}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)={r2}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') lstat(&(0x7f0000000600)='./file0//ile0\x00', &(0x7f0000000640)) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x5, 0x40200) lsetxattr$trusted_overlay_origin(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x101, 0x4, 0x200, 0x100, 0x0, 0x0, 0xfffffffffffffffc, 0x8, 0x100000001, 0x0, 0x0, 0x12000, 0x400000000, 0x0, 0x6, 0x768a, 0x100000000, 0xb50, 0x7ff, 0x6, 0xf7, 0x2, 0x0, 0x9, 0x2a5b, 0x0, 0x1000, 0xffffffffffff7fff, 0x61, 0xc013, 0x0, 0x1ff, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x2000, 0x7, 0x5, 0x0, 0xffffffff, 0x4, 0x9}, 0x0, 0xc, r0, 0x3) 07:02:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x100, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000100)={0x0, r2}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00009abffc)=0x8, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) fcntl$setpipe(r2, 0x407, 0x1) 07:02:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) lsetxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64EXEC\x00', &(0x7f0000000240)='wlan1$cgroup\x00', 0xd, 0x2) fstatfs(r0, &(0x7f0000000000)=""/217) 07:02:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1, 0x6, 0x4, 0x1, 0x0, 0x6, 0x0, 0xe8}) mq_unlink(&(0x7f0000000100)='eth0\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x23) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012cbd70309ffb47ebf7ab5e5fdbdf250100000008000500020000000c00020008000b0002000000"], 0x28}, 0x1, 0x0, 0x0, 0x20004811}, 0x8000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) close(r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr=0x80, @in6=@dev={0xfe, 0x80, [], 0x13}, 0x4e23, 0x0, 0x4e24, 0x7ff, 0xa, 0xa0, 0x80, 0x36, r4, r5}, {0x7, 0x40000, 0xfffffffffffffff7, 0x5, 0x81, 0x1, 0xc3c9, 0x7}, {0x1, 0x0, 0xff, 0xff}, 0x3f, 0x6e6bbc, 0x2, 0x0, 0x2, 0x2}, {{@in=@loopback, 0x4d5, 0x6c}, 0xa, @in6=@local, 0x3507, 0x5, 0x3, 0x8, 0xffffffffffffff7f, 0x9, 0x2}}, 0xe8) 07:02:34 executing program 1: r0 = socket(0x22, 0x2, 0x200) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 07:02:34 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x400caeaa, &(0x7f00000000c0)={0x0, 0x100000001}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x98f904, 0x0, [], @p_u32=&(0x7f0000000100)}}) 07:02:34 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) r1 = getpgrp(r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) setpriority(0x0, r1, 0x10000) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x80000) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000100)) timer_create(0x4, &(0x7f00000002c0)={0x0, 0x35, 0x732f4f590a782d34, @tid=r1}, &(0x7f0000000380)=0x0) timer_gettime(r3, &(0x7f0000000440)) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x2) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f0000000500)=""/16, 0x10) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0xe24}, {0x2}]}, 0x14, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000280)=0x12, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[0x0, &(0x7f00000003c0)='\x00', &(0x7f0000000400)='security.capa%ility\x00'], &(0x7f0000000ac0)) 07:02:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) socket(0x0, 0x803, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1ffffd, 0x20) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000003740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000180)}, {&(0x7f0000000200)=""/88, 0x58}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000000440)=""/149, 0x95}, {&(0x7f0000003540)=""/141, 0x8d}, {&(0x7f0000003600)=""/35, 0x23}, {0x0}], 0x8, 0x0) epoll_pwait(r1, &(0x7f00000038c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000003840), 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = getpid() sched_getaffinity(r4, 0x8, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000500)={0x1, 'ip0\x00'}, 0x18) unshare(0x40000000) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create(0x3d0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000300)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001200e7ef007b0000", 0xc, 0x0, 