[ 70.033010][ T27] audit: type=1800 audit(1565153318.034:27): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 70.054098][ T27] audit: type=1800 audit(1565153318.044:28): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 70.794202][ T27] audit: type=1800 audit(1565153318.884:29): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 70.814456][ T27] audit: type=1800 audit(1565153318.884:30): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.96' (ECDSA) to the list of known hosts. 2019/08/07 04:48:50 fuzzer started 2019/08/07 04:48:52 dialing manager at 10.128.0.26:32839 2019/08/07 04:48:53 syscalls: 2484 2019/08/07 04:48:53 code coverage: enabled 2019/08/07 04:48:53 comparison tracing: enabled 2019/08/07 04:48:53 extra coverage: extra coverage is not supported by the kernel 2019/08/07 04:48:53 setuid sandbox: enabled 2019/08/07 04:48:53 namespace sandbox: enabled 2019/08/07 04:48:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/07 04:48:53 fault injection: enabled 2019/08/07 04:48:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/07 04:48:53 net packet injection: enabled 2019/08/07 04:48:53 net device setup: enabled 04:50:32 executing program 0: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x1040, 0x0) link(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00') r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0xc) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000180)={0x0, {{0xa, 0x4e23, 0x0, @rand_addr="005f41c8f96e97c3c2529f17540382c6", 0x5}}}, 0x88) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) write$P9_ROPEN(r2, 0x0, 0x10133) 04:50:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) syzkaller login: [ 184.297610][T10181] IPVS: ftp: loaded support on port[0] = 21 [ 184.330994][T10183] IPVS: ftp: loaded support on port[0] = 21 04:50:32 executing program 2: clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x39ef2cb) creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 184.488816][T10181] chnl_net:caif_netlink_parms(): no params data found [ 184.528782][T10183] chnl_net:caif_netlink_parms(): no params data found [ 184.562206][T10181] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.569281][T10181] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.577285][T10181] device bridge_slave_0 entered promiscuous mode [ 184.603334][T10181] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.610782][T10181] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.618951][T10181] device bridge_slave_1 entered promiscuous mode [ 184.632646][T10183] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.639704][T10183] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.648543][T10183] device bridge_slave_0 entered promiscuous mode [ 184.656663][T10183] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.664657][T10183] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.672492][T10183] device bridge_slave_1 entered promiscuous mode [ 184.697940][T10181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.715440][T10187] IPVS: ftp: loaded support on port[0] = 21 [ 184.729047][T10181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.740566][T10183] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.763965][T10183] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.775628][T10181] team0: Port device team_slave_0 added [ 184.785786][T10181] team0: Port device team_slave_1 added 04:50:32 executing program 3: clone(0x204, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x1050, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) [ 184.808295][T10183] team0: Port device team_slave_0 added [ 184.817779][T10183] team0: Port device team_slave_1 added [ 184.913539][T10183] device hsr_slave_0 entered promiscuous mode 04:50:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9f0000000001ac937c317eac3200000034007d30a1213aeeefff0f00000c0316a3f9dc7f6b80c9483b5e10490000d7c4c8de8caf788600"/67], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffdab) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0xa, 0x0, 0xfffffffffffffffe, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r2, 0x4) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) socketpair(0xa, 0x7fffe, 0x5, &(0x7f0000000400)) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) [ 185.012338][T10183] device hsr_slave_1 entered promiscuous mode 04:50:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8061000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, 0x0, 0x402, 0x0, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @empty}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x29}}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x40) fchmodat(r1, &(0x7f0000000400)='./file0\x00', 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000100)={0xa, 0x0, [{0x6f1, 0x6, 0x0, 0x0, @sint={0x7, 0x2}}, {0x8, 0x0, 0x0, 0x0, @adapter={0x5, 0xffffffff00000000, 0x7, 0x3f, 0x495}}, {0x7, 0x3, 0x0, 0x0, @msi={0x0, 0xf828, 0xa6f3}}, {0x650, 0x7, 0x0, 0x0, @msi={0x7, 0x9fc, 0x80000001}}, {0x7, 0x3, 0x0, 0x0, @adapter={0x1ff, 0x800000000000, 0x6, 0x655, 0x2}}, {0x3ff, 0x1, 0x0, 0x0, @irqchip={0x401, 0x7}}, {0x70c, 0x4, 0x0, 0x0, @msi={0x1, 0x0, 0x2}}, {0x8001, 0x4, 0x0, 0x0, @adapter={0xfffffffffffff035, 0x0, 0x7, 0x10001, 0x5}}, {0x401, 0x4, 0x0, 0x0, @sint={0x6, 0x7}}, {0x5e580000000, 0x3, 0x0, 0x0, @sint={0x8000, 0x72}}]}) [ 185.114310][T10181] device hsr_slave_0 entered promiscuous mode [ 185.171421][T10181] device hsr_slave_1 entered promiscuous mode [ 185.210960][T10181] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.229284][T10181] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.236385][T10181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.236544][T10181] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.250665][T10181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.269658][T10193] IPVS: ftp: loaded support on port[0] = 21 [ 185.269701][T10191] IPVS: ftp: loaded support on port[0] = 21 [ 185.281805][T10189] IPVS: ftp: loaded support on port[0] = 21 [ 185.302858][T10183] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.309938][T10183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.317303][T10183] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.324370][T10183] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.443813][T10187] chnl_net:caif_netlink_parms(): no params data found [ 185.512489][ T2821] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.520561][ T2821] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.528561][ T2821] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.535994][ T2821] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.596674][T10187] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.605100][T10187] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.613549][T10187] device bridge_slave_0 entered promiscuous mode [ 185.623278][T10187] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.630324][T10187] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.638148][T10187] device bridge_slave_1 entered promiscuous mode [ 185.656485][T10191] chnl_net:caif_netlink_parms(): no params data found [ 185.707140][T10189] chnl_net:caif_netlink_parms(): no params data found [ 185.719857][T10187] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.758171][T10187] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.769668][T10181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.777838][T10193] chnl_net:caif_netlink_parms(): no params data found [ 185.798264][T10183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.819845][T10191] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.827083][T10191] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.834729][T10191] device bridge_slave_0 entered promiscuous mode [ 185.842633][T10191] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.849684][T10191] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.857698][T10191] device bridge_slave_1 entered promiscuous mode [ 185.873773][T10194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.882495][T10194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.893453][T10183] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.914942][T10187] team0: Port device team_slave_0 added [ 185.922343][T10191] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.935768][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.943603][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.958076][T10181] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.966507][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.975281][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.983960][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.991781][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.000173][T10187] team0: Port device team_slave_1 added [ 186.007649][T10191] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.016826][T10189] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.023959][T10189] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.031575][T10189] device bridge_slave_0 entered promiscuous mode [ 186.052390][T10193] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.059452][T10193] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.067173][T10193] device bridge_slave_0 entered promiscuous mode [ 186.076005][T10193] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.083150][T10193] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.090666][T10193] device bridge_slave_1 entered promiscuous mode [ 186.108757][T10189] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.115889][T10189] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.123811][T10189] device bridge_slave_1 entered promiscuous mode [ 186.141989][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.150511][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.160757][ T2821] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.167844][ T2821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.194040][T10191] team0: Port device team_slave_0 added [ 186.201555][T10189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.213992][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.222716][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.231289][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.238333][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.245938][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.254698][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.263109][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.270147][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.277709][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.294062][T10191] team0: Port device team_slave_1 added [ 186.301069][T10193] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.353702][T10187] device hsr_slave_0 entered promiscuous mode [ 186.391369][T10187] device hsr_slave_1 entered promiscuous mode [ 186.431482][T10187] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.441737][T10189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.456701][T10193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.474105][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.482907][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.491385][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.521246][T10193] team0: Port device team_slave_0 added [ 