[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 59.152613][ T26] audit: type=1800 audit(1569332157.720:25): pid=8773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 59.194533][ T26] audit: type=1800 audit(1569332157.720:26): pid=8773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 59.215528][ T26] audit: type=1800 audit(1569332157.720:27): pid=8773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2019/09/24 13:36:09 fuzzer started 2019/09/24 13:36:10 dialing manager at 10.128.0.26:42355 2019/09/24 13:36:10 syscalls: 2338 2019/09/24 13:36:10 code coverage: enabled 2019/09/24 13:36:10 comparison tracing: enabled 2019/09/24 13:36:10 extra coverage: extra coverage is not supported by the kernel 2019/09/24 13:36:10 setuid sandbox: enabled 2019/09/24 13:36:10 namespace sandbox: enabled 2019/09/24 13:36:10 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/24 13:36:10 fault injection: enabled 2019/09/24 13:36:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/24 13:36:10 net packet injection: enabled 2019/09/24 13:36:10 net device setup: enabled 13:38:24 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0xfffffffffffffffc}) 13:38:24 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000000)={r2, @in6={{0x2, 0x0, 0x0, @loopback}}}, &(0x7f0000000180)=0x90) syzkaller login: [ 205.896139][ T8939] IPVS: ftp: loaded support on port[0] = 21 13:38:24 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x875c, 0x0, 0x4c51a1c6}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) add_key$user(0x0, &(0x7f0000000080)={'syz'}, &(0x7f0000000140)="f7f1", 0x2, 0xfffffffffffffffd) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 206.092156][ T8939] chnl_net:caif_netlink_parms(): no params data found [ 206.113211][ T8942] IPVS: ftp: loaded support on port[0] = 21 [ 206.180703][ T8939] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.189757][ T8939] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.198972][ T8939] device bridge_slave_0 entered promiscuous mode [ 206.219490][ T8939] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.226698][ T8939] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.235964][ T8939] device bridge_slave_1 entered promiscuous mode [ 206.310902][ T8939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.329972][ T8946] IPVS: ftp: loaded support on port[0] = 21 [ 206.353769][ T8939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.391802][ T8939] team0: Port device team_slave_0 added [ 206.401179][ T8939] team0: Port device team_slave_1 added [ 206.414877][ T8942] chnl_net:caif_netlink_parms(): no params data found 13:38:25 executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x13, &(0x7f00000001c0)={@multicast2, @local}, 0x10) [ 206.602827][ T8939] device hsr_slave_0 entered promiscuous mode 13:38:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x15, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) select(0x40, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000500)) [ 206.643097][ T8948] IPVS: ftp: loaded support on port[0] = 21 [ 206.667980][ T8939] device hsr_slave_1 entered promiscuous mode [ 206.785126][ T8939] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.792482][ T8939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.800456][ T8939] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.807600][ T8939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.839727][ T8942] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.846837][ T8942] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.860734][ T8942] device bridge_slave_0 entered promiscuous mode [ 206.894388][ T8942] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.903930][ T8942] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.913578][ T8942] device bridge_slave_1 entered promiscuous mode [ 206.965317][ T8951] IPVS: ftp: loaded support on port[0] = 21 13:38:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000dc0)=ANY=[@ANYRES16, @ANYBLOB="886e7815d1a8829391adac627e61dfbbe0e567a8204ec5f9e729bb42719bcded5b41d40b474478e357c9b43dfd91038aa48356db1d70be67f8a208e856932e"], 0x41) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) [ 207.022071][ T8942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 207.036682][ T8942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 207.117859][ T8942] team0: Port device team_slave_0 added [ 207.123920][ T8946] chnl_net:caif_netlink_parms(): no params data found [ 207.145091][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.169866][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.179039][ T8955] IPVS: ftp: loaded support on port[0] = 21 [ 207.192126][ T8942] team0: Port device team_slave_1 added [ 207.232079][ T8939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.289313][ T8942] device hsr_slave_0 entered promiscuous mode [ 207.348933][ T8942] device hsr_slave_1 entered promiscuous mode [ 207.387703][ T8942] debugfs: Directory 'hsr0' with parent '/' already present! [ 207.476287][ T8946] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.483950][ T8946] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.492191][ T8946] device bridge_slave_0 entered promiscuous mode [ 207.520443][ T8948] chnl_net:caif_netlink_parms(): no params data found [ 207.530259][ T8946] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.539125][ T8946] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.549309][ T8946] device bridge_slave_1 entered promiscuous mode [ 207.556941][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.566652][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.579639][ T8939] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.638377][ T8946] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 207.688571][ T8946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 207.715301][ T8946] team0: Port device team_slave_0 added [ 207.727022][ T8946] team0: Port device team_slave_1 added [ 207.747170][ T8951] chnl_net:caif_netlink_parms(): no params data found [ 207.759232][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.771948][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.781120][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.788271][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.819903][ T8948] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.827107][ T8948] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.835574][ T8948] device bridge_slave_0 entered promiscuous mode [ 207.844586][ T8948] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.851798][ T8948] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.859996][ T8948] device bridge_slave_1 entered promiscuous mode [ 207.883070][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.894708][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.903569][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.910686][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.970174][ T8946] device hsr_slave_0 entered promiscuous mode [ 208.018052][ T8946] device hsr_slave_1 entered promiscuous mode [ 208.067776][ T8946] debugfs: Directory 'hsr0' with parent '/' already present! [ 208.084417][ T8948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.096099][ T8948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.143785][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.202059][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.211214][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.220385][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.229522][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.238386][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.246900][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 208.256776][ T8955] chnl_net:caif_netlink_parms(): no params data found [ 208.289831][ T8948] team0: Port device team_slave_0 added [ 208.314341][ T8948] team0: Port device team_slave_1 added [ 208.322364][ T8951] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.330123][ T8951] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.340215][ T8951] device bridge_slave_0 entered promiscuous mode [ 208.349548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.358507][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.384783][ T8939] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 208.397220][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.406775][ T8955] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.415984][ T8955] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.424755][ T8955] device bridge_slave_0 entered promiscuous mode [ 208.432808][ T8951] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.440814][ T8951] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.449313][ T8951] device bridge_slave_1 entered promiscuous mode [ 208.456401][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.467004][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.551669][ T8948] device hsr_slave_0 entered promiscuous mode [ 208.618099][ T8948] device hsr_slave_1 entered promiscuous mode [ 208.657628][ T8948] debugfs: Directory 'hsr0' with parent '/' already present! [ 208.665331][ T8955] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.672667][ T8955] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.681244][ T8955] device bridge_slave_1 entered promiscuous mode [ 208.701567][ T8942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.726996][ T8951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.748218][ T8951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.771105][ T8955] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.782602][ T8955] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.804480][ T8946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.813278][ T8951] team0: Port device team_slave_0 added [ 208.825551][ T8951] team0: Port device team_slave_1 added [ 208.834231][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.843423][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.853020][ T8942] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.875900][ T8946] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.893513][ T8955] team0: Port device team_slave_0 added [ 208.900737][ T8955] team0: Port device team_slave_1 added [ 208.909109][ T8939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.920427][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.929312][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.937560][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.946169][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.954922][ T8950] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.962298][ T8950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.031027][ T8951] device hsr_slave_0 entered promiscuous mode [ 209.087823][ T8951] device hsr_slave_1 entered promiscuous mode [ 209.127631][ T8951] debugfs: Directory 'hsr0' with parent '/' already present! [ 209.150674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.159088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.169979][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.179379][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.186453][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.195225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.204536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.213678][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.222818][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.230040][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.238341][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.246995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.257706][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.266145][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.273337][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.282334][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.320747][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.330691][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.348618][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.360542][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.369263][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.378732][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.398333][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.406304][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 13:38:28 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$evdev(0xffffffffffffffff, 0x0, 0xfffffffffffffdbd) ioctl$CAPI_INSTALLED(r0, 0x80024322) [ 209.415810][ T8957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 13:38:28 executing program 0: 13:38:28 executing program 0: [ 209.490411][ T8955] device hsr_slave_0 entered promiscuous mode 13:38:28 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x3, 0x0, 0x0, 0x0, {0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) [ 209.532586][ T8955] device hsr_slave_1 entered promiscuous mode 13:38:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000340)={0x8, 0x1}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x54, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 209.577659][ T8955] debugfs: Directory 'hsr0' with parent '/' already present! [ 209.614138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.628531][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.634429][ T8975] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 209.644460][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.669622][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.690716][ T8942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 209.719198][ T8942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.755216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.763857][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.772639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.781524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.791360][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.799878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.817888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.827498][ T8946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.879623][ T8946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.899179][ T8948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.910309][ T8942] 8021q: adding VLAN 0 to HW filter on device batadv0 13:38:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x103, 0x1}, 0x20) dup3(r0, r1, 0x80000) [ 209.979585][ T8948] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.000390][ T8951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.011599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.020662][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:38:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="e6", 0x1}], 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000084000000070000000000000c00000000180000000000000084000000000000000000000088f84d98"], 0x30}, 0x0) [ 210.072386][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.095362][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.128182][ T8950] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.135391][ T8950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.182724][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.200882][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.210063][ T8950] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.217191][ T8950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.227918][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.243430][ T8951] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.276740][ T8955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.298335][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.307133][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.335065][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.357206][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 13:38:29 executing program 1: [ 210.417046][ T8955] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.468371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.477232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.502973][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.520027][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.528975][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.537012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.545562][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.554575][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.570926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.579896][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.588723][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.595820][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.603907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.623726][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.633405][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.640525][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.654345][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.669624][ T8948] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.683536][ T8948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.704926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.714431][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.722802][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.736346][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.745353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.766827][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.775626][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.782748][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.796539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.807033][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.827541][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.836383][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.845686][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.861255][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.874822][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.895427][ T8951] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 210.907649][ T8951] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.933298][ T8948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.946578][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.957253][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.975855][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.983020][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.997810][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.006424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.021780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.034501][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.046079][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.057367][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.100210][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.112899][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.126918][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.143022][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.154212][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.170027][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.182434][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 13:38:29 executing program 2: [ 211.193668][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.206504][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.220295][ T8951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.248991][ T8955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.268922][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.353004][ T8955] 8021q: adding VLAN 0 to HW filter on device batadv0 13:38:29 executing program 3: 13:38:30 executing program 4: 13:38:30 executing program 5: 13:38:30 executing program 0: 13:38:30 executing program 1: 13:38:30 executing program 2: 13:38:30 executing program 3: 13:38:30 executing program 3: 13:38:30 executing program 4: 13:38:30 executing program 1: 13:38:30 executing program 5: 13:38:30 executing program 2: 13:38:30 executing program 0: 13:38:30 executing program 4: 13:38:30 executing program 3: 13:38:30 executing program 4: 13:38:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) accept$unix(r0, 0x0, 0x0) 13:38:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) getpeername(r0, 0x0, 0x0) 13:38:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) fstatfs(r0, 0x0) 13:38:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 13:38:30 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) 13:38:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x12181) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) syz_open_dev$rtc(&(0x7f00000001c0)='/dev/rtc#\x00', 0x1000, 0x4b90840a8129a6a0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000004", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}], 0x20) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r5, 0x7}, &(0x7f0000000140)=0x8) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffff}) r6 