0x0, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001800)=ANY=[@ANYBLOB="f7ffffff000000000000000000d014a439117a164a3251fe0130452ce25743f16335c3e5b1deb0d0bbd5882e59a9caf96f4d44f8e277b6a9ef2e58a4f5a5fdc1bb6a264471c2d23daf46c497c1ab1dcacfb6b5020489cf457b83144bf90cc34b32af3e120810ac1a95abbe8679ae8264d3e473a0148952d1c686a094ea5f314df84ea4289119bf01ad55bd9d76f27ffff222d1fda604236d2ac0325e6f95be50d3acafb8441d33adf7cbd73863813df88a9feaae580beddd29ad94d8f13df130c19f4058260341b1bfe202e090b736871c17a77104f45cb1f52710aee2d5750c51e0c1098ced6cd1c8d054f067"], 0x1, 0x1) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000003880)='/dev/ppp\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x0, 0x0) syncfs(r0) ioctl$EVIOCGMASK(r6, 0x80104592, &(0x7f00000000c0)={0xfffffffffffffffd, 0x81, &(0x7f00000019c0)="19f50daef4fe07e6541a6d7b717f7891ed9d61b20b1537c3a60f87898a13da79e5ed973de67eccd61ac94c66c52e6a7891029742b3b87285052b4cebb0832b76ac6bf6def9b3a2917dee93a9e27cf7050294fd7a815652ceca41eaa3aaa3e52227235bba6f483ff9d4a6eddd8b080982e4761ff2ba5d7223091f28f908e63701f9"}) getdents(r0, &(0x7f0000000040), 0x88) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f00000003c0)={0x0, 0xf4f, 0x2, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffb}, {r2, 0x0, 0x971}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x1) ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e20, @empty}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)='veth1_to_bridge\x00', 0x3, 0x10, 0x3}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r7, 0xc0605345, &(0x7f0000000340)={0x2, 0x2, {0x3, 0x3, 0x100, 0x0, 0x20}}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f00000017c0)={0x4, &(0x7f0000001540)=[{}, {}, {}, {}]}) 07:02:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1, 0x6, 0x4, 0x1, 0x0, 0x6, 0x0, 0xe8}) mq_unlink(&(0x7f0000000100)='eth0\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x23) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012cbd70309ffb47ebf7ab5e5fdbdf250100000008000500020000000c00020008000b0002000000"], 0x28}, 0x1, 0x0, 0x0, 0x20004811}, 0x8000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) close(r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr=0x80, @in6=@dev={0xfe, 0x80, [], 0x13}, 0x4e23, 0x0, 0x4e24, 0x7ff, 0xa, 0xa0, 0x80, 0x36, r4, r5}, {0x7, 0x40000, 0xfffffffffffffff7, 0x5, 0x81, 0x1, 0xc3c9, 0x7}, {0x1, 0x0, 0xff, 0xff}, 0x3f, 0x6e6bbc, 0x2, 0x0, 0x2, 0x2}, {{@in=@loopback, 0x4d5, 0x6c}, 0xa, @in6=@local, 0x3507, 0x5, 0x3, 0x8, 0xffffffffffffff7f, 0x9, 0x2}}, 0xe8) 07:02:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x101, 0x9, 0xffffffffffffff81, 0x1, 0xffffffffffffffff}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local}], 0x10) 07:02:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0xb3) setns(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x6, {0x7, 0x1c, 0xf086, 0x10, 0x4, 0x6, 0x80, 0x7}}, 0x50) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) 07:02:34 executing program 3: r0 = socket(0x11, 0x2, 0x9) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x10}) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x1}, 0x4010) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDENABIO(r1, 0x4b36) shutdown(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) r3 = socket$inet_tcp(0x2, 0x1, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x402002, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xd4ed, 0x2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') modify_ldt$write2(0x11, &(0x7f0000000300)={0x1, 0x1000, 0xffffffffffffffff, 0x0, 0x401, 0x1dd, 0x249, 0x0, 0x4000400000000000, 0x7fff}, 0x10) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x111080, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000380)=0x17) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20408}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="18000000", @ANYRES16=r5, @ANYBLOB="0c022abd7000fedbdf25110000002400030008000800d500000008000400ff030000080007004e2400000800010002000000"], 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\b\x00', 0x101}) 07:02:34 executing program 1: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000500)='logon\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000580)="6f754bb84cd1c0719759f3eab75ff74659389faaa962c7d0a4ce7cdf3f9f82cc6a6cb66cfe21", 0x26, 0x0) r2 = request_key(&(0x7f0000000640)='pkcs7_test\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)='\x00', 