186.534113][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.543049][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.551800][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.560104][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.568562][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.576923][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.585181][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.593060][T10195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.607157][T10193] team0: Port device team_slave_1 added [ 186.616407][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.625130][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.634730][T10189] team0: Port device team_slave_0 added [ 186.673662][T10191] device hsr_slave_0 entered promiscuous mode [ 186.721542][T10191] device hsr_slave_1 entered promiscuous mode [ 186.771088][T10191] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.783281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.791813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.799841][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.808139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.817747][T10189] team0: Port device team_slave_1 added [ 186.828945][T10181] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.840297][T10181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.902381][T10193] device hsr_slave_0 entered promiscuous mode [ 186.951420][T10193] device hsr_slave_1 entered promiscuous mode [ 187.030991][T10193] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.048166][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.056896][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.065392][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.073892][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.091586][T10183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.174223][T10189] device hsr_slave_0 entered promiscuous mode [ 187.221248][T10189] device hsr_slave_1 entered promiscuous mode [ 187.260943][T10189] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.289533][T10181] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.312467][T10183] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.398968][T10193] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.409560][T10187] 8021q: adding VLAN 0 to HW filter on device bond0 04:50:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) [ 187.484246][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.496658][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.526344][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.546503][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.566695][T10187] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.577240][T10193] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.593570][ C0] hrtimer: interrupt took 57332 ns [ 187.595473][T10191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.617861][T10189] 8021q: adding VLAN 0 to HW filter on device bond0 04:50:35 executing program 0: [ 187.627009][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.667409][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:50:35 executing program 0: r0 = gettid() sched_getaffinity(r0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0x0) timer_settime(r2, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x40) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) tkill(r0, 0x14) [ 187.715836][ T3489] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.722982][ T3489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.747028][T10221] EXT4-fs (sda1): re-mounted. Opts: [ 187.753041][T10191] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.779050][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.788015][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.797077][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.806765][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.813959][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.823358][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.832005][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.841416][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.872485][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.881783][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.895771][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.897080][T10227] EXT4-fs (sda1): re-mounted. Opts: [ 187.905824][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 04:50:36 executing program 0: r0 = gettid() sched_getparam(0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r1, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x14) [ 187.922339][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.934417][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.943960][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.952862][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.959906][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 04:50:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) [ 187.968123][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.978316][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.014513][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.035448][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:50:36 executing program 0: r0 = gettid() ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(0xffffffffffffffff, 0x0, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240)) tkill(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) dup(0xffffffffffffffff) getresgid(0x0, 0x0, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) tkill(r0, 0x13) [ 188.061566][ T3489] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.068679][ T3489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.076547][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.085177][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.093863][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.102761][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.111370][ T3489] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.118446][ T3489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.126668][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.135487][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.143982][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.152712][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.161509][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.169774][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.178719][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.187417][ T3489] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.194513][ T3489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.203334][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.212455][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.224522][T10189] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.243032][T10193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:50:36 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) gettid() getsockname(0xffffffffffffffff, 0x0, 0x0) time(0x0) prctl$PR_GET_FPEXC(0xb, 0x0) write$P9_RSETATTR(r0, 0x0, 0xfffffffffffffd65) [ 188.274417][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.282695][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.300768][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.309728][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:50:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001480)=ANY=[], 0xdea, 0x0, &(0x7f0000000600)="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"}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 188.318781][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.327505][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.336538][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.345147][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.354053][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.362664][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.371702][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.380524][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.389508][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.411491][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.433839][T10187] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.451527][T10187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.464836][T10191] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.477786][T10191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.495661][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.503870][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.512128][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.521163][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.529666][ T3489] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.536774][ T3489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.545339][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.554242][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.562991][ T3489] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.570101][ T3489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.579089][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.588604][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.598134][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.607459][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.616986][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.628772][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.637337][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.646633][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.655596][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.665238][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.674665][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.687524][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.708662][T10187] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.719639][T10189] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.740320][T10189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.765394][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.777066][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.794121][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.803053][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.816610][T10193] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.864572][T10189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.876545][T10191] 8021q: adding VLAN 0 to HW filter on device batadv0 04:50:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl(r0, 0x7, &(0x7f0000000000)="215cb22ace74161846ad78375bcbc999517994e15ce22a6f02cb06819fbc28e0348b44b3d49fcd030b74431970ccd2dcc7795c832d555521be79858ec3629c5ec8a95f43671de1cdda4237197a2046de06adb11576b2ba9dcd276706ec07dac7") perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4800100, 0x0, 0x0, 0x0, &(0x7f00000000c0)="d353ff072d68b2e4dc14aa5fa8b3d94c22") openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) 04:50:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x2000016}]}, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 04:50:37 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) close(r0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x4000) syz_open_dev$swradio(0x0, 