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000000)={0x2, 0x6adc, 0x9, 0x38ef}) 13:38:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="0080000000000000240012001000010069703665727370616e000000100002000400120000000500030000008d64370e121d6afbe38a15bf50adbac95b17ae47d03970670681fec8a2d1696543e4b9688ccd042f78d5c524b97cdc894243c6d06bae8da02fb3e047b267afc975bbfdead1243c5f3aeac1e0f615fc0df52d33bbaab6d0228d3a62cb0d057caed75a8f848410fcb4c85f0e3d86e01e056060dbce075eb6ea5df50d730b14665ec57350d45679ab1ed38f7f12497e8a53f52356"], 0x44}}, 0x0) 13:38:30 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$inet_sctp(0x2, 0x1, 0x84) mount(&(0x7f0000001940)=@md0='/dev/md0\x00', &(0x7f0000001980)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000019c0)='befs\x00', 0x10cc05, &(0x7f0000001a00)='/dev/sg#\x00') r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) ioctl$FIBMAP(r3, 0x2287, &(0x7f0000001380)) sendmmsg(r3, &(0x7f00000018c0)=[{{&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x3, @empty, 'vlan0\x00'}}, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="04518784677d8786b9927f9e7ebe738264d2465469fcd31e89cd4bf5ed389ee9ce55e2764e69a1e2cd7e60496054b70c4432d7cbc4d3e547b2c6691652c5036ae9e2ba6cf34e31ce9a92b5fd815bf2809e01190a7cab4cb6d09273447c07372cd81f5c0f458756ce8a38f3"}, {&(0x7f0000000040)="d428ac6326b12b5e82bdbc1035d5fbba55e337d9beed102a90eb91c7208d750eda5b"}, {&(0x7f0000000200)="64cb46b582749842299f71ac6ca9c3b91a34d88b9149763004e617a4c3c509ee3d2ad903c62d0399534402d6b0acbeaddc15617c688caa23459936170b526d1b65062b56f0d4ba5ec9b54c8c2e578b048d5b0a777d36f82966cf38217f01040a227a6454fe48cc8cbc0752891717529c21b68bcc84bd8ec01df7907d77c512a52f4bc70713e4fbf8d72f27f3892708a782de91c257e74e43a2a66e83"}], 0x0, &(0x7f0000000300)=[{0x0, 0x110, 0x2, "50155db0e0da297e7689fd045252b6de8704c34070fa7ae69a8dd83170049eda65fdbe0fbf093e452e7eba7dc52497940ebcdbb459dbe6f909b5fd17331ba88ee00c9b107fb5db3e21c7b32defc3db4a48ef4223c0227987dc0e223920ddea004c9e1573c4c1c1ba2e44ac3356bf473d5099e58bc0d71f98711a9f230e1dca03cc041254ea8b1b937c7cdfa58097fd6e888a6522bcd0fe8fd9c78b16aa37e98eefa24b980c19db439130de90e934a8"}, {0x0, 0x109, 0x81, "2d3b4da11b8c453c52524115d78027aef390b4727ef5ec15d72d56103c21f32326109a69766c2935504d2edc95cc64b60f81ad71f0b0c125fb135c9f7e992a0add2f8bccd9dc43dfc0d96250165300ab0ead4fa0d24b580458b9f3fc53fb55d3056a595ebbf30915c7f561f76d20466ab10e825c4de862905613723a184c0787c9ba12cf32f78b3097cf29509beb827c787d7cfc45ed51cde84a79af2468797a960615a04db3d924dd2c16c7b9aaa9b4ee1d5f45f2cc3d178cce3d6c07e5153ea79a3c4f747d7205e8d01da7ef40a4d817faa6ecd7f5b1767a9bb67a153939f0da5693b7c46bc23fe1a9e12820c5"}, {0x0, 0x69603dad545811da, 0x7fff, "f814a577d212d3191b2da590b24331f5f583eb191e32216446de514f2b8f7c1b189d"}, {0x0, 0x0, 0x5, "c2b442b78ca5ad9d466baad18081bf9651b554593285a11e14d936fafe1f084d29886e6616fccf233444fec3ed59de48eae354c7a4149ccd38cab5a12ae963aaa07a6f7fc8d7b8e3942261eadc33b81bbbf74028ff81054262883eaa50d7106b38d9f203fd703455cb6c60805259585fd26e4b5d630896e162c12ccc12a39d31a811c9f039216dcccc4de59ca410f3491f5813b15591dc19b88df7c442b0dcfc21cb136cebc163da633e"}, {0x0, 0x1, 0x5, "5cec57d8f4bf8986f97306302b56dad842c96628b3b5a0dca7068f82625a31bd3742fe793021"}, {0x0, 0x100, 0x8, "a448fb361a5024b201b96667d2dca30f95a7fa37e835ee6958333bda4722f898f8422fc144b55d42af515d7bc1431c7f17bc57d530fa9973cc1acbb02cf8e58a11168b53bd48f8f5ca18314a46f26108b9eafd5e82e51a503396309a2bf82b48cbc28f5dec3d33"}, {0x0, 0x0, 0x2, "fbdef42f8bd75705680869e9d3d6f5633814c410f92e5a12fd0b7e9478719c277a118556383a5c9639183935be61b064b4a58fb161ff186aa7f5eb9c0d1ceb8ff5733626aba190ad25bb3f804f81d19cfc8d273bea45ada441331093062cb9f2492c95750d62439781c99a091f6512df69cf5570bccf734a40ee7ba505ff40bc43fd2fc856ed8f802b6daf7921eb68e0f7ed978f672bc6d3964b82856332f87ce3ef96736ac4a22406a1368479cbe4b36dbef5ddd50de41acfadd790"}, {0x0, 0x88, 0x7, "c904ee32075cea64e1d86af38f822763e563534f3c954ef0fa2f88e99d27d664259b5bca747c3be8e5f4d3092f80e62bf9a182c1c0174711c9f6f60ad632a4866338c1c1ef1aae17514e5a414a9e000c59169cb9bdbd43065b97824ceefb0af84d635f2794edfa8f6d6c4baf55841a26943adf23fb8efc6275"}]}}, {{&(0x7f0000000800)=@caif=@dbg={0x25, 0x40, 0x5}, 0x0, &(0x7f0000001880)=[{&(0x7f0000000880)="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"}]}}], 0x266, 0x24000844) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) poll(&(0x7f0000000000)=[{r4, 0x200}], 0x1, 0x0) close(r0) 13:38:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=@profile={'stack ', ':://em0ppp1vboxnet0-user\x00'}, 0x1f) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) ioctl$FIBMAP(r3, 0x2287, &(0x7f0000001380)) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r6) 13:38:31 executing program 4: futex(0x0, 0x84, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4ea31f527f26c0bf) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000040)={{0x2, 0x3, 0x0, 0x0, 0x9}, 0x9, 0x5, 0x1000}) 13:38:31 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x80) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1612c0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$FIBMAP(r4, 0x2287, &(0x7f0000001380)) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000200)={'syzkaller1\x00', {0x2, 0x4e20, @multicast1}}) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x7ff, 0x7fff, 0xffffffff80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x80, 0x0, 0x9, 0x0, 0xffffffffffff3b45, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x7fffffff, 0x0, 0x3ff, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x80000000}, 0x0, 0x7fff, 0x0, 0x1, 0x3ff, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0xb) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x1}, 0x116) sendmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x24000004) [ 212.475256][ T9066] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 212.642569][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 212.642583][ T26] audit: type=1400 audit(1569332311.210:31): apparmor="DENIED" operation="stack" info="label not found" error=-2 profile="unconfined" name=":://em0ppp1vboxnet0-user" pid=9070 comm="syz-executor.0" 13:38:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x9}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) open(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getrusage(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) lstat(0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x100000095, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='westwood\x00', 0x9) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x179) openat$pfkey(0xffffffffffffff9c, 0x0, 0x100, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xb67163c3fd4392cf, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0x100000278) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0xfffffffffffffeae, 0x0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000000c0)="6e93dd2f0c51ca2665c758b67453b5ea3d9ebac6bf36083c9219defdfa6cd8c3fd8e0835c4f1e1a1d77f5c30f9f5308dd7894f68f53126fdf8111df628bed4fa7ba205f6bd535c66043e175b6a4f0c6a5b756e274156ec3c5b4ae5dd51fbc058b06831bb48dc501fb16e6be9fccd93a34ecb4aa71ce7709c4aa2f623c00880ab65cb76989dafae66872ddff06df6c5de94cfc1a0b5a43513783f59b241f4705b097dfb4fb5148efd5fac8abbafc45adb0042b90d52a089c6384f3bd779c32222e132006e25bcd9a68f4c00f03192656d93239ccc3f3a64e4995dfd71c0e84fb206a79978a2f62b", 