0xfffffffffffffff8) keyctl$search(0xa, r1, &(0x7f00000005c0)='rxrpc\x00', &(0x7f0000000600)={'syz', 0x2}, r2) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0186416, &(0x7f0000000180)={0x800, 0xffffffffffffd71e, 0x8000, 0x81, 0x4, 0x4}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x2c) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) fcntl$addseals(r3, 0x409, 0x0) r5 = accept4(r4, &(0x7f0000000040)=@nl=@proc, &(0x7f00000000c0)=0x80, 0x80800) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000002c0)="53024accc94c3f2510ecd39d0c121ad6d934813b00ab4e7ba479d2424d3be713ad9a71d36d994986532484cf9765e4b8dff672de33121673f4127c4913e8d0dc7daec377f779f7a75556dfe3933144c9b8f2b61e8240aaba4beb0f3407e298a8f688c929569f53404bd200d8d0c2e7cdc2028f3491be27c6198a8f9e17db6237187bee3efa", 0x85, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000100)) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) getsockopt$inet_dccp_int(r0, 0x21, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000480)={0x6, 0x103, "ce9cbe75733e12deedf03b981e0e053d5bfa795ef083726a316eb7643a77ff76", 0x4, 0x3, 0x20, 0x6, 0x10}) mknodat(r0, &(0x7f0000000700)='./file0\x00', 0x2, 0x0) sendmmsg(r4, &(0x7f0000000c40)=[{{0x0, 0x4000000000000, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) [ 158.617238] netlink: 'syz-executor2': attribute type 17 has an invalid length. 07:02:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000220007031dfffd946f6105000000000000007d21fe1c4095421ba3a20400ff7e", 0x24}], 0x1}, 0x0) ftruncate(r0, 0x8000) recvmmsg(0xffffffffffffffff, &(0x7f0000002d80), 0x0, 0x0, &(0x7f0000002f00)) 07:02:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x400000, 0x101) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000001580)={0x0, 0x6}, &(0x7f00000015c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000001600)={r3, @in6={{0xa, 0x4e24, 0x0, @remote, 0xa4a6}}, [0x480f, 0x200, 0xe29, 0x1, 0x7, 0x2840, 0xffffffff, 0x0, 0x2, 0x5, 0x6, 0x7f, 0x2, 0x9, 0xff]}, &(0x7f0000001700)=0x100) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) r4 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4000) write$P9_RREAD(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="2c000000be47002100000074a16b38e36fbc6231c192895f73589a8bf3e0141136719977e83276a980ef9305"], 0x2c) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001480)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) pipe2$9p(&(0x7f0000001740), 0x0) setsockopt$sock_int(r4, 0x1, 0x1f, &(0x7f0000001800)=0x8, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(r5, r6, r7) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000400)=@generic={0x3, "dfb643ef1bdf412da010d4c6963f2a772df25c6bb650a3c4421cc6a60f1403e4e25201ae6e7db85f113e67301c1c6591c1a4d0c8b70ca25500b26f28153080c8be2fd86e088390e0dae11248b427016c0d2dc3e0b6498eb11b213f5dfcae56d640a94000f4615e71f4e65f818bd6ab07f64c7a953ee0e707d919e3e7326b"}, 0x80, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x20000810}, 0x0) r8 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xe49, 0xa200) fallocate(r0, 0x0, 0x5, 0x3f) pipe2(&(0x7f0000001780), 0x800) ioctl$RTC_EPOCH_READ(r4, 0x8004700d, &(0x7f00000001c0)) ioctl$RTC_ALM_SET(r8, 0x40247007, &(0x7f0000000040)={0x28, 0x1d, 0x17, 0x1d, 0x2, 0x2, 0x3, 0xa7, 0x1}) getsockname$inet(r4, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) getrandom(&(0x7f0000000480)=""/4096, 0x1000, 0x2) [ 158.883664] IPVS: ftp: loaded support on port[0] = 21 [ 158.914416] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 159.054786] mmap: syz-executor0 (7819) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 159.164422] device lo entered promiscuous mode [ 159.248796] netlink: 'syz-executor2': attribute type 17 has an invalid length. [ 159.324025] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 159.387724] IPVS: ftp: loaded support on port[0] = 21 07:02:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0xb3) setns(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x6, {0x7, 0x1c, 0xf086, 0x10, 0x4, 0x6, 0x80, 0x7}}, 0x50) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) [ 159.412193] device lo left promiscuous mode [ 159.427806] device lo entered promiscuous mode 