0x0, 0x2) r1 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 04:50:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffcd, 0x0, 0x0, 0x0, 0x0, 0x66}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) 04:50:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000280)={0x1000000efffffff, 0xe00000000000000, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="020d000510000000000000d30000000003000600252000000200046ac0020001000000000100c669080012000200030000000000fa0000003000000002030000050000c6a8000000020000000008000092ab000000000001020014bb00200000ffffffde0000000003000500002000000200ebf2df0000210008000002000000a80d067d7b04d596a3c9197b8533b0205bb38ae529d1cee7aa470818a6537bf617bad12acc4b7abd6f915635d2c7a7ca5b"], 0x80}}, 0x0) 04:50:37 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) unshare(0x20020000) 04:50:37 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast2, 0x0, 0x0, 'lblcr\x00', 0x2, 0x6, 0x5f}, 0x2c) 04:50:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:50:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 189.781572][T10340] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 04:50:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getresuid(0x0, 0x0, &(0x7f0000000180)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 04:50:37 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:38 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) close(r0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x4000) syz_open_dev$swradio(0x0, 0x0, 0x2) r1 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 04:50:38 executing program 2: 04:50:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:38 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:38 executing program 2: [ 190.121858][T10345] EXT4-fs (sda1): re-mounted. Opts: 04:50:38 executing program 1: 04:50:38 executing program 3: 04:50:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:50:38 executing program 2: 04:50:38 executing program 1: 04:50:38 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:38 executing program 3: 04:50:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:38 executing program 1: 04:50:38 executing program 2: 04:50:38 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:38 executing program 1: 04:50:38 executing program 3: 04:50:38 executing program 2: [ 190.627062][T10387] EXT4-fs (sda1): re-mounted. Opts: 04:50:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:50:38 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:38 executing program 1: 04:50:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:38 executing program 3: 04:50:38 executing program 2: 04:50:39 executing program 3: 04:50:39 executing program 1: 04:50:39 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:39 executing program 2: 04:50:39 executing program 1: 04:50:39 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:50:39 executing program 2: 04:50:39 executing program 3: 04:50:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:39 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:39 executing program 2: 04:50:39 executing program 1: 04:50:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:39 executing program 3: 04:50:39 executing program 2: [ 191.435272][T10451] EXT4-fs (sda1): re-mounted. Opts: 04:50:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:39 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:39 executing program 5: 04:50:39 executing program 3: 04:50:39 executing program 2: 04:50:39 executing program 1: 04:50:39 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:39 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:39 executing program 3: 04:50:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfffffffffffffd16, 0x0, 0x0, 0x0, 0x27d}}], 0x7b8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='limits\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 04:50:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x480004e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 04:50:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:50:40 executing program 4: r0 = memfd_create(0x0, 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x28}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:50:40 executing program 3: mkdir(&(0x7f0000000100)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)='./control\x00', 0x0, 0x0) linkat(r0, &(0x7f00000001c0)='./control\x00', r0, &(0x7f0000000440)='./file0\x00', 0x0) 04:50:40 executing program 4: r0 = memfd_create(0x0, 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) [ 192.041245][T10499] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:50:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10010102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:50:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x3fd}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 04:50:40 executing program 4: r0 = memfd_create(0x0, 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000000100)="1f0000000104fffffd3b54c007110000f30501000b000400000000000000cf", 0x1f) 04:50:40 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x0, 0x0) 04:50:40 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004140)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0}}, {{&(0x7f0000000680)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000007c0)=[@tclass={{0x14, 0x29, 0x43, 0x101}}], 0x18}}], 0x2, 0x0) 04:50:40 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x0) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071008000100feffffff0800000000000000", 0x24) 04:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000100)="1f0000000104fffffd3b54c007110000f30501000b000400000000000000cf", 0x1f) 04:50:40 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x0) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:40 executing program 1: 04:50:40 executing program 5: 04:50:40 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 192.609653][T10558] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 192.622523][T10558] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 192.667140][T10558] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 192.704402][T10566] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 04:50:40 executing program 1: 04:50:40 executing program 2: 04:50:40 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x0) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:40 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000240)={0x7fffffff}, 0x8, 0x0) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000001c0)=""/128, 0xffc2}], 0x1) timer_create(0x2, &(0x7f0000000140)={0x0, 0x19}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000666fe0)={{0x0, 0x989680}, {0x0, 0x7}}, 0x0) 04:50:40 executing program 3: r0 = gettid() getsockname(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240)) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='\x00', &(0x7f0000000080)='9p\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) shmget(0x0, 0x8000, 0x0, &(0x7f0000ff8000/0x8000)=nil) tkill(r0, 0x13) 04:50:41 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:41 executing program 1: 04:50:41 executing program 2: 04:50:41 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:41 executing program 3: 04:50:41 executing program 1: 04:50:41 executing program 2: 04:50:41 executing program 3: 04:50:41 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:41 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:41 executing program 5: 04:50:41 executing program 3: 04:50:41 executing program 1: 04:50:41 executing program 2: 04:50:41 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:41 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:41 executing program 3: 04:50:41 executing program 1: 04:50:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r1, &(0x7f0000000080)=[{{&(0x7f0000001400)=@ipx, 0x2a, 0x0, 0x0, 0x0, 0x3cf}}], 0x143, 0x0, 0x0) 04:50:41 executing program 5: 04:50:41 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:41 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:41 executing program 3: 04:50:41 executing program 1: 04:50:41 executing program 2: 04:50:42 executing program 3: 04:50:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth1\x00', 0x310) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="180000f4ffffff0029000000ad000000"], 0x10}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@l2, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000200)}}], 0x400001f, 0x0) 04:50:42 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:42 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x17, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0x4}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 04:50:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x66, 0xa}, [@ldst={0x3fd}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 04:50:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x66}, [@ldst={0x3fd, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 04:50:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:50:42 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 04:50:42 executing program 2: 04:50:42 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) [ 194.314284][T10677] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 04:50:42 executing program 1: 04:50:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:42 executing program 1: 04:50:42 executing program 5: 04:50:42 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:42 executing program 2: 04:50:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:42 executing program 5: 04:50:42 executing program 2: 04:50:43 executing program 3: 04:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:43 executing program 5: 04:50:43 executing program 2: 04:50:43 executing program 1: 04:50:43 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:43 executing program 2: 04:50:43 executing program 1: 04:50:43 executing program 5: 04:50:43 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 04:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:43 executing program 3: 04:50:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2, &(0x7f0000000080)) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 04:50:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x66}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) 04:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = dup(r1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x18) sendto$ax25(r2, &(0x7f0000000040)=';', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) close(r3) 04:50:43 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 04:50:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xdea, 0x0, &(0x7f0000000600)="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"}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, 0x0, &(0x7f00000002c0)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 04:50:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x6) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000100), 0x2) setsockopt$sock_int(r1, 0x1, 0x32, &(0x7f0000000340), 0x4) [ 195.696749][T10750] dccp_close: ABORT with 1 bytes unread 04:50:43 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 04:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 195.761682][T10758] dccp_close: ABORT with 1 bytes unread 04:50:43 