0xffffffffffffffeb, 0x4000884, 0x0, 0xffffffffffffffd6) 13:38:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001e008109e00f80ecdb4cb92e0a48240b5a44fe0be8bd6efb080008000100000001000000060005001200", 0x2e}], 0x1}, 0x0) [ 212.691718][ C1] hrtimer: interrupt took 42403 ns [ 212.707250][ T26] audit: type=1400 audit(1569332311.260:32): apparmor="DENIED" operation="stack" info="label not found" error=-2 profile="unconfined" name=":://em0ppp1vboxnet0-user" pid=9070 comm="syz-executor.0" 13:38:31 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, 0x0, 0x0) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r7 = dup(r6) ioctl$FIBMAP(r7, 0x2287, &(0x7f0000001380)) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000055c0)={{{@in, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xfffffffffffffe4f) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000005700)={'team0\x00'}) getpeername(r2, &(0x7f0000005800)=@can, &(0x7f0000005880)=0x80) r8 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r9 = dup(r8) ioctl$FIBMAP(r9, 0x2287, &(0x7f0000001380)) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000008b80)={{{@in=@remote, @in=@broadcast}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000008c80)=0xffffffffffffffc1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000008d80)={'irlan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000008dc0)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000008ec0)=0xfffffffffffffded) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x6, 0x6a6}, 0xc) getsockname$packet(r0, &(0x7f0000008f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008f40)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f000000a500)={@empty, @dev}, &(0x7f000000a540)=0xc) recvmsg$kcm(r1, &(0x7f000000a7c0)={&(0x7f000000a580)=@can, 0x80, &(0x7f000000a740)=[{&(0x7f000000a600)=""/51, 0x33}, {&(0x7f000000a640)=""/190, 0xbe}, {&(0x7f000000a700)=""/62, 0x3e}], 0x3, &(0x7f000000a780)=""/22, 0x16}, 0x2) ftruncate(r1, 0x7) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f000000a800)={@empty, @loopback}, &(0x7f000000a840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f000000adc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x4) 13:38:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000000)={'eql\x00\x00\x00\xa9[\x00', @ifru_map={0x80000002}}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x304) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00', @ifru_settings={0x81, 0x0, @sync=&(0x7f00000000c0)={0xa43, 0x6, 0xfe01}}}) [ 212.852980][ T9088] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 13:38:31 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x80) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1612c0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$FIBMAP(r4, 0x2287, &(0x7f0000001380)) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000200)={'syzkaller1\x00', {0x2, 0x4e20, @multicast1}}) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x7ff, 0x7fff, 0xffffffff80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x80, 0x0, 0x9, 0x0, 0xffffffffffff3b45, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x1, 0x7fffffff, 0x0, 0x3ff, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x80000000}, 0x0, 0x7fff, 0x0, 0x1, 0x3ff, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0xb) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x1}, 0x116) sendmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x24000004) [ 212.940854][ T9095] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 13:38:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e0000001e008109e00f80ecdb4cb92e0a48240b5a44fe0be8bd6efb080008000100000001000000060005001200", 0x2e}], 0x1}, 0x0) [ 213.058580][ T9098] eql: mtu less than device minimum [ 213.179688][ T9109] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 213.255822][ T9098] eql: mtu less than device minimum 13:38:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000340)=[{0x100040}, {0x6}]}, 0x10) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000380)={0x0, @reserved}) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) bind$packet(r1, &(0x7f0000000280)={0x11, 0x3, r2, 0x1, 0x3, 0x6, @dev={[], 0x12}}, 0x14) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:38:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000080)="11f0a505ba583bcb7bf070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffd57, &(0x7f00000013c0), 0x10000000000001a3}, 0x41) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast1, @local}, &(0x7f0000000040)=0xc) 13:38:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl(r0, 0x8, &(0x7f0000000080)="11dc0a1dba3290e2f9963f37ec9bc29eff0000") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$FIBMAP(r4, 0x2287, &(0x7f0000001380)) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r6 = dup(r5) ioctl$FIBMAP(r6, 0x2287, &(0x7f0000001380)) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x110, r6, 0x0) write$P9_RCLUNK(r4, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f0000000100)=0x4, 0x4) close(r2) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000040)) 13:38:32 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8001, 0x0) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000040)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x20000, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000000c0)={0x1bc5, 0x5, 0x4, {0xc, @vbi={0xfffffff7, 0x100, 0x6, 0x34363248, [0x5, 0x3], [0x6, 0xfff], 0x1}}}) 13:38:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x284000, 0x0) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={r5, 0xb4, "7be589e612453722d749f817282171b3579762d15fe252ab9ea7a9b7900e8ac8435d76f5417584721f753cfe357f7d6cd9b1cbebf99450033aab8d957bd6cd8fd66d37f12ecab775c9cfa84569c357b4d40e8b7c6d05934607bf5d515df35131ecbcdf6fcc6224c3a9c5c8f9531fe6deaf6f37cefa7fd0f1a47cd022395a3ef3d22f5431aad37ea0ee3e74dba00305ef7a8f79ed00eb2afa1a30f4b9fc7659cba9ae75adb1546e7fc0c048230370c2aae58a2660"}, &(0x7f0000000080)=0xbc) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090069000007a2e407edab0480582900000046008107a277001419000a000d000000000003f5680000000000ef38bf461e59d7", 0x39}], 0x1) 13:38:32 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$addseals(r2, 0x409, 0xe) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r3}, 0x10) bind$can_raw(r0, &(0x7f0000000000), 0x10) [ 213.507686][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 213.513783][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 213.521440][ T9126] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 213.608674][ T9126] bridge0: port 3(hsr0) entered blocking state [ 213.635324][ T9126] bridge0: port 3(hsr0) entered disabled state [ 213.659022][ T9126] device hsr0 entered promiscuous mode [ 213.665409][ T9126] bridge0: port 3(hsr0) entered blocking state [ 213.671798][ T9126] bridge0: port 3(hsr0) entered forwarding state 13:38:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f0000204000/0x2000)=nil, 0x2000) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) creat(&(0x7f0000000000)='./file0\x00', 0x4) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 13:38:32 executing program 3: r0 = socket(0x30002000000010, 0x3, 0x0) socketpair(0x10, 0x5, 0xb2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000540)='/dev/audio#\x00', 0x5, 0x408041) ioctl$NBD_DO_IT(r5, 0xab03) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507ebff00"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507ebff00"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r11, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r11, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0e5ba4eba9e39d3}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@mpls_getnetconf={0x2c, 0x52, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r11}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0xebdab488187fb89}, 0x4000000) sendmsg$nl_route_sched(r2, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) r13 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r14 = dup(r13) ioctl$FIBMAP(r14, 0x2287, &(0x7f0000001380)) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xb, 0x10001, 0x10001, 0x5, 0x221, 0xffffffffffffffff, 0x6, [], r6, r14, 0x1, 0x3}, 0x3c) ioctl$EXT4_IOC_GROUP_EXTEND(r15, 0x40086607, &(0x7f0000000180)=0x1) getsockopt$packet_buf(r1, 0x107, 0xafc3ebe59964c21a, &(0x7f0000000040)=""/136, &(0x7f0000000100)=0x88) write(r0, &(0x7f0000000800)="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", 0xfc) 13:38:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @ioapic={0x10000, 0x7, 0x6e86, 0x74, 0x0, [{0xd8, 0x0, 0x3, [], 0x3}, {0x2, 0x9, 0x8, [], 0x81}, {0x8, 0x44, 0x5, [], 0x4}, {0x1, 0x5, 0x7f, [], 0x84}, {0x20, 0x8, 0x46, [], 0x1}, {0x40, 0x81, 0x81, [], 0x6}, {0x3, 0x24, 0x6, [], 0x6}, {0x7d, 0xff, 0x7f, [], 0x1}, {0x81, 0xed, 0x8, [], 0x20}, {0x7, 0x8a, 0x1, [], 0x81}, {0x2, 0xff, 0x5, [], 0x5}, {0x2, 0xff, 0x9, [], 0x20}, {0x0, 0x6d, 0x7b, [], 0x20}, {0x5, 0x6, 0xc0}, {0x48, 0xca, 0x4, [], 0x9}, {0x40, 0x40, 0x3, [], 0x1}, {0x3, 0x0, 0x3f, [], 0xf7}, {0x81, 0x9, 0x0, [], 0x9}, {0x2, 0x2, 0x8, [], 0x81}, {0x4, 0x7, 0x9, [], 0xf5}, {0x8, 0x1, 0x6}, {0xeb, 0x80, 0x40, [], 0x4}, {0x6, 0x8, 0x0, [], 0x20}, {0x97, 0x8, 0x3, [], 0x42}]}}) r6 = dup(r3) r7 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r8 = dup(r7) ioctl$FIBMAP(r8, 0x2287, &(0x7f0000001380)) ioctl$KVM_GET_CPUID2(r8, 0xc008ae91, &(0x7f0000000400)={0x4, 0x0, [{}, {}, {}, {}]}) r9 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r9) fcntl$setpipe(r9, 0x407, 0x8e) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r10 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r11 = dup(r10) ioctl$FIBMAP(r11, 0x2287, &(0x7f0000001380)) ioctl$KVM_SET_USER_MEMORY_REGION(r11, 0x4020ae46, &(0x7f00000001c0)={0x601, 0x3, 0x1, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0x3ef94e9f) r12 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7b, 0x0) r13 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r14 = dup(r13) ioctl$FIBMAP(r14, 0x2287, &(0x7f0000001380)) ioctl$TCSETS(r14, 0x5402, &(0x7f0000000140)={0x1, 0x9, 0x7fffffff, 0x3, 0x9, 0x3a, 0x8, 0x1, 0x7, 0x4, 0x6}) setsockopt$SO_TIMESTAMP(r12, 0x1, 0x40, &(0x7f0000000100)=0x3, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:38:32 executing program 2: r0 = socket(0x2, 0x3, 0x67) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000040)={0x7fffffff, 0x80000001}) sendmmsg$sock(r0, &(0x7f0000004340)=[{{&(0x7f00000003c0)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000000440)=[@timestamping={{0x14}}], 0xffffffffffffff5f}}], 0x1, 0x0) 13:38:32 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) msgctl$IPC_STAT(0x0, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000005c0)={0x4, 0x0, 0x8, 0xffffffffffffffff, 0x12}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000017, 0xe764aff0c7d32875, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) clone(0x34004102, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$FIBMAP(r4, 0x2287, &(0x7f0000001380)) ioctl$FICLONE(r2, 0x40049409, r4) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) syz_open_dev$usbmon(&(0x7f0000003800)='/dev/usbmon#\x00', 0x0, 0x310000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="74f400002400f3a4e57486357640e000dbe6ff26", @ANYRES32=r5, @ANYBLOB="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"/485], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x4924acf, 0x0) 13:38:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$FIBMAP(r4, 0x2287, &(0x7f0000001380)) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f00000000c0)={0x40, 0x8000, 0x0, 0x20, 0xfff, 0x4}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7f, 0x0, [0x26a, 0x3], [0xc1]}) [ 213.971678][ T9158] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:935 [ 213.981324][ T9158] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 9158, name: syz-executor.3 [ 213.990770][ T9158] 2 locks held by syz-executor.3/9158: [ 213.996235][ T9158] #0: ffffffff899a0de0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 214.005180][ T9158] #1: ffff8880570e2c00 (&(&sch->q.lock)->rlock){+...}, at: sfb_change+0x257/0xe90 [ 214.014547][ T9158] Preemption disabled at: 13:38:32 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = msgget(0x2, 0x600) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000380)=""/102) setxattr$security_ima(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.\x00', &(0x7f0000000480)=@v1={0x2, "041211"}, 0x4, 0x0) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000100)=""/205) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') ptrace$setopts(0x4206, r1, 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x5, 0x102000) r5 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r6 = gettid() process_vm_readv(r6, &(0x7f0000000840)=[{&(0x7f00000004c0)}, {&(0x7f0000000500)=""/243, 0xf3}, {&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/26, 0x1a}, {&(0x7f0000000740)=""/179, 0xb3}, {&(0x7f0000000800)}], 0x6, &(0x7f0000000e80)=[{&(0x7f00000008c0)=""/116, 0x74}, {&(0x7f0000000940)=""/110, 0x6e}, {&(0x7f00000009c0)=""/69, 0x45}, {&(0x7f0000000a40)=""/43, 0x2b}, {&(0x7f0000000a80)=""/193, 0xc1}, {&(0x7f0000000b80)=""/4, 0x4}, {&(0x7f0000000bc0)=""/166, 0xa6}, {&(0x7f0000000c80)=""/193, 0xc1}, {&(0x7f0000000d80)=""/215, 0xd7}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0xa, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000000)={r9}, 0xc) socket$inet_sctp(0x2, 0x5, 0x84) r10 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r11 = dup(r10) ioctl$FIBMAP(r11, 0x2287, &(0x7f0000001380)) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r11, 0x84, 0x75, &(0x7f0000000100)={r9, 0x8e89}, 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000240)={r9, 0x3ffd, 0x7, 0x6}, &(0x7f0000000280)=0x10) [ 214.014570][ T9158] [] sfb_change+0x257/0xe90 [ 214.025140][ T9158] CPU: 