07:02:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @multicast1}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000085a15743322472710000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x110) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x8001, 0x1, 0x3, 0x1, 0x8, 0x1ff, 0x7f, {0x0, @in6={{0xa, 0x4e24, 0x17cd, @local, 0x20}}, 0x8, 0xff, 0x6, 0x9, 0x54}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000580)={r2, @in6={{0xa, 0x4e24, 0x80000000, @remote, 0x3ff}}, 0x3, 0x1}, &(0x7f00000003c0)=0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 07:02:35 executing program 3: r0 = socket(0x11, 0x2, 0x9) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x10}) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x1}, 0x4010) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDENABIO(r1, 0x4b36) shutdown(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) r3 = socket$inet_tcp(0x2, 0x1, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x402002, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xd4ed, 0x2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') modify_ldt$write2(0x11, &(0x7f0000000300)={0x1, 0x1000, 0xffffffffffffffff, 0x0, 0x401, 0x1dd, 0x249, 0x0, 0x4000400000000000, 0x7fff}, 0x10) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x111080, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000380)=0x17) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20408}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="18000000", @ANYRES16=r5, @ANYBLOB="0c022abd7000fedbdf25110000002400030008000800d500000008000400ff030000080007004e2400000800010002000000"], 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\b\x00', 0x101}) 07:02:35 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f00000002c0)={0x2, 0x1, [0x900000000, 0x2, 0x0, 0x3f, 0x7, 0xffff, 0x7, 0x2]}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @mcast2, 0x8000}, 0x1c) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x9, &(0x7f0000000080)={'filter\x00', 0x0, 0x0, 0xa6, [], 0x1, &(0x7f0000000140)=[{}], &(0x7f0000000200)=""/166}, &(0x7f0000000000)=0x50) [ 159.656642] netlink: 'syz-executor2': attribute type 17 has an invalid length. [ 159.893033] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 160.122712] device lo left promiscuous mode [ 160.152340] device lo entered promiscuous mode 07:02:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) socket(0x0, 0x803, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1ffffd, 0x20) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000003740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000180)}, {&(0x7f0000000200)=""/88, 0x58}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000000440)=""/149, 0x95}, {&(0x7f0000003540)=""/141, 0x8d}, {&(0x7f0000003600)=""/35, 0x23}, {0x0}], 0x8, 0x0) epoll_pwait(r1, &(0x7f00000038c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000003840), 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = getpid() sched_getaffinity(r4, 0x8, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000500)={0x1, 'ip0\x00'}, 0x18) unshare(0x40000000) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create(0x3d0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000300)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001200e7ef007b0000", 0xc, 0x0, 0x0, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001800)=ANY=[@ANYBLOB="f7ffffff000000000000000000d014a439117a164a3251fe0130452ce25743f16335c3e5b1deb0d0bbd5882e59a9caf96f4d44f8e277b6a9ef2e58a4f5a5fdc1bb6a264471c2d23daf46c497c1ab1dcacfb6b5020489cf457b83144bf90cc34b32af3e120810ac1a95abbe8679ae8264d3e473a0148952d1c686a094ea5f314df84ea4289119bf01ad55bd9d76f27ffff222d1fda604236d2ac0325e6f95be50d3acafb8441d33adf7cbd73863813df88a9feaae580beddd29ad94d8f13df130c19f4058260341b1bfe202e090b736871c17a77104f45cb1f52710aee2d5750c51e0c1098ced6cd1c8d054f067"], 0x1, 0x1) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000003880)='/dev/ppp\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x0, 0x0) syncfs(r0) ioctl$EVIOCGMASK(r6, 0x80104592, &(0x7f00000000c0)={0xfffffffffffffffd, 0x81, &(0x7f00000019c0)="19f50daef4fe07e6541a6d7b717f7891ed9d61b20b1537c3a60f87898a13da79e5ed973de67eccd61ac94c66c52e6a7891029742b3b87285052b4cebb0832b76ac6bf6def9b3a2917dee93a9e27cf7050294fd7a815652ceca41eaa3aaa3e52227235bba6f483ff9d4a6eddd8b080982e4761ff2ba5d7223091f28f908e63701f9"}) getdents(r0, &(0x7f0000000040), 