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80002, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000080)) r1 = socket(0x1, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x0, @fr_pvc=0x0}}) 04:50:43 executing program 5: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0x3, 0x40) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x6, 0x2, 0x80}]}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x23, &(0x7f00000002c0), 0x4) fstat(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000001300)={'TPROXY\x00'}, &(0x7f0000001340)=0x1e) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002a40)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@local}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x1200, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x855ad000}], 0x0) r3 = syz_open_dev$amidi(&(0x7f00000012c0)='/dev/amidi#\x00', 0x8, 0x141001) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000001280)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e21, @multicast1}], 0x40) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000001200)={0x8001, 0x100000000, 0x6, 0x0, 0xfffffffffffffff8, 0x7ff}) ioctl$RTC_AIE_OFF(r4, 0x7002) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000200)=""/4096) write$P9_RWALK(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="83"], 0x1) write$P9_RXATTRCREATE(r3, &(0x7f0000001380)={0x7, 0x21, 0x2}, 0x7) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:43 executing program 2: r0 = socket(0x1e, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000200)="115e44cfe47bf0701b4a9b37682f4dd7d663d125c6280607bc05ec78e0d4be77890166b7541b25fb604194ef741d4c8ee1d92dc92478d19b30948ba86baf65428588d4f02087927c95532e064d1b0e9bfd758ec3f826d9d9d0a6ded3e367a43195fdf7b36da334e5cc712db04898994c16707fc452953ea71178b4530808b1e37fe2049e64d09d821640cb092c330b715778593b1cb3a06a37382c17edea5ec3fad0a3eb52177fb5") ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000000)={0x8}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r1}) close(r2) fsopen(&(0x7f0000000080)='fusectl\x00', 0x1) fsync(r0) 04:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:44 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)) 04:50:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x420881, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000340)=""/255) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x3, 0x9}]}}}]}, 0x3c}}, 0x0) 04:50:44 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)) 04:50:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x3f, 0x0, "9f11ebcd0bf1474bb0954572c05b609c9d1c109d76a2c8d72747b2efce0db5948594ddd4a3b3dffbc73aedc4e460f3d4d0b4b164473122804ccc4a017a3d5bf06d81ee4c7aae0ce430974dc836f33bc4"}, 0x281) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @initdev}}, 0x0, 0x2, 0x0, "dd5fb082f55180165b4ee2c7c5968a119cf34a0ad970281b5cabcd541ff626edc3abdc36c7ba10fa6dd77926fb0fe683de7ceddf6a5c914d50d6738e19d464405c140beb9650d80b7a511c2264e8c71c"}, 0xd8) close(r1) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0xfffffffffffffffa, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000140)={0x3}) 04:50:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='projid_map\x00') openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x210000, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4720da754bec00ba, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x400000) 04:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:44 executing program 5: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0x3, 0x40) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x6, 0x2, 0x80}]}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x23, &(0x7f00000002c0), 0x4) fstat(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000001300)={'TPROXY\x00'}, &(0x7f0000001340)=0x1e) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002a40)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@local}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x1200, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x855ad000}], 0x0) r3 = syz_open_dev$amidi(&(0x7f00000012c0)='/dev/amidi#\x00', 0x8, 0x141001) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000001280)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e21, @multicast1}], 0x40) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000001200)={0x8001, 0x100000000, 0x6, 0x0, 0xfffffffffffffff8, 0x7ff}) ioctl$RTC_AIE_OFF(r4, 0x7002) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000200)=""/4096) write$P9_RWALK(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="83"], 0x1) write$P9_RXATTRCREATE(r3, &(0x7f0000001380)={0x7, 0x21, 0x2}, 0x7) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:50:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x332, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 04:50:44 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)) 04:50:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000000)=0x1f5) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_tables_names\x00') ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000080)={0xbe4, 0x1, 0x80000000, 0x2, 0x1}) 04:50:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x2, 0x2, @remote, 0x8000000000000001}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 04:50:44 executing program 4 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 04:50:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000200)="365bbff4b974ce862a646256e03adfee1fa09ae3b9eee8e8afdde1503c365715b32b049b97d5edb2689b6fb39aee5cedf1189704fbb6fa14ffc419593f015d25c5145060a368b4a2614b4ae62b62a019e14fdc87fad7529c0623a9fcf964523935fc9ce2b7cf5ea8865478d04316f96e7d75a616bd7ff0a8f7358114d90b0819049d706fa29ac6b8f02df01a8eaccac1d46aa0fddfe422d5885de81df348fa5569c236967e304a5da1776c80b8a4d2c485fe535734673ed8c0359d5b8e1344f805533f704a0a6ce98647eb2ece582d7740dbcc77808143d54dcc38370d38c36e75817b420ebd27675094d06c45", 0xed) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x5, &(0x7f00000000c0)=0x1f, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) msgget(0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) fstat(r2, &(0x7f0000000000)) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000080)=""/39) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) socket$packet(0x11, 0x3, 0x300) 04:50:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffc) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 04:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 196.747951][T10844] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 196.764364][T10846] FAULT_INJECTION: forcing a failure. [ 196.764364][T10846] name failslab, interval 1, probability 0, space 0, times 1 [ 196.783387][T10844] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 196.851363][T10846] CPU: 0 PID: 10846 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190806 #60 [ 196.860840][T10846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.860847][T10846] Call Trace: [ 196.860869][T10846] dump_stack+0x172/0x1f0 [ 196.860895][T10846] should_fail.cold+0xa/0x15 [ 196.883128][T10846] ? fault_create_debugfs_attr+0x180/0x180 [ 196.888935][T10846] ? ___might_sleep+0x163/0x280 [ 196.893790][T10846] __should_failslab+0x121/0x190 [ 196.898728][T10846] should_failslab+0x9/0x14 [ 196.898741][T10846] __kmalloc+0x2e0/0x770 [ 196.898755][T10846] ? mark_held_locks+0xf0/0xf0 [ 196.898776][T10846] ? _parse_integer+0x190/0x190 [ 196.917068][T10846] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 196.922786][T10846] tomoyo_realpath_from_path+0xcd/0x7b0 [ 196.928325][T10846] ? tomoyo_path_number_perm+0x193/0x520 [ 196.930935][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 196.933957][T10846] tomoyo_path_number_perm+0x1dd/0x520 [ 196.939689][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 196.945100][T10846] ? tomoyo_path_number_perm+0x193/0x520 [ 196.945119][T10846] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 196.945141][T10846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.968470][T10846] ? __kasan_check_read+0x11/0x20 [ 196.973520][T10846] ? __fget+0x384/0x560 [ 196.977681][T10846] ? ksys_dup3+0x3e0/0x3e0 [ 196.982087][T10846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 196.988318][T10846] ? fput_many+0x12c/0x1a0 [ 196.992730][T10846] tomoyo_file_ioctl+0x23/0x30 [ 196.997502][T10846] security_file_ioctl+0x77/0xc0 [ 197.002437][T10846] ksys_ioctl+0x57/0xd0 [ 197.006629][T10846] __x64_sys_ioctl+0x73/0xb0 [ 197.011213][T10846] do_syscall_64+0xfa/0x760 [ 197.015708][T10846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.021600][T10846] RIP: 0033:0x459829 [ 197.025494][T10846] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:50:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r1, 0x1, 0x7, &(0x7f000059dffc), &(0x7f0000000100)=0x4) [ 197.045090][T10846] RSP: 002b:00007fbfcb22dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 197.053489][T10846] RAX: ffffffffffffffda RBX: 00007fbfcb22dc90 RCX: 0000000000459829 [ 197.061462][T10846] RDX: 00000000200000c0 RSI: 0000000040305828 RDI: 0000000000000003 [ 197.069424][T10846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.077384][T10846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbfcb22e6d4 [ 197.085346][T10846] R13: 00000000004c1ff0 R14: 00000000004d5328 R15: 0000000000000004 04:50:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x578, 0x400) openat$cgroup_ro(r1, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010200dffffffff80000080000f43be6ec965b18d56e7c3eaf73efe30010"], 0x24}}, 0x0) [ 197.170940][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.176728][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 197.182564][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.188328][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:50:45 executing program 2: capset(&(0x7f0000000000), &(0x7f0000000140)={0x0, 0x8}) r0 = semget$private(0x0, 0x7, 0x4000000) semop(r0, &(0x7f0000000100)=[{}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000480)={0x3, 0x7, 0x4, 0x1040000, {0x77359400}, {0x7, 0xd, 0x2, 0xe1, 0x800, 0xaa7, "af8368a1"}, 0x10000, 0x3, @offset=0x1, 0x4}) socket$bt_bnep(0x1f, 0x3, 0x4) r2 = getpgrp(0x0) capset(&(0x7f0000000040)={0x19980330, r2}, &(0x7f0000000080)={0x9ea, 0x2, 0x3ff, 0x0, 0x5, 0x3}) tkill(r2, 0x25) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x2, 0x400) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f0000000340)={0x0, 0x0, [], @bt={0xff, 0x4, 0x401, 0x8b8, 0x10000000, 0x10001, 0x10, 0x2}}) ioctl$VIDIOC_EXPBUF(r4, 0xc0405610, &(0x7f0000000400)={0x9, 0xe1df, 0x28be, 0x800, r4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000440)={0x8001005, 0x9, 0x3}) getsockopt$packet_buf(r4, 0x107, 0x5, &(0x7f0000000200)=""/218, &(0x7f0000000300)=0xda) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f00000001c0)={0xf, 0x1f, 0x80, 0x80800, r4}) 04:50:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 197.248798][T10846] ERROR: Out of memory at tomoyo_realpath_from_path. 04:50:45 executing program 4 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) [ 197.347176][T10861] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) 04:50:45 executing program 3: r0 = socket$inet(0x2, 0x6, 0x1000000000000000) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x5084f74d, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x44f5}) 