0 PID: 9158 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 214.032614][ T9158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.043230][ T9158] Call Trace: [ 214.046554][ T9158] dump_stack+0x172/0x1f0 [ 214.050910][ T9158] ? sfb_change+0x257/0xe90 [ 214.055449][ T9158] ___might_sleep.cold+0x1fb/0x23e [ 214.060583][ T9158] __might_sleep+0x95/0x190 [ 214.065121][ T9158] __mutex_lock+0xc5/0x13c0 [ 214.069652][ T9158] ? tcf_chain0_head_change_cb_del.isra.0+0x34/0x3e0 [ 214.076350][ T9158] ? save_stack+0x5c/0x90 [ 214.080741][ T9158] ? save_stack+0x23/0x90 [ 214.080779][ T9158] ? mutex_trylock+0x2d0/0x2d0 [ 214.080796][ T9158] ? fifo_set_limit+0x1a9/0x210 [ 214.089878][ T9158] ? fifo_create_dflt+0x90/0xf0 [ 214.089892][ T9158] ? sfb_change+0x18d/0xe90 [ 214.089905][ T9158] ? tc_modify_qdisc+0xfcf/0x1c50 [ 214.089917][ T9158] ? rtnetlink_rcv_msg+0x463/0xb00 [ 214.089932][ T9158] ? netlink_rcv_skb+0x177/0x450 [ 214.089947][ T9158] ? rtnetlink_rcv+0x1d/0x30 [ 214.089961][ T9158] ? netlink_unicast+0x531/0x710 [ 214.089975][ T9158] ? netlink_sendmsg+0x8a5/0xd60 [ 214.089990][ T9158] ? sock_sendmsg+0xd7/0x130 [ 214.090001][ T9158] ? ___sys_sendmsg+0x803/0x920 [ 214.090018][ T9158] ? __sys_sendmsg+0x105/0x1d0 [ 214.099724][ T9158] ? __x64_sys_sendmsg+0x78/0xb0 [ 214.099742][ T9158] ? do_syscall_64+0xfa/0x760 [ 214.099758][ T9158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.099779][ T9158] ? __kasan_check_read+0x11/0x20 [ 214.099792][ T9158] ? mark_lock+0xc2/0x1220 [ 214.099811][ T9158] mutex_lock_nested+0x16/0x20 [ 214.099824][ T9158] ? mutex_lock_nested+0x16/0x20 [ 214.099840][ T9158] tcf_chain0_head_change_cb_del.isra.0+0x34/0x3e0 [ 214.099851][ T9158] ? __kasan_check_read+0x11/0x20 [ 214.099872][ T9158] ? mark_lock+0xc2/0x1220 [ 214.109390][ T9158] tcf_block_put_ext.part.0+0x2a/0x80 [ 214.109408][ T9158] tcf_block_put+0xbf/0x110 [ 214.109424][ T9158] ? tcf_block_put_ext+0x40/0x40 [ 214.109439][ T9158] ? sfb_destroy+0x80/0x80 [ 214.109455][ T9158] ? sfb_destroy+0x80/0x80 [ 214.109470][ T9158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.109485][ T9158] ? prandom_u32+0x7d/0xb0 [ 214.109500][ T9158] ? sfb_zero_all_buckets+0x20/0x20 [ 214.109513][ T9158] sfb_destroy+0x37/0x80 [ 214.109530][ T9158] qdisc_destroy+0x11f/0x630 [ 214.124178][ T9158] qdisc_put+0x85/0xa0 [ 214.124197][ T9158] sfb_change+0x3d8/0xe90 [ 214.124215][ T9158] ? __sanitizer_cov_trace_const_cmp1+0x10/0x20 [ 214.124237][ T9158] ? sfb_graft+0x5f0/0x5f0 [ 214.124261][ T9158] ? nla_strcmp+0xe3/0x120 [ 214.270818][ T9158] ? sfb_graft+0x5f0/0x5f0 [ 214.275220][ T9158] tc_modify_qdisc+0xfcf/0x1c50 [ 214.280077][ T9158] ? qdisc_create+0x1210/0x1210 [ 214.284933][ T9158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 214.291209][ T9158] ? qdisc_create+0x1210/0x1210 [ 214.296061][ T9158] rtnetlink_rcv_msg+0x463/0xb00 [ 214.301085][ T9158] ? rtnetlink_put_metrics+0x580/0x580 [ 214.307156][ T9158] ? netlink_deliver_tap+0x22d/0xbf0 [ 214.312429][ T9158] ? find_held_lock+0x35/0x130 [ 214.317181][ T9158] netlink_rcv_skb+0x177/0x450 [ 214.321941][ T9158] ? rtnetlink_put_metrics+0x580/0x580 [ 214.327384][ T9158] ? netlink_ack+0xb30/0xb30 [ 214.331967][ T9158] ? __kasan_check_read+0x11/0x20 [ 214.336980][ T9158] ? netlink_deliver_tap+0x254/0xbf0 [ 214.342272][ T9158] rtnetlink_rcv+0x1d/0x30 [ 214.346681][ T9158] netlink_unicast+0x531/0x710 [ 214.351520][ T9158] ? netlink_attachskb+0x7c0/0x7c0 [ 214.356618][ T9158] ? _copy_from_iter_full+0x25d/0x8a0 [ 214.361996][ T9158] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 214.367699][ T9158] ? __check_object_size+0x3d/0x437 [ 214.372992][ T9158] netlink_sendmsg+0x8a5/0xd60 [ 214.377761][ T9158] ? netlink_unicast+0x710/0x710 [ 214.382686][ T9158] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 214.388230][ T9158] ? apparmor_socket_sendmsg+0x2a/0x30 [ 214.393817][ T9158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.400086][ T9158] ? security_socket_sendmsg+0x8d/0xc0 [ 214.405553][ T9158] ? netlink_unicast+0x710/0x710 [ 214.410483][ T9158] sock_sendmsg+0xd7/0x130 [ 214.414888][ T9158] ___sys_sendmsg+0x803/0x920 [ 214.419554][ T9158] ? copy_msghdr_from_user+0x440/0x440 [ 214.425202][ T9158] ? __kasan_check_read+0x11/0x20 [ 214.430447][ T9158] ? __fget+0x384/0x560 [ 214.434594][ T9158] ? ksys_dup3+0x3e0/0x3e0 [ 214.439010][ T9158] ? __fget_light+0x1a9/0x230 [ 214.443674][ T9158] ? __fdget+0x1b/0x20 [ 214.447766][ T9158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 214.454529][ T9158] __sys_sendmsg+0x105/0x1d0 [ 214.459140][ T9158] ? __sys_sendmsg_sock+0xd0/0xd0 [ 214.464431][ T9158] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 214.470249][ T9158] ? do_syscall_64+0x26/0x760 [ 214.475099][ T9158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.481371][ T9158] ? do_syscall_64+0x26/0x760 [ 214.486252][ T9158] __x64_sys_sendmsg+0x78/0xb0 [ 214.491020][ T9158] do_syscall_64+0xfa/0x760 [ 214.495633][ T9158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.501518][ T9158] RIP: 0033:0x459a09 [ 214.505488][ T9158] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.526835][ T9158] RSP: 002b:00007fec3d6a8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 214.535252][ T9158] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 214.543221][ T9158] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000007 [ 214.551182][ T9158] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 214.559164][ T9158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec3d6a96d4 [ 214.567208][ T9158] R13: 00000000004c7933 R14: 00000000004dd328 R15: 00000000ffffffff [ 214.578685][ T9172] ptrace attach of "/root/syz-executor.5"[8955] was attempted by "/root/syz-executor.5"[9172] 13:38:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) close(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x48000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0x5, 0x0, 0x10001, 0xfe9266c8a82a988c, 0x19}) syz_emit_ethernet(0x0, 0x0, 0x0) 13:38:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='\xff\x92\xd5>oJH\x02u\xdb\x94a\x00\x00\b\x00\x00\x00\x00\x00\xfaU\x95\x1b\x97\t\xd4\xb0\xf0\x84?\xf0\xd0gi)-\x9e\xe3R\x9b\x972\xd1@\xa9\x17\xa3\xde\xb7ve\x9c\"2\x0e\xfcC\x15o\x00\xa6rs5\xc5\x8a\xefr\xcb\x1e\xda\xa3\xeb\xcc\xc3-\xc3\f\xf7I\x96\x02KH\xbb\x1b\x1b\x06\x02\xd0d\x8b\x8d7\xe6\xb5\x02\xac\xd6g\x00\x9a\r\r\">3\xf6\x13O\xc6\xd3\xe2\xd3\x9a\b\x80\x1b <\x81{\xc5\x0ek\xbf\xdcF_\xefT\xbb\x9c\"\x8c*_&p\xe5\xb3\xb9\xa9r\x11\xc7:4\xa0$\x1cY\x7f\xc8\x1cz\xc6\xf6jW\x96\xfd\x19C=\xe3\xfal\x93g\xf9M2\xfaXs\xe7;(\xd9:\xa7[\xd7*\xef\xad\x8e\xe1\tz\x11>E\x91@\x17\xb4]\x8f\xa5\xa2\x17Y#4\xedS\xb9\r\x91\xd2d\x99\xa0!\x91y\xce\x9f[\x01_\xfd\xdd\xea\x7f\x8a\xa5\x98\x98\xb2\x1e=\x95\x17\xac\x1c\x00\x00\x00\x00\x00\x00Fgx\rE\xab\xa1\xb74\xc1\xaeX\x93\x00\x88Z2\x92\xd7\xd8\x94\x05\x16\x1bRPW\xc7\x89\xedJ\x18\xdd\xbcM\xaf\xbcV\a\xb2\x7fo\xb34\x9f\xc2\xe1\xd1\x84\xec\xfc\xd5_6\xd0k\xe2\xa0\tQQ\x17Z\xc8-q\xc9\xd9\xe5\aZJ\x99P\xd4MZ\xb1\r\xa5\xc0X?\xdd6.\x98\xc2\x1aY\xed\x81lh\xa2\xbb$\xa9\xb5\x80c\x91C\x16\xa7\xd8\xb8e\xf0\xbe\xdc\xb0,\xa1\x9a\xacL<\xf5\x97.