0x88) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f00000003c0)={0x0, 0xf4f, 0x2, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffb}, {r2, 0x0, 0x971}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x1) ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e20, @empty}, 0x20, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)='veth1_to_bridge\x00', 0x3, 0x10, 0x3}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r7, 0xc0605345, &(0x7f0000000340)={0x2, 0x2, {0x3, 0x3, 0x100, 0x0, 0x20}}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r7, 0x800448d2, &(0x7f00000017c0)={0x4, &(0x7f0000001540)=[{}, {}, {}, {}]}) 07:02:38 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x82, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'rose0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000040)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x5}) 07:02:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000000000000000000000000900000000000000"], 0x0, 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) 07:02:38 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x57, @ipv4={[], [], @multicast2}, 0x800000000000000}, 0xfffffdd0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x8, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0xeffdffff00000000) 07:02:38 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x200000000001009c) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="e5180885f503105839ad36a772187aff8c1a515e436cfe58a49b56dcc3c85ca4528c29e790f07618b456e00b884032b81171556f29b6a99d1ff436e382c7dff90c0b3299bbeb00a171a66e8edbee76e1e53bf8b4fdd15bf99b379844a43db65c3fc7ce144d448e2c3f50e1853f7dd4498ab6cc85246bf19c8c59819dd8b1e01f7e932e1f47efc9ad89c907ad28e66681c04981f3b07598626750b3d3af0e3f7a9a2479d0bd87a783b773681f6662"], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000b1d000)='.', 0x2) open(&(0x7f0000000000)='./file0\x00', 0xc0, 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='mqueue\x00', 0x1002010, &(0x7f00000002c0)='\x00') 07:02:38 executing program 0: r0 = socket(0x400000000000010, 0x802, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0xfffffffffffffea6) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=0x80000000, {[@timestamp={0x44, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) write(r0, &(0x7f0000000000)="240000001a0099f0003be90000ed190e020808160000000000ba0080080001007f196be0", 0x24) 07:02:38 executing program 4: socket$inet6(0xa, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x10000, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000001c0)={0x1000, 0x7, 0x200, 0x4, 0x3ff, 0x5c, 0x7a9, 0x7c67, 0xfffffffffffffeaa, 0xd245}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000180)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mISDNtimer\x00', 0x38f7e1ce6b4eed18, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket(0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x1, 0x1000000, 0x1, 0x0, [0x0]}}, 0x29) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x32, 0x119}, 0x14}}, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) [ 162.219343] protocol 88fb is buggy, dev hsr_slave_0 [ 162.224596] protocol 88fb is buggy, dev hsr_slave_1 07:02:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x5}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x100402}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xffffffda}}, 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:02:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000010000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x3}}, 0x20) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4004ae52, &(0x7f0000000140)=0x6ea) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x20, 0xfffffffffffffffd, 0x4, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0xfffffe5b) perf_event_open(&(0x7f0000000240)={0x0, 0x2de, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0xfffffffffffffffc, 0x0, 0x0, 0x1c00000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x41000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001700)={'team0\x00', 0x0}) sendmmsg(r2, &(0x7f0000009840)=[{{&(0x7f0000008500)=@nfc_llcp={0x27, 0x1, 0x1, 0x6, 0x4000, 