04:50:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="500000000408190300000000000000000000000008000200", @ANYRES32=0x0, @ANYBLOB="3400030021657972696e6765746830766d6e6574316367736f7570707070315b6574683076626f786e6574317573657200000000"], 0x50}}, 0x0) 04:50:45 executing program 2: clone(0x2000004103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x420e, r1, 0x8, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000080)={0x8, "8cef5f6f3ab0a93fe712882425b93fb7ef3fde26adb4ed93501979483a9b682b", 0x3, 0x53eb, 0x0, 0x0, 0x6000000}) [ 197.445903][T10868] FAULT_INJECTION: forcing a failure. [ 197.445903][T10868] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 197.459617][T10868] CPU: 1 PID: 10868 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190806 #60 [ 197.468713][T10868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.478746][T10868] Call Trace: [ 197.482014][T10868] dump_stack+0x172/0x1f0 [ 197.486340][T10868] should_fail.cold+0xa/0x15 [ 197.492622][T10868] ? fault_create_debugfs_attr+0x180/0x180 [ 197.498410][T10868] ? lock_downgrade+0x920/0x920 [ 197.503242][T10868] should_fail_alloc_page+0x50/0x60 [ 197.508417][T10868] __alloc_pages_nodemask+0x1a1/0x900 [ 197.513770][T10868] ? __alloc_pages_slowpath+0x2520/0x2520 [ 197.519465][T10868] ? kernel_text_address+0x73/0xf0 [ 197.524553][T10868] ? unwind_get_return_address+0x61/0xa0 [ 197.530164][T10868] ? profile_setup.cold+0xbb/0xbb [ 197.535181][T10868] ? fault_create_debugfs_attr+0x180/0x180 [ 197.540966][T10868] cache_grow_begin+0x90/0xd20 [ 197.545712][T10868] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 197.551433][T10868] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.557659][T10868] __kmalloc+0x6b2/0x770 [ 197.561879][T10868] ? mark_held_locks+0xf0/0xf0 [ 197.566643][T10868] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 197.572341][T10868] tomoyo_realpath_from_path+0xcd/0x7b0 [ 197.577990][T10868] ? tomoyo_path_number_perm+0x193/0x520 [ 197.583659][T10868] tomoyo_path_number_perm+0x1dd/0x520 [ 197.589104][T10868] ? tomoyo_path_number_perm+0x193/0x520 [ 197.594738][T10868] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 197.600540][T10868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.606761][T10868] ? __kasan_check_read+0x11/0x20 [ 197.611822][T10868] ? __fget+0x384/0x560 [ 197.616074][T10868] ? ksys_dup3+0x3e0/0x3e0 [ 197.620482][T10868] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 197.626714][T10868] ? fput_many+0x12c/0x1a0 [ 197.631110][T10868] tomoyo_file_ioctl+0x23/0x30 [ 197.635855][T10868] security_file_ioctl+0x77/0xc0 [ 197.640770][T10868] ksys_ioctl+0x57/0xd0 [ 197.644904][T10868] __x64_sys_ioctl+0x73/0xb0 [ 197.649474][T10868] do_syscall_64+0xfa/0x760 [ 197.653957][T10868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.659825][T10868] RIP: 0033:0x459829 [ 197.663718][T10868] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.683297][T10868] RSP: 002b:00007fbfcb22dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 197.691703][T10868] RAX: ffffffffffffffda RBX: 00007fbfcb22dc90 RCX: 0000000000459829 [ 197.699651][T10868] RDX: 00000000200000c0 RSI: 0000000040305828 RDI: 0000000000000003 [ 197.707599][T10868] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.715559][T10868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbfcb22e6d4 [ 197.723519][T10868] R13: 00000000004c1ff0 R14: 00000000004d5328 R15: 0000000000000004 [ 197.788558][T10876] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 197.815357][T10876] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 197.890929][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 197.896737][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:50:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='security.ima\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000053b76600077f36"], 0xb, 0x2) 04:50:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:46 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0xf5, 0xc, 0x5}) clone(0x400200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x9, 0x7, 0x2, 0x4, 0xa}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)={r4, 0x9, 0x3, [0x100000001, 0x6e, 0x7]}, &(0x7f00000002c0)=0xe) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f00000000c0)=0x200, 0x4) rt_tgsigqueueinfo(r3, r3, 0x4000000000013, &(0x7f0000000140)) ptrace(0x10, r3) ptrace$getsig(0x4, r3, 0x7ffff9, 0x0) 04:50:46 executing program 4 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:46 executing program 1: syz_emit_ethernet(0xfc, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800490000300000000000009078ac141400ac1423bb8608a2208ae55cb4c6ad05cf9931007f000001004404907800000000"], &(0x7f0000000100)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x282, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) 04:50:46 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0xb661, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000003c0)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x4a002) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000400)={0x1}) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2400004}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)=@newqdisc={0x188, 0x24, 0x8, 0x70bd27, 0x25dfdbfe, {0x0, r3, {0x0, 0xe}, {0xffeb, 0x9}, {0xffe0}}, [@TCA_STAB={0xcc, 0x8, [{{0x1c, 0x1, {0x3, 0x200, 0x0, 0x10000, 0x1, 0x7000000000000, 0x8, 0x3}}, {0xc, 0x2, [0x569, 0x0, 0x2]}}, {{0x1c, 0x1, {0x2, 0x2, 0xbc2, 0x9, 0x3, 0x1, 0x98d, 0x2}}, {0x8, 0x2, [0x7, 0x3]}}, {{0x1c, 0x1, {0x0, 0xd67d, 0x90f, 0x3, 0x2, 0x20, 0x7, 0x5}}, {0x10, 0x2, [0x7ff, 0x7, 0xb5a, 0x1f, 0xccf]}}, {{0x1c, 0x1, {0x7, 0xffffffffffffffff, 0x7ff, 0x5, 0x1, 0xffffffff, 0x10000, 0x3}}, {0xc, 0x2, [0x0, 0x0, 0x3]}}, {{0x1c, 0x1, {0x1, 0x7, 0x100, 0x6, 0x1, 0x6, 0x2, 0x3}}, {0xc, 0x2, [0x1, 0xd59f, 0x7]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xffffffff}, @TCA_STAB={0x28, 0x8, [{{0x1c, 0x1, {0x9, 0x0, 0x3f, 0x0, 0x0, 0xff, 0xb7, 0x2}}, {0x8, 0x2, [0xffffffffccda8b95, 0x40]}}]}, @qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{0x43, 0x0, 0xfffffffffffffff8, 0x2, 0x913}, 0x7f, 0x1, 0x400, 0xff, 0x2489, 0xc, 0x1c, 0xc, 0x8, {0x7ff, 0xf72, 0x28000000, 0xb9, 0x3f, 0x7}}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x400}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x9}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x21074dfc}]}, 0x188}, 0x1, 0x0, 0x0, 0x11}, 0x20000000) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast=[0xff, 0xe0], @random="64f0e265323a", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6558, 0x8}}}}}, 0x0) 04:50:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000080)={0x3, "b8e4b7"}, 0x4) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000100)={0x100000000, "bdce11e1f3e1bae79d197f31e6d1e94388bdb4c80d5c7ac3cc74dfc25c05d78b", 0x4, 0x7993, 0x2, 0x18, 0x9b9c221ab4f7cc87}) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="070000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000e6ff000000000000000000000000004000000000000000000000000000000000000000000000000000000000863800"/288]) ioctl$KVM_IRQFD(r1, 0x4010ae68, &(0x7f00000000c0)) 04:50:46 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000300)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x101000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@newqdisc={0xd8, 0x24, 0x800, 0x70bd2b, 0x25dfdbfd, {0x0, r1, {0x7, 0xa}, {0xfffb, 0x8}, {0x9, 0xc}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x10000}, @qdisc_kind_options=@q_mqprio={{0xc, 0x1, 'mqprio\x00'}, {0xa0, 0x2, {{0x8, "1259ce1344b8623285c7712f2a7145be", 0x6, [0x1ff, 0x1f, 0xab0, 0x6, 0x772, 0x10000, 0x4e, 0x5, 0x5, 0x4, 0x10001, 0x5, 0x1, 0x7, 0x7, 0x1f], [0x0, 0x10000, 0x1ff, 0x9, 0xbd9, 0x5, 0x8, 0x58, 0x3f, 0x6, 0x3, 0x1, 0x3, 0x1ff, 0x7, 0x80000000]}, [@TCA_MQPRIO_MODE={0x8, 0x1, 0x1}, @TCA_MQPRIO_MODE={0x8, 0x1, 0x1}, @TCA_MQPRIO_MODE={0x8, 0x1, 0x1}, @TCA_MQPRIO_MAX_RATE64={0x28, 0x4, [{0xc, 0x4, 0x80000001}, {0xc, 0x4, 0x80000001}, {0xc, 0x4, 0xc1}]}, @TCA_MQPRIO_MODE={0x8, 0x1, 0x1}]}}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0x4}) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) getsockopt$inet6_int(r0, 0x29, 0x7b, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = getpgid(0x0) ptrace$getregs(0xc, r2, 0x3, &(0x7f0000000140)=""/114) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x9, &(0x7f0000ffd000/0x2000)=nil, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 04:50:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0207000902000000a8a9897bbb91"], 0x10}}, 0x0) 04:50:46 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) poll(&(0x7f0000000000), 0x0, 0x1) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r1, 0xc02, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x1c, 0x17, {0xb, 0x3, @l2={'ib', 0x3a, 'bond_slave_1\x00'}}}}, ["", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 04:50:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0xa0000) 04:50:46 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x4c01, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:46 executing program 2: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x8b, 0x7, 0x7, "b50ee0b16a92a4847ec24f05646215a9", "669806ee2507ff54cf4ef0bbde9af0c28675d020a50a549b177f08eabec10d1f43de37ceecc55e70b0a2809d09291da11f8eeceb83d6ff5e25d9e7ea177b4ad0cb700e444d3a545debd4b3313fed2e885e38de9fe3195572b2bdc26a195ce18d482cdc9f0c09cdd77e232404792c4ab512f138893f49"}, 0x8b, 0x2) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000040}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x20, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x80) clone(0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000001c0)='NET_DM\x00', 0x0, r0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 04:50:46 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x541b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_SECUREBITS(0x1c, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000280)=0x2, 0x8) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:47 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x5421, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0xffffffffffffff9f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xd4, 0x0, 0x0, 0xfffffffffffffe60) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @rand_addr="2eb6fe5baef3a77422c208c158a1fc4d"}}}, 0x88) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$eventfd(r3, &(0x7f0000000040), 0x8) [ 199.365068][T10989] kvm: emulating exchange as write [ 199.496041][T10938] syz-executor.1 (10938) used greatest stack depth: 23256 bytes left 04:50:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0207000902000000a8a9897bbb91"], 0x10}}, 0x0) 04:50:47 executing program 2: clock_getres(0x1, 0x0) 04:50:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 04:50:47 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x5450, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0xc3, &(0x7f0000000140)=0x10001, &(0x7f0000000000)=0x3) syz_open_dev$midi(0x0, 0x4, 0x0) 04:50:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_SECUREBITS(0x1c, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000280)=0x2, 0x8) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:47 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x5451, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 04:50:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4800, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x2f, &(0x7f0000000040)="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", 