0x3f, "e82705657ab6093a37364b6ea53af7335ab36d79c2b027a78a6d5f98a124251fd5082cd2bbcfc210b8eddfc5d1a296ec5d0929788156ac9bfcf4d2b55d6326", 0x20}, 0x80, &(0x7f0000008680), 0x0, &(0x7f00000086c0), 0x0, 0x1}, 0xffffffffffffffdc}], 0x1, 0x88c0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x6, 0x0, 0x7, 0x3, 0x8, 0x4, 0x3, 0x2, 0x5, 0x4, 0x40bcca1a, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = inotify_init1(0x800) fcntl$setown(r5, 0x8, 0xffffffffffffffff) ioctl$sock_proto_private(r3, 0x89e4, &(0x7f0000000500)="88057e23ac161c361d77a154619ecc1f2fcdfcb75333699416e619414a813607d9c9579932791a1b53a062c2f80336b4636b79b5a13759204dd0c39a9470502981417f9c60d5826243edd45eae69af323ec68c6cc0e8f5731119fd7903c5411342b9affe5ddae60a753d4f4321f0746f7286abee29af3b4b1deabc0d09372b4da2862fd02d7e137529300f40023d9b95958ed600505667bd9ed4be4e5ff7261dc14b712bd48d48464aa6c99d060321b213b2504517f65431e9d40d6f43bf4c8dddc8a0121542e70d0e3c485e32c77dcbfbd0de63e4bff40c83caeaccfcc71e9493f2a7") fcntl$getownex(r5, 0x10, &(0x7f00000007c0)={0x0, 0x0}) ptrace$setopts(0x4206, r6, 0x0, 0x0) sendto$unix(r3, &(0x7f00000006c0)="57833fb4c17b12e837eed7f22c3c6ed1bc5f2234817a316d9de780b678e111c3989759ea3d158fd82e9337f91528f489d718e08d022cae74f47583867b6b17e44e04eeb68133daa0d8c4b4903b6b10aa0746fdec0048a98b51cc5a872d799f0fff705e2deca4f6d54801fc110f0048355b0f33f24e14018fd7f1a9d3865ee7719e17ff5e52e5ffe37cfe8d870ab948a9cb521afc7d17ed7479c5c0ce845beea31d0fae9b9de8625d0adfb9fac5a01c864b88cb31eb1a45e8bb4f2bf5c3042846beb13022487283", 0xc7, 0x0, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/245, 0xf5) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x110, 0xffffffffffffffff, 0x24) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000440)={0x8, 0x0, 0x0, 0x1}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000100)) ioctl$sock_SIOCETHTOOL(r2, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000240)=ANY=[]}) sendmmsg(r3, &(0x7f000000e5c0)=[{{0x0, 0x0, &(0x7f000000e180)=[{&(0x7f000000e0c0)="c8d7fc6deaacfbf62a1e4ee1db31be33537901802de802eddca32ac54597c050ba128ea214c5975513365fe42c1423e521acc67dd5c772dd5c07cac81b105270dc0463d75fbc6ede18b218911862aea52262a64e31a3afa3e37032701c702e496ac825e4f2713a30ddf8ebe9e8de1300ce50d69f66a445dff9148b00d33c5c2518cb1b8cbd9f9df1071395f28ed56eace8086c4d0bff", 0x96}], 0x1, &(0x7f000000e1c0), 0x0, 0x40000}, 0x1}], 0x1, 0x4000000) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000600)={@xdp={0x2c, 0x4, r4, 0x6}, {&(0x7f00000002c0)=""/201, 0xc9}, &(0x7f0000000200), 0x1}, 0x9c) r7 = socket$inet6(0xa, 0x805, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x89f0, &(0x7f0000000140)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="10009b0eda00000000000000000000feffffffffffe6ffed484a7efc94953cc87abaee1c384936fd1c509a0000003700000000000000000000000000000000d01d96d9e625c1054d01cfceffa437b87923f1ed3792b40452f8003f00e0f4f65c23cec0510ad1294b95c08196a6b80c4028b823b7455b8be6775a23f606a0ba32985b3a29ee94eb44e4c59134bfe61d8be9ea6cbfce3cc283586f975255e562a0b07351b7aaf80deebbbae53cbdfa67bcb10fea3dddb1bfaab2ca2be248f2c5d55022a31a0f1ad6a67131de7ebcd0a4bbe1da302654e6"]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f00000000c0), &(0x7f0000000180), 0x2}, 0x20) [ 162.435668] QAT: Invalid ioctl 07:02:38 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0287c02, &(0x7f00000002c0)) write(r0, &(0x7f0000000000)="209df573364f3db54fc9e1110852fd3dc652c129439b45a49467b4a4c398bbf84f321fa776cc73011ea2150cfde1c239d775b3a771e264466faa83eb8ce6868b93a8d8b83f4f8f448b5379f99219a4aa2323e3aceafdc1fd7422b26f6b338c5d6a03b41f595c58cc1c2af7", 0x6b) [ 162.465156] ptrace attach of "/root/syz-executor4"[7598] was attempted by "/root/syz-executor4"[7887] [ 162.498824] ptrace attach of "/root/syz-executor3"[7596] was attempted by "/root/syz-executor3"[7886] 07:02:38 executing program 2: keyctl$set_reqkey_keyring(0x5, 0x3) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000200), &(0x7f0000000280)='selinux-%\x00', 0x0) [ 162.552795] QAT: Invalid ioctl [ 162.562164] IPVS: ftp: loaded support on port[0] = 21 07:02:38 executing program 4: socket$inet6(0xa, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x10000, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000001c0)={0x1000, 0x7, 0x200, 0x4, 0x3ff, 0x5c, 0x7a9, 0x7c67, 0xfffffffffffffeaa, 