0xfe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x10003) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x2, r1, 0x0) 04:50:47 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000004440)={'netdevsim0\x00', 0x0}) sendmmsg$inet6(r1, &(0x7f0000004600)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x630, @mcast2, 0x7fffffff}, 0x1c, &(0x7f0000000840)=[{&(0x7f00000002c0)="202a0c83962c9b2a98fb909f36afef336ff7b67265d418c0f6eb04d5023723211704d8e16b943b678e4bc86d5e15f4c8576f7d026ee8dc7b7d05d6ff16ff658603a31e213360ffa49aef6563e57512d440afecac2ac4c323699d41351794c7dc47ffc15afc2e70f3804ff6329d5808be9b4e214d364d431164c649e20582875252a83d6cef3346cebde4ae13cabfcd013c45a2c979caa0e3eadc8a53abe831a50602adedae17dd571f2c3ebbaf8e0f5883f58c6745bc502f350206f804ae2e113836b4edc5c7ed3f6bb7c61c05af6e739ded742b35a8ec1bc2a048b0778911071c0b4e60010b9808", 0xe8}, {&(0x7f00000003c0)="86222424fe3caa157fdfeb5aad5e165cbbb60ab654da77849de0daee6cbec04b3043730743aba79fdda33b37efc5af7b9889f571fc53b2d5ee40519a7631a78e84720c6041c23692c4cdef6a3ac6b324af5776903e9923e08b47bc2230d868da893155ec930f62dcfdc1177a54174dad28cdfed1f36188dbc94b37cd91fae7c1653990c1129259f1fae33c78e34836d6afd25acc330827f2284217f29383c8c8ba5c308ded100d4581b9c386ea3b26b38e4603c62c633395ae2446c7f5ec038a61ce43ca897cd41acb82c09392a7501c249f65b1b0fbcf52b5ee7afd648b46af25c6e63bd9e75a3347509d5fac1a49f1", 0xf0}, {&(0x7f00000004c0)="64edf8f5bfa96d806732979a6b466688e63d1f12c95cae8dd3d3506fc793aa8fc45edebcd0866490a0001867", 0x2c}, {&(0x7f0000000500)="2c1e93ca6cb13bf7080ff6f48061a2d31e8d2d28ed6f7d9f43a7847f28e828bd43cdf3ab7882e760465105f81824849ebb3a2aa5d783d99afc8a31911d0619bbbad9a12a30149572b326132d18f170f6843e0dbe1be672295c41124fa8ece3d8bd3240eb17fb419d64f8c47dfebcc39c5cb1d8166a3b5d8f1fa4062e10a335c4c62223a3862961101e9370995ac8debac1b791902f2e78e1b86820daa189990358d707db50dfbf73e86931932d38a1f6951f11893d2e17faf2b413e19e82b97da7244cff1d1c8802318c622bd428b5a84e398d8124c7227b966c1c90c85cbbe2a22ea0329bbf39740e63520f22ee172e972ded40cd0078748be4f2", 0xfb}, {&(0x7f0000000600)="7621bae748536b231642b5bfd6031e5f25f12a3d57ca7f5a7603e4477aadbb9d665141922a1b9c19a526", 0x2a}, {&(0x7f0000000680)="25c7d860b1cf4aeafffad983f2f94f2b6de99f47a8c2b977d5ba5662c4f5aae948edd9bd24710eb419aecdf46f611fe5d4784835e4fdc8eab45df989ad604c07c1cb4176d849b985f2c0063b9338db296b0b832fcffd9e740ea92f094cfa5a6ab953c0fbab5505bb4683", 0x41}, {&(0x7f0000000700)="324e6cd874e4f934a755c6f36c2cef905c0c7f6d87c95797d44c388fb7", 0x1d}, {&(0x7f0000000740)="4079641854927132b7a7b26b7b37125372d6fc4ab84d551449db2d74f2455ea0f5c50f2af38f85e6353b499ac7a680e60181a8434456a3bfa9ce92d3c749e37f3c0350569984bc5af821aac15a988238071d8c431cb3c9dcd26ae317a6201290401a4a1cb244250c2c0325b1fdc7aa14629161c49fde7293b62e8a20da4587258ebef605900e3ee8970d69fdc9578711c6cc9f9b357c49d76d209833a541bbf265f5c2506830d5e94305d921caeac4fc7f571465351b1b53712bf0d824db98cd55e5cb2faaf3ffb9a63c65fe75a76681e43ed342908f21ea0928434c9283ca06d62beb87c06d7cb585f62fec5b19852344467c84cae4da", 0xf7}], 0x8, &(0x7f00000008c0)=[@rthdr_2292={{0x48, 0x29, 0x39, {0x0, 0x6, 0x0, 0x1, 0x0, [@local, @ipv4={[], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}, @rthdr={{0x18, 0x29, 0x39, {0x1, 0x0, 0x2, 0x4}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xe99}}, @dstopts={{0xa0, 0x29, 0x37, {0x6c, 0x10, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x2}, @generic={0x8, 0x5b, "49cddd5afb96b0aae2b387bccce96d977e8e3b7a52790aaae8f0719375ec1bff2bc6d63071001f6900342e23431ca2451f4568ec7345b9854a78204240807f2229205ac114c1576126df14ba9589e1cd19f3a73cd616844d37fd41"}, @jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @mcast1}]}}}, @flowinfo={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @flowinfo={{0x14, 0x29, 0xb, 0x5}}, @hoplimit={{0x14, 0x29, 0x34, 0x101}}], 0x178}}, {{&(0x7f0000000a40)={0xa, 0x4e21, 0x8, @rand_addr="f1ca01242dc00a93080aa4ce03903c5f", 0x800}, 0x1c, &(0x7f0000001c00)=[{&(0x7f0000004300)="e4a481fdfea2f447c0b0bf73d998fbcc505b5908afd6d7aea599607d91eec3390fdeb95089e643291bf5cdffc9d7465e6971db638cb798d92f2769d042eacd4f08f756c68b", 0x38}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000001ac0)="b3666fc42863077d44aaf96220e34e3898f1a24d0d18ef167415d7d23ff358e6ecbe2ec8f87355782ef26be0f5dedea72a35775594af8f50df86a9c4090c12ceed8646e1e131ae1b8b9eaed5106da60cc6087a4df4af1fc02a971931190615854fb213096a63e243df3665cb109675cf8207f70b56970b0031b36bf0d0a33042c7039a8689b020e4d471a79944aa9c65028beb25d7d76436a757b889a8dce2eb82a5628e6d0dc33f32963209cfdf708210c3db6cf1b72935af", 0xb9}, {&(0x7f0000001b80)="29884c13cb2fddb5ee05fe1a4abf2e1cc82c72b50ca8997688703d04d5b261fb6f1fc781d4dd380223ef9678b200add235947230fcb86300059238dcf8027fd624c62057c456e623349dafac0e4ff207bbd6193ccabe667930e938f56c7a497bc04b3189adb07737311602baec687b4d6272f06ad2a50020de", 0x79}], 0x4, &(0x7f0000001c40)=[@hopopts_2292={{0x38, 0x29, 0x36, {0x2c, 0x3, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3ff}, @ra={0x5, 0x2, 0x80}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr={{0x78, 0x29, 0x39, {0x0, 0xc, 0x0, 0x400, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @rand_addr="23a90b6e5dfcae85509771859f1fe36d", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="96e3ef1213b34dea7b4dca5e8ac52b2a"]}}}, @rthdr={{0x48, 0x29, 0x39, {0x2f, 0x6, 0x0, 0x7f, 0x0, [@mcast1, @loopback, @local]}}}], 0xf8}}, {{&(0x7f0000001d40)={0xa, 0x4e22, 0x4, @ipv4={[], [], @loopback}, 0x4}, 0x1c, &(0x7f0000002040)=[{&(0x7f0000001d80)="8bd909aec6b1a81a83e5cdada15e5783740768a38e46d45299228a155b47fef8d6d21b558593b67f5c2f8e337ea8033763f7521e5e60e61b1bfda7fa401dc2364dd1cbb80cb21af1903c0a3bbc5418d46f7b9818602ffaa78eb393a54969ba7e98b87b8dd465e3cc9d8b2d3aab064c646e7dfeae76111f02d0c53accc658a4d4ca74817508f8433e1c1dca099431ff996dd0ffcaa6adce8cf8b5a446db9ff796320754b5a782e51d1453edce2385f5269d8ee8dc27025135a3d5524334dfe8510c48e4ed791dc0415722070c8272a2d0ecfc4460038afbd91b2e9adf2b6d8a8821de5c441bebd8e6", 0xe8}, {&(0x7f0000001e80)="84d193f2d88f85869d141c4510fc5a429caee1de26a62d6ce2377d8661487fbd53d6295ed65a33734d596316aba66e0ba5840595feda2c91107f713156f7fbb1f7221f87318f08dbea34f616c742389c80eba7ddb2d5d8717ba7ab74b14bf8b395003e380cf57bee94e47e6827992ab393abf959ed87d176073727b1cf85c6b5b695dfe26c7e458bb1214795df85008b32cce3e34566ee5422749768e358b6e86e697505b224bd7c3c4b22340efc8297faf2cc266c14b74bbf15d8377c3d6fedd55cdd59e4ffae55b62897ecb8c21574cb18dfa5805854f2057982033d498a462a4c8dc293c92992827703d46d473952318ed7357a6c96c0a3", 0xf9}, {&(0x7f0000001f80)="0f3054f149c04d8aba0a979186424c41fd0beba12a01ca3f15e076cea946208aa20dabe0923420677e468a9a78d48a4f628873d081da1c78ac45aac9563d6b77caf891ea586fe2905a2a0541676416d40e47126963a61b78a7eb1b868260c2eb79fd884f725fe09aa02ee86bbebf41ef59e9151fbc0e0227c3e5ff2ab5458c99eb0c67d754f2037dcdf5f074054d0b794a", 0x91}], 0x3, &(0x7f0000002080)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @dstopts={{0x38, 0x29, 0x37, {0xbf, 0x3, [], [@pad1, @pad1, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x415d}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x7ff}}], 0x68}}, {{&(0x7f0000003140)={0xa, 0x4e23, 0x7ff, @ipv4={[], [], @multicast2}, 0x5}, 0x1c, &(0x7f00000042c0)=[{&(0x7f0000003180)="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", 0x1000}, {&(0x7f0000004180)="671e4f093ad20681b3f687893fa92c707226f4f8ed367d0afd99fa5053524e28f55bc11aace772b8dba464030229d70fba2f08508e24b2b2898b4939fc8e55ee", 0x40}, {&(0x7f00000041c0)="2f25d03bb214b19304691c9705f5342b9e0616f6c918b07dbe3779e4d4066b9bf9661084b50bf052d81bbcc26d05b4718aca6509f6cfbac025cc338d7352d660dc53d8d3870395953c0d489edf4ef9feea9c7eab828536d5403a50d1b305b9e5db9b9f83d399410d0ca46c574305627822c179390849f3c53e328b7324047aee4c5451dc3ec534ffda041dc169593bf66877bef3f141e4c3d4114ce2fdde8d0755a63ce993a1aac672c6c36403f3563fb5cdd2fc4924be16fe0092a4564d8a06a8afe80e0bbec052e8c5f64b", 0xcc}], 0x3, &(0x7f0000004480)=[@hopopts_2292={{0x80, 0x29, 0x36, {0x3c, 0xc, [], [@jumbo={0xc2, 0x4, 0x8}, @ra={0x5, 0x2, 0xfff}, @ra={0x5, 0x2, 0x9}, @calipso={0x7, 0x28, {0x0, 0x8, 0x3, 0x101, [0x81, 0x81, 0x6, 0x3]}}, @padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @ipv4={[], [], @broadcast}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xc14}}, @rthdr_2292={{0x48, 0x29, 0x39, {0xc, 0x6, 0x0, 0x7, 0x0, [@local, @remote, @dev={0xfe, 0x80, [], 0x10}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @hopopts_2292={{0x30, 0x29, 0x36, {0xbf, 0x2, [], [@calipso={0x7, 0x10, {0x8, 0x2, 0x6, 0xd7e3, [0xc522]}}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @dontfrag={{0x14, 0x29, 0x3e, 0x51481645}}], 0x168}}], 0x4, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000013001703ed12806cd20010e517fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x31e, 0x0, 0x0, 0x2}, 0x0) 04:50:48 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x5452, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180)="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", 0xff, r0}, 0x68) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2fffffffe}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x6ed, 0x1) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000140)={0xffffffffffffff01, 0x200, @name="856ea76f2447084696e276f407b934b0b0dc2a3047584f4a04fe071524d1e5cc"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000300)=""/43) 04:50:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) connect$netrom(r1, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, [@null, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) 04:50:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff) 04:50:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 04:50:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_SECUREBITS(0x1c, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000280)=0x2, 0x8) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:48 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x5460, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:48 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x3) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x3) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000000)) dup2(r0, r1) [ 200.586997][T11091] syz-executor.1 (11091) used greatest stack depth: 23224 bytes left 04:50:48 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x6364, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:48 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:48 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r0, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r3 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0xb87c230174b08ad, 0x0) syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x3f, 0x4000001) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000001}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[@ANYBLOB="e3010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1f8}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000440)=0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000400)=0x800, 0x4) flock(r1, 0x2) r4 = dup2(r1, r1) dup3(r4, r0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f00000005c0)={&(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x9, 0x4, 0x9}) 04:50:48 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000004) 04:50:48 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000380)={'filter\x00', 0x2, [{}, {}]}, 0x48) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x7, 0x0, [], [{0x7ff, 0x401, 0x9, 0xfffffffffffffffa, 0x3800000, 0x9}, {0x0, 0x3, 0x6, 0x493f, 0x8, 0x6}], [[], [], [], [], [], [], []]}) 04:50:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:50:48 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x8933, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:49 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001c00f40520878a930000000000000000"], 0x14}}, 0x0) 04:50:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0ffeaffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/exec\x00', 0x2, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r1, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) quotactl(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x6bf}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(&(0x7f00000002c0)='./file0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10143d9bbe86dd", 0x0}, 0x28) 04:50:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_SECUREBITS(0x1c, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000280)=0x2, 0x8) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:49 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x89f1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:49 executing program 2: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0xd768) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000040)=""/54) sysinfo(&(0x7f0000000000)=""/22) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x80000000, 0x64c600) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000140)=0x8) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000200)={{0x2, 0x4e20, @broadcast}, {0x6}, 0x14, {0x2, 0x4e20, @remote}, 'vlan0\x00'}) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000001c0)={r1, 0xfff}, 0x8) r2 = syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000054c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$P9_RSTAT(r2, &(0x7f00000001c0)=ANY=[], 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000057c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) semctl$SEM_STAT(0x0, 0x7, 0x12, &(0x7f0000000100)=""/34) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x03\n', @ifru_flags=0xc}) 04:50:49 executing program 1: clone(0x1000000000011, &(0x7f00000000c0), 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) r1 = getpid() waitid(0x2, r1, 0x0, 0x4, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000080)={0xe72, 0x464, 0xfffffffffffffff8, 0x100}) 04:50:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600002, 0x8) 04:50:49 executing program 3: r0 = mq_open(&(0x7f0000000040)='trusted(}ppp1eth1ppp1\x00', 0x0, 0x0, &(0x7f0000000080)={0x5, 0x5, 0x35d8d06a, 0x8, 0x9, 0x1, 0x8, 0x7ff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) splice(r0, &(0x7f00000000c0), r1, &(0x7f00000001c0), 0x200, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101, 0x0) 04:50:49 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x400454ca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x604000, 0x8) 04:50:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_SECUREBITS(0x1c, 0x20) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:49 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000010707061dfffd946fa2830020200a000900010003001d854d0c1baba20400ff", 0x24}], 0x1, 0x0, 0x0, 0x6802}, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000280)={@empty, @broadcast}, &(0x7f00000002c0)=0xc) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x40000, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000240)={0x7, 0x33, 0x2}, 0x7) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x6c, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffe00}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8044}, 0x4000) 04:50:49 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x2d, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="0e37aa809f624154d056bb95323b04894c422fe37451d355b3fef7ccceac002935fee3f4d28d7f5dcb6a8268a62cfd7b80750fc584c308393c5311d34d5ac3c982b8bbf7663f2ddc6d40842c5d283007008da1e2676878c06cccc328", 0x5c, 0x5}, {&(0x7f0000000140)="34f6c160df1534ee377a3ec91e1ed0cb7d518ca3", 0x14, 0xa4}], 0x2820030, 0x0) add_key(&(0x7f00000004c0)='pkcs7_test\x00', 0x0, &(0x7f0000000080)="1082f6c8", 0x4, 0xfffffffffffffffc) 04:50:49 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40049409, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x800000}, 0x1c) ioctl$int_in(r0, 0x0, &(0x7f0000000280)) syz_open_dev$swradio(0x0, 0x1, 0x2) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0x101, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 201.624417][T11238] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 201.638648][T11238] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 04:50:49 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x4020940d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x3) 04:50:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x48, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="44000000104ca33781136a5d595b187f39605d7a", @ANYRES32=r1, @ANYBLOB="0100000000000003240012001400d5fa62326964676dcdb16fca76652c57426b0c000500080019000362f857e5eae4f99cb536058176642e3237603dbbfc0300000000000000978619899f048dc9769f72bfbcf1aa73ea962c45ef4c5990dcb2964387e46e639dee05772edefd871b5178d5de6d085330920ba788e761ca6941d591dd2d957f3c7ea6cb38423b404fd43fb09893bbb557974d6a160560ced36a82d21bae31d130de16264b4429cf1bb2fafcffffffffffffffd1d89036f7"], 0x44}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x600, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 04:50:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:49 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x100000007, &(0x7f0000000040), &(0x7f0000000000)=0x111) 04:50:49 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x4030582a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:50 executing program 2: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) socketpair(0xd, 0x80006, 0x100, &(0x7f00000026c0)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000002740)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000002800)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x30, r1, 0x508, 0x70bd26, 0x6, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x800) 04:50:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x4) 04:50:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x802, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00'}) connect$netlink(r1, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000001b00)=ANY=[@ANYBLOB="1300000031001902000000000000000000000000200001001c00000000000c000100ffffffff0000000000020000000000000000"], 0x34}}, 0x0) 04:50:50 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x40305833, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0xc0002) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6c5", 0x4) sendmmsg$alg(r2, &(0x7f000000bec0)=[{0x0, 0x0, 0x0}], 0x1, 0x20008040) recvfrom$unix(r2, &(0x7f00000000c0)=""/246, 0xf6, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f000000a980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:50:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) clock_settime(0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSTAT(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="a2"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0x200, 0x0, 0x4, {0x7, @pix={0x2, 0x800, 0x31324d59, 0x5, 0x1ff, 0x8000, 0xb, 0x4, 0x1, 0x4, 0x0, 0x5}}}) 04:50:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x9) 04:50:50 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x4030585c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$getown(r0, 0x9) ptrace$getregset(0x4204, r1, 0x201, &(0x7f0000000080)={&(0x7f0000000000)=""/67, 0x43}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000200)) fallocate(r0, 0x2, 0x100, 0x5) 04:50:50 executing program 3: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x70001) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x7ffe, 0x0) fremovexattr(r1, &(0x7f0000000100)=@known='system.sockprotoname\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x200, 0x0, 0x2, 0x7}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000000c0)={0xaa3, r2, 0x10001, 0x100}) fremovexattr(r0, &(0x7f0000000140)=@known='com.apple.FinderInfo\x00') sendmmsg(r0, &(0x7f00000074c0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="acfe105401000000b78a57c2", 0xc}], 0x1}}], 0x1, 0x0) 04:50:50 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x800454d2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f00000002c0)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x20000, 0x0) r1 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)=')selinux)security,\x00', 0xffffffffffffffff) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r1, 0xcf, 0x94}, 0x0, &(0x7f0000000380)="a2e2f0e6f8c88533356afd83a36af938c769781e45c65004c79532393dd545136e15c37e326bba99f8976da9e25a1b76427c6a2fa8804178846bb861fecd72d2d246fb1d579290dc438513f0ba70602156300b29537dc97226928629fdfde06c7903d23eb5c6e89907dc4f1f5f6c6b8cfbd515a556122128deae6ba27ebce8ae94b1d10780aed5864d22a94500de2e9b988745a3f3723b8f27577d46ba0f71215828d40192a2b54cb5e51a0a553e12e892fbc01f0e9612cb76e8698ae8a282e45569d0a210023b6fef909ea3da51f1", &(0x7f0000000480)=""/148) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x1, 0xd0, &(0x7f0000000040)="c9a3f139f36f6d53c011f7996ca2a12c6042c85fd74b28af2b9d94256ad856330085620d67837b3d29d6547124b029a670033954f6fe718ff4f36b3b1815d5881c87e3906a79b717ac57db61c44ef551d62ecdb98a6b7864e4345dad5da78385b237a40386dd83ee98978e13c2118261b3211d025717a78525e91596af5e78a8eb9bffc0cbb6d743215253ca518b694a49c3ab86be5e2a5ba3c994d2a6fd330765fd79025a912ef23b81c7c857605aeffc9267e16ae50dd2dfc586baf5e97b108a5aa53aff940a14868c7b3e464fef34"}) 04:50:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x105100) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000180)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000100)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7f, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000000000000000000002"]) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f00000000c0)={0x0, 0x105}) 04:50:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x14) 04:50:50 executing program 2: sched_setattr(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x1a, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 04:50:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 04:50:50 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f0000000300)={0x500, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80100) write$vhci(r1, &(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, "b33dc3094d69db1d000e1398fa17fc98b595577caface99290586ede9e06148ea130a64403b7da"}, 0x28) 04:50:50 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0x80086301, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:50 executing program 3: r0 = userfaultfd(0x80002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000000)={0x80000004}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 04:50:50 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x15) [ 202.869547][ T27] audit: type=1804 audit(1565153450.950:31): pid=11345 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir435021803/syzkaller.RYI4Nv/47/bus" dev="sda1" ino=16623 res=1 