0xd245}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000180)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mISDNtimer\x00', 0x38f7e1ce6b4eed18, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket(0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x1, 0x1000000, 0x1, 0x0, [0x0]}}, 0x29) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x32, 0x119}, 0x14}}, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) [ 162.598153] kasan: CONFIG_KASAN_INLINE enabled [ 162.614651] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 162.646481] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 162.652751] CPU: 1 PID: 7890 Comm: syz-executor1 Not tainted 4.20.0+ #6 [ 162.660028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.669390] RIP: 0010:fuse_dev_do_write+0x1e44/0x3780 [ 162.674579] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 d5 18 00 00 49 8b 9f 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 39 [ 162.691961] kobject: 'lo' (0000000096d5f428): kobject_add_internal: parent: 'net', set: 'devices' [ 162.693481] RSP: 0018:ffff88805c0976a8 EFLAGS: 00010247 [ 162.693492] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90007de5000 [ 162.693500] RDX: 0000000000000000 RSI: ffffffff828ac8bc RDI: 0000000000000004 [ 162.693508] RBP: ffff88805c097a78 R08: ffff8880a5764040 R09: ffffed101230e940 [ 162.693515] R10: ffffed101230e93f R11: ffff8880918749fb R12: 0000000000000000 [ 162.693523] R13: 0000000000000000 R14: 0000000000000030 R15: ffff8880918749d8 [ 162.693534] FS: 0000000000000000(0000) GS:ffff8880ae700000(0063) knlGS:00000000f5f64b40 [ 162.693547] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 162.718953] kobject: 'lo' (0000000096d5f428): kobject_uevent_env [ 162.722452] CR2: 000055a18d9051d8 CR3: 000000009d301000 CR4: 00000000001406e0 [ 162.722463] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.722471] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.722475] Call Trace: [ 162.722500] ? fuse_dev_read+0x250/0x250 [ 162.722517] ? mark_held_locks+0x100/0x100 [ 162.722529] ? fixup_owner+0x250/0x250 [ 162.722541] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 162.722558] ? futex_wait+0x6e6/0xa40 [ 162.730125] kobject: 'lo' (0000000096d5f428): fill_kobj_path: path = '/devices/virtual/net/lo' [ 162.737085] ? aa_file_perm+0x42e/0x1090 [ 162.737098] ? find_held_lock+0x35/0x120 [ 162.737112] ? aa_file_perm+0x42e/0x1090 [ 162.737127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 162.745735] kobject: 'queues' (00000000e275752a): kobject_add_internal: parent: 'lo', set: '' [ 162.752589] ? lock_downgrade+0x910/0x910 [ 162.752611] ? kasan_check_read+0x11/0x20 [ 162.752628] ? rcu_read_unlock_special+0x380/0x380 [ 162.752648] ? aa_file_perm+0x455/0x1090 [ 162.752662] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 162.752675] ? rcu_read_unlock_special+0x380/0x380 [ 162.752689] ? memset+0x32/0x40 [ 162.752712] fuse_dev_write+0x191/0x240 [ 162.759279] kobject: 'queues' (00000000e275752a): kobject_uevent_env [ 162.764724] ? __fget+0x499/0x710 [ 162.764740] ? fuse_dev_splice_write+0xe10/0xe10 [ 162.764758] ? __might_fault+0x12b/0x1e0 [ 162.764770] ? find_held_lock+0x35/0x120 [ 162.772238] kobject: 'queues' (00000000e275752a): kobject_uevent_env: filter function caused the event to drop! [ 162.779283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 162.779297] ? iov_iter_init+0xea/0x220 [ 162.779312] __vfs_write+0x764/0xb40 [ 162.779326] ? kernel_read+0x120/0x120 [ 162.779340] ? trace_hardirqs_off_caller+0x300/0x300 [ 162.779369] ? apparmor_file_permission+0x25/0x30 [ 162.779383] ? rw_verify_area+0x118/0x360 [ 162.787610] kobject: 'rx-0' (000000006b358cfd): kobject_add_internal: parent: 'queues', set: 'queues' [ 162.789207] vfs_write+0x20c/0x580 [ 162.789221] ksys_write+0x105/0x260 [ 162.789235] ? __ia32_sys_read+0xb0/0xb0 [ 162.789247] ? trace_hardirqs_off_caller+0x300/0x300 [ 162.789262] __ia32_sys_write+0x71/0xb0 [ 162.789276] do_fast_syscall_32+0x333/0xf98 [ 162.789290] ? do_int80_syscall_32+0x880/0x880 [ 162.789300] ? trace_hardirqs_off+0x310/0x310 [ 162.789312] ? syscall_return_slowpath+0x3b0/0x5f0 [ 162.789325] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 162.789337] ? __switch_to_asm+0x34/0x70 [ 162.789351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 