04:50:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x14) 04:50:51 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) [ 203.073546][T11369] page:ffffea00014e3640 refcount:2 mapcount:1 mapping:ffff888093e29129 index:0x200d9 04:50:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@remote}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, &(0x7f00000004c0)) getpgid(0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x80000000, [0x3f99, 0x0, 0x100000000, 0x0, 0x2, 0x6]}, 0x5c) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockname$netlink(r2, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x0, 0x4, 0x6, 0x7}, {0x0, 0x10000, 0x5, 0xfffffffffffff801}]}, 0x10) getegid() fchown(0xffffffffffffffff, 0x0, r1) mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, r2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) prctl$PR_SET_KEEPCAPS(0x8, 0x1) [ 203.114375][T11369] anon [ 203.114389][T11369] flags: 0x1fffc000008002d(locked|uptodate|dirty|active|swapbacked) [ 203.127107][T11369] raw: 01fffc000008002d dead000000000100 dead000000000122 ffff888093e29129 [ 203.136341][T11369] raw: 00000000000200d9 0000000000000000 0000000200000000 ffff88806330ed40 04:50:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000180)=ANY=[], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r0, &(0x7f0000000040)=""/8, 0x8, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000080)) 04:50:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mprotect(&(0x7f0000031000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x14) [ 203.170267][T11369] page dumped because: VM_BUG_ON_PAGE(PageActive(page)) [ 203.209036][T11369] page->mem_cgroup:ffff88806330ed40 [ 203.237276][T11369] ------------[ cut here ]------------ [ 203.242767][T11369] kernel BUG at mm/vmscan.c:1156! [ 203.304900][T11369] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 203.311010][T11369] CPU: 1 PID: 11369 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190806 #60 [ 203.320122][T11369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.330183][T11369] RIP: 0010:shrink_page_list+0x2872/0x5430 [ 203.336000][T11369] Code: d9 ea ff ff e8 5f 26 dd ff 4c 8d 6b ff e9 1c db ff ff e8 51 26 dd ff 48 8b bd 10 ff ff ff 48 c7 c6 00 88 93 87 e8 0e 12 07 00 <0f> 0b e8 37 26 dd ff be 08 00 00 00 4c 89 ef e8 fa f3 17 00 4c 89 [ 203.355621][T11369] RSP: 0018:ffff888059c97598 EFLAGS: 00010246 [ 203.361693][T11369] RAX: 0000000000040000 RBX: 0000000000000020 RCX: ffffc90005f3d000 [ 203.369678][T11369] RDX: 0000000000040000 RSI: ffffffff819c1f07 RDI: ffffed100b392e97 [ 203.377748][T11369] RBP: ffff888059c97730 R08: 0000000000000021 R09: ffffed1015d260d9 [ 203.385719][T11369] R10: ffffed1015d260d8 R11: ffff8880ae9306c7 R12: dffffc0000000000 [ 203.393682][T11369] R13: ffffea00014e3640 R14: 0000000000000000 R15: ffffea00014e3648 [ 203.401642][T11369] FS: 00007f9e59b05700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 203.410558][T11369] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.417124][T11369] CR2: 00007fb72a941848 CR3: 00000000a3897000 CR4: 00000000001406e0 [ 203.425090][T11369] Call Trace: [ 203.428387][T11369] ? retint_kernel+0x2b/0x2b [ 203.433550][T11369] ? trace_hardirqs_on_caller+0x6a/0x240 [ 203.439179][T11369] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 203.444618][T11369] ? page_evictable+0x3b0/0x3b0 [ 203.449459][T11369] ? retint_kernel+0x2b/0x2b [ 203.454043][T11369] ? lock_downgrade+0x920/0x920 [ 203.458914][T11369] ? put_page+0x66/0x130 [ 203.464091][T11369] ? check_memory_region+0x53/0x1a0 [ 203.469265][T11369] reclaim_pages+0x3b8/0x8f0 [ 203.473838][T11369] ? reclaim_clean_pages_from_list+0xc80/0xc80 [ 203.480052][T11369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.486275][T11369] ? lock_downgrade+0x920/0x920 [ 203.491100][T11369] ? __kasan_check_read+0x11/0x20 [ 203.496102][T11369] ? _raw_spin_unlock_irq+0x5e/0x90 [ 203.501279][T11369] ? __kasan_check_read+0x11/0x20 [ 203.506301][T11369] ? do_raw_spin_unlock+0x57/0x270 [ 203.511397][T11369] madvise_cold_or_pageout_pte_range+0x2264/0x2e20 [ 203.517914][T11369] ? swapin_walk_pmd_entry+0x670/0x670 [ 203.523367][T11369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.529602][T11369] ? futex_wait_queue_me+0x3cc/0x590 [ 203.534867][T11369] ? swapin_walk_pmd_entry+0x670/0x670 [ 203.540312][T11369] __walk_page_range+0xd2a/0x1680 [ 203.544009][ T27] audit: type=1804 audit(1565153451.390:32): pid=11389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir435021803/syzkaller.RYI4Nv/47/bus" dev="sda1" ino=16623 res=1 [ 203.545342][T11369] walk_page_range+0x1a6/0x3e0 [ 203.545365][T11369] madvise_pageout_page_range.isra.0+0xdd/0x120 [ 203.580082][T11369] ? madvise_cold+0x210/0x210 [ 203.584751][T11369] ? swapin_walk_pmd_entry+0x670/0x670 [ 203.590229][T11369] ? __kasan_check_write+0x14/0x20 [ 203.595361][T11369] madvise_pageout+0x227/0x3a0 [ 203.600219][T11369] ? madvise_pageout_page_range.isra.0+0x120/0x120 [ 203.606701][T11369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.612937][T11369] ? vmacache_update+0x114/0x140 [ 203.617853][T11369] ? find_vma+0x30/0x170 [ 203.622079][T11369] __x64_sys_madvise+0x719/0x1500 [ 203.627111][T11369] ? madvise_free_pte_range+0x2580/0x2580 [ 203.632806][T11369] ? 0xffffffff81000000 [ 203.636974][T11369] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 203.643057][T11369] ? trace_hardirqs_off_caller+0x65/0x230 [ 203.648774][T11369] do_syscall_64+0xfa/0x760 [ 203.653259][T11369] ? do_syscall_64+0xfa/0x760 [ 203.657927][T11369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.663812][T11369] RIP: 0033:0x459829 [ 203.667684][T11369] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.687265][T11369] RSP: 002b:00007f9e59b04c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 203.695659][T11369] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 203.703645][T11369] RDX: 0000000000000015 RSI: 0000000000600000 RDI: 00000000200d9000 [ 203.711616][T11369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.719582][T11369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e59b056d4 [ 203.727554][T11369] R13: 00000000004c5c85 R14: 00000000004da530 R15: 00000000ffffffff [ 203.735527][T11369] Modules linked in: [ 203.742213][T11369] ---[ end trace 7dfed50971c6a12c ]--- [ 203.748280][T11369] RIP: 0010:shrink_page_list+0x2872/0x5430 [ 203.752380][ T27] audit: type=1804 audit(1565153451.830:33): pid=11390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir435021803/syzkaller.RYI4Nv/47/bus" dev="sda1" ino=16623 res=1 [ 203.754746][T11369] Code: d9 ea ff ff e8 5f 26 dd ff 4c 8d 6b ff e9 1c db ff ff e8 51 26 dd ff 48 8b bd 10 ff ff ff 48 c7 c6 00 88 93 87 e8 0e 12 07 00 <0f> 0b e8 37 26 dd ff be 08 00 00 00 4c 89 ef e8 fa f3 17 00 4c 89 [ 203.798309][T11369] RSP: 0018:ffff888059c97598 EFLAGS: 00010246 04:50:51 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000140)=@v2={0x2000000, [{}, {0x0, 0xffff}]}, 0x14, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000180065040400010000000404000001007d60b71f000d0000000051008500000026000000b7000000010000000000000000000e007e96187659022eec60647f5130e18205b4081bb79e47feed30b9c99f98b4eb7be9a87db03f324cf93abbfe2cf9495ef12a41bef70000000000007fff0384dcdecc29ad7dc5bd1b3b9aa369911974295f1dc75c7b0511b45e1ca4060000000000000092df10e7d19083ebe2be162d0127fb866f83d3d3c689edab2efa61cb9c2ed704be0812fd0bc5c4881df764b615c8c4cc172abe8b2ba5ef4441efebe8812befb2fb168286325b4f01e1cc8d1eb5f1cab17d1a032197affcbc56efab5056d844396bdd9950a0b5cb019fbc75e954807eb187ec40cae4eb9a03f4cc8463be21cce7a218900b368468d92d1ba82526d2ca19e0119b0e61656a83167c8cd1a5260f7d0bfe68f6c49ee072c1a0d47fc36d1939e3822b213bbb83b6df93d342f597eacea5dbfd32474a27160eaff122a9b821c627e9ce13d2d3d980db2b5c3caea54ad889f0e5400488e4024445d352a49f9517267a137648cc"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) 04:50:51 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0xc0189436, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 04:50:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000000ffffff, 0x8000000000090b1, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x40, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) munlock(&(0x7f0000002000/0x2000)=nil, 0x2000) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 203.806428][T11369] RAX: 0000000000040000 RBX: 0000000000000020 RCX: ffffc90005f3d000 [ 203.818698][ T3880] kobject: 'loop4' (0000000072645ae4): kobject_uevent_env [ 203.820420][T11380] kobject: 'batman_adv' (0000000025204840): kobject_uevent_env [ 203.826302][T11369] RDX: 0000000000040000 RSI: ffffffff819c1f07 RDI: ffffed100b392e97 [ 203.842197][ T3880] kobject: 'loop4' (0000000072645ae4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 203.852820][T11380] kobject: 'batman_adv' (0000000025204840): kobject_uevent_env: filter function caused the event to drop! [ 203.872522][T11380] kobject: 'batman_adv' (0000000025204840): kobject_cleanup, parent 0000000041b0bf94 [ 203.881024][T11369] RBP: ffff888059c97730 R08: 0000000000000021 R09: ffffed1015d260d9 [ 203.899254][ T3880] kobject: 'loop1' (000000004a88ecfe): kobject_uevent_env [ 203.907395][T11369] R10: ffffed1015d260d8 R11: ffff8880ae9306c7 R12: dffffc0000000000 [ 203.919622][ T3880] kobject: 'loop1' (000000004a88ecfe): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 203.934460][T11369] R13: ffffea00014e3640 R14: 0000000000000000 R15: ffffea00014e3648 [ 203.949571][T11380] kobject: 'batman_adv' (0000000025204840): calling ktype release 04:50:52 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#selfselfeth1!.cgroupself\x00', 0x7) fcntl$addseals(r0, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) [ 203.960277][T11369] FS: 00007f9e59b05700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 203.977034][ T3880] kobject: 'loop2' (000000001f58248c): kobject_uevent_env [ 203.996073][ T3880] kobject: 'loop2' (000000001f58248c): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:50:52 executing program 2: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10, 0x80800) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/15, &(0x7f0000000100)=0xf) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000080)=@fragment, 0x8) r2 = fcntl$dupfd(r0, 0x3891c3d789131df7, r1) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140)={0x9, 0x5, 0x3, 0xffffffffffffff01, 0x45}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000240)={{0x3, 0x1, 0x4d09, 0x80000001, 0x1, 0x6}, 0x3056, 0x8, 0x3ff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x80, 0x111080) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x8, 0xffffffff7fffffff, 0xc1, 0x8001}) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e21, 0xbd95, @mcast1, 0x7}, {0xa, 0x4e20, 0xf75, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x8, [0x7, 0x4, 0x5, 0x1f, 0x100000000, 0x100000000, 0x1eba, 0x8000]}, 0x5c) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000003a80)=""/69, &(0x7f0000003b00)=0x45) [ 204.002074][T11380] kobject: (0000000025204840): dynamic_kobj_release [ 204.006924][T11369] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.025628][T11369] CR2: 0000000000d50f98 CR3: 00000000a3897000 CR4: 00000000001406f0 [ 204.047414][ T3880] kobject: 'loop4' (0000000072645ae4): kobject_uevent_env [ 204.055301][T11369] Kernel panic - not syncing: Fatal exception [ 204.062399][T11369] Kernel Offset: disabled [ 204.066716][T11369] Rebooting in 86400 seconds..