162.789370] entry_SYSENTER_compat+0x70/0x7f [ 162.789379] RIP: 0023:0xf7f68869 [ 162.789394] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 162.794729] kobject: 'rx-0' (000000006b358cfd): kobject_uevent_env [ 162.797644] RSP: 002b:00000000f5f640cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 162.797657] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000080 [ 162.797665] RDX: 0000000000000030 RSI: 0000000000000000 RDI: 0000000000000000 [ 162.797672] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 162.797683] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 162.802234] kobject: 'rx-0' (000000006b358cfd): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 162.806711] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 162.806724] Modules linked in: [ 162.821027] ---[ end trace 928f3f2ad0b01514 ]--- [ 162.824007] kobject: 'loop2' (000000006e919cba): kobject_uevent_env [ 162.837583] QAT: Invalid ioctl [ 162.848149] kobject: 'tx-0' (00000000c4b1638f): kobject_add_internal: parent: 'queues', set: 'queues' [ 162.851665] RIP: 0010:fuse_dev_do_write+0x1e44/0x3780 [ 162.855943] kobject: 'loop2' (000000006e919cba): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 162.863807] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 d5 18 00 00 49 8b 9f 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 39 [ 162.868267] kobject: 'tx-0' (00000000c4b1638f): kobject_uevent_env [ 162.869939] kobject: '0:51' (00000000632b8b08): kobject_uevent_env [ 162.875230] kobject: 'tx-0' (00000000c4b1638f): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 162.877634] kobject: '0:51' (00000000632b8b08): fill_kobj_path: path = '/devices/virtual/bdi/0:51' [ 162.877724] kobject: '0:51' (00000000632b8b08): kobject_cleanup, parent (null) [ 162.882661] kobject: 'loop0' (000000005cf84825): kobject_uevent_env [ 162.890082] kobject: '0:51' (00000000632b8b08): calling ktype release [ 162.897291] kobject: 'loop0' (000000005cf84825): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.903611] RSP: 0018:ffff88805c0976a8 EFLAGS: 00010247 [ 162.918317] kobject: 'tunl0' (00000000c5b5dfc1): kobject_add_internal: parent: 'net', set: 'devices' [ 162.922503] ptrace attach of "/root/syz-executor3"[7596] was attempted by "/root/syz-executor3"[7893] [ 162.941869] kobject: 'tunl0' (00000000c5b5dfc1): kobject_uevent_env [ 162.948464] kobject: '0:51': free name [ 162.967822] kobject: 'tunl0' (00000000c5b5dfc1): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 162.997855] kobject: '0:51' (00000000e50c38c7): kobject_add_internal: parent: 'bdi', set: 'devices' [ 163.000747] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90007de5000 [ 163.000755] RDX: 0000000000000000 RSI: ffffffff828ac8bc RDI: 0000000000000004 [ 163.000763] RBP: ffff88805c097a78 R08: ffff8880a5764040 R09: ffffed101230e940 [ 163.000771] R10: ffffed101230e93f R11: ffff8880918749fb R12: 0000000000000000 [ 163.000778] R13: 0000000000000000 R14: 0000000000000030 R15: ffff8880918749d8 [ 163.000789] FS: 0000000000000000(0000) GS:ffff8880ae600000(0063) knlGS:00000000f5f64b40 [ 163.000804] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 163.010876] kobject: '0:51' (00000000e50c38c7): kobject_uevent_env [ 163.014561] kobject: 'loop4' (000000006f02f714): kobject_uevent_env [ 163.017743] kobject: '0:51' (00000000e50c38c7): fill_kobj_path: path = '/devices/virtual/bdi/0:51' [ 163.037145] CR2: 00007f4a78307000 CR3: 000000009d301000 CR4: 00000000001406f0 [ 163.043189] QAT: Invalid ioctl [ 163.050878] kobject: 'loop4' (000000006f02f714): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 163.104208] kobject: 'queues' (00000000777dcfc2): kobject_add_internal: parent: 'tunl0', set: '' [ 163.105513] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.114531] kobject: 'queues' (00000000777dcfc2): kobject_uevent_env [ 163.123784] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.162028] kobject: 'queues' (00000000777dcfc2): kobject_uevent_env: filter function caused the event to drop! [ 163.177233] Kernel panic - not syncing: Fatal exception [ 163.206601] ptrace attach of "/root/syz-executor4"[7598] was attempted by "/root/syz-executor4"[7908] [ 163.211583] Kernel Offset: disabled [ 163.424313] Rebooting in 86400 seconds..