\xda\xcbC\xff\xa1\xd0@\xa6N\x84\x14w \x96\xe6;\x87\x1e\x80\x90\x1c3d\xac\xbb\xc9\x93\x0e\b\x15y\x9cqRP\xa2\x95\xc9\t\xf7i\x1b\x97z\n\xa33\x0fHH\xb7\xf9\xb9d\x00\xe9\xc2\x87\"\xd1\xa0\x86\xad\x9b\x8f\xa2\xa4\x1b\x14\xf9\xc3\x19,\xc2\x8f\xf9\\\x85#\xf0\xba\xe90BW\xe6\xf9\xbe\xf2\x14\xd9c\x8eE6{\x18p\x9b\n@\a%\x9c\x8f\xe8\xb3\xfd\xe6\xd3\x15>\xb9_{\xed2\xaci\xf5/D\x1c\xbd\xbe\xe8l\x92+R\x9a\x054t\x9ew\x05\x06f\xc5\xc9A\xe6xC\x8d4;', 0x2) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r1, 0x409, 0x5) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000040)) fallocate(r1, 0x0, 0x0, 0x6) [ 214.802999][ T9164] ptrace attach of "/root/syz-executor.5"[8955] was attempted by "/root/syz-executor.5"[9164] 13:38:33 executing program 0: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00000000c0)={0x7, 0x9, 0x100, 0x0, 0x0, 0x7}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) [ 214.950105][ T9190] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 13:38:33 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f0000000040)) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f00000001c0)) r0 = socket$netlink(0x10, 0x3, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='trusted.overlay.origin\x00') r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = socket(0x1e, 0x5, 0x0) connect$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 13:38:33 executing program 2: r0 = getpid() getpriority(0xfffffffffffffffe, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x20001, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x311080, 0x0) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f00000002c0)={[], 0xc9f2, 0x8c, 0x4d, 0x0, 0x4b5, 0x0, 0x2, [], 0x7947}) clock_gettime(0x1, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000480)={r3, 0xffffffffffffffff, 0x9, 0x27, &(0x7f0000000180)="0fe3f2227c2bae6900940d3259cf558ab40d96983d462b92a9c3e3f1b386df80c33e702990ece7", 0x2, 0x7, 0x6, 0x3, 0x9, 0x6, 0x0, 'syz1\x00'}) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r4) write$binfmt_aout(r4, &(0x7f0000000540)={{0x107, 0x1, 0x7f, 0x15, 0x37, 0x1, 0x268, 0x100}, "8d16de5daf78a773be0851ac97e00cc47c9eb7262d69a2458c21b60214b06bd7b7b950880176fbdf0ade84963b1a1a5d289cd4708edbe6915d496c5c4ab5a8edaa94a9540032a1b0c0e6ac01f70fb60c76a3", [[]]}, 0x172) ptrace$setregset(0x4205, r1, 0x203, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) clock_gettime(0x0, 0x0) r6 = dup2(r5, 0xffffffffffffffff) syz_open_dev$ndb(0x0, 0x0, 0x4000) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x600) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ioctl$KVM_CHECK_EXTENSION(r6, 0xae03, 0x2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x22b) select(0x40, &(0x7f0000000080)={0xef67, 0x7, 0x7ff, 0x100, 0x4, 0x9, 0x5, 0x1f}, &(0x7f00000000c0)={0x3, 0x2, 0x100000000, 0x3, 0x10000, 0x401, 0xfff, 0x7fff}, &(0x7f0000000100)={0x0, 0x0, 0x20, 0x100000001, 0x0, 0x7, 0x0, 0x400}, &(0x7f0000000140)={0x0, 0x2710}) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) semget$private(0x0, 0x3, 0xba) 13:38:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x1b, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000013d400300000000006506000001ed000071185400000000003f640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x400, 0x2000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080)="f9a9f028768496df51ddead2feea942e1a21c5085f4ba12f4a70a391c07cd946e4ebd6526f240b25d76d8db11482a5805a263a1e39f9cea194cff71d416ec5be3f7c2c5f4a5d3c5559c46ff805b414f65a8b18b7cadf01f294576b8ba1d721c68843a6b526260b09409249088076af7fb8d6c7977f9cac3c7b931a4f0f627c", &(0x7f0000000100)=""/46}, 0x20) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000180)) 13:38:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_open(&(0x7f0000000040)='.n\x00x\x00\xfe\x00\x00\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$FIBMAP(r2, 0x2287, &(0x7f0000001380)) ioctl$RTC_VL_CLR(r2, 0x7014) 13:38:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x4000) sendmsg$xdp(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x2c, 0x4, 0x0, 0x25}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)="abb06e8f8b7e0a50459682accef7a298dbdcf6acfff9d4736eb8120250dc873a62a993d509499d93f4235dc0a825b9e89daeba3780afed234c5abc603f7afc7014427500ea10d36416f8c18986900ed1165a246fb1822905b0be247c5cb3193524a50ea80e021c1499d2338e29604e0e3813d2a7192746253bd9c515d74cb3c08271679966cd9b8ada2e99040115b756599493b76a4018f96125565dabf2197429d2fdcf4e10b81c3fb59672cc2d4858c334b741cb5698ff3e6c408dd99fa6877077fc", 0xc3}, {&(0x7f00000002c0)="89b5a68d4484ca2b0f53a99e721a20b143f965edf1d70759dbb245f930a730ae2752833fde5123ceb00efc12d4d32183e0f4fb5e59a2f6465cc62ba65fe841aac21b03a1d01ecd7178fa2514cf10fa2e11ec6f8d31b18aeb17c6344d653f9e250d88fbb280b4ebabffe31c346d409906c2e8b44576826f623c71ed76142de77372e8dbf518c03ed937c77170c808a7e329b2b984ac332823b87ff0e8bb", 0x9d}, {&(0x7f0000000380)="e382be6a682e57684b0e41fc392135f3295c4fb25325d64804c55b0fd1fdee0ebc055debd485d6025ed088abcfdc85efa23e434ad5183289be9823fb200122530973298ead7826befd442e920808cc137d4ad4acd0b71454ea4abe38d4b02498c51dfae5c52a9c59409089d5656c7e9eaab8e0d2f74f9290f31433c5f12737fe4bf389f98f2b381adbbc1c587d18e7bdeafae9b16aa4be4d3826095a7a770af413f1995a4da99e94505bbbd3dfb7a5", 0xaf}, {&(0x7f0000000200)="b415672dc9e7302402fcee8fbe7e11e9d089561f6893b30daaa2a3796b3f5fd93d4dc281ab2074b5966737adc86e7a8e2b2fa2d24b93b01b87222802", 0x3c}], 0x4, 0x0, 0x0, 0x40840}, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f00000006c0), 0x4) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) sendmmsg$inet(r5, &(0x7f00000053c0), 0x40000e6, 0x0) readv(r2, &(0x7f0000000280)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1) 13:38:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c010000100013070000000000000000a0048e7ce85858807fff227170af2398fe88000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000032000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000004c000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000005b000000"], 0x13c}}, 0x0) 13:38:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)) 13:38:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="021300e4020000000000000020000000b47dce03bd98dc9f62cebbb457e239ead72bc32ef9b56c0ab2a4a41b5c86abd9819c1f3bb2e99502bd1bc65b326700d7448abca820813a46ff2eb8c8e50844a9bcf1a79f2eb9d4124e3665bc90d7afa7e59a821ba6f8844694e53ffe72844f7d0642974560872b1ed0ebddd81eda986eea3423325f75b497f307896aa083364da45d987cc4c19d94f3c64d2cb25402306f6b190db42c94486f22b8d98766592a2d851e593a3bb0430a5acdddd0f36b3830f8e628faeb039f7ec5e07d5bc06aa820ea08afe6fbd8e91e51336be6d4e9d1ab0064caa8cb3a96978b7b678a9df79bd00737c44df0497b93ecf9de230a3a1a5e0ea74036124e8f3eef6eaabe1e079695b00afe45fb822281cc7e4027d8a7f37e8ea578bb7116552f789499c71248c59e575504eecdd592cb24077ba182a0139050058171711456776fab70d4b85e617427d02ee2d26b18f006a29e9b319eff671658fc83ff90bfa292a9d156a618f4e113c268713fcbe1ef136067d7de7b0e589dfabb2a8c7c8906bc631769b2f7a9ba89300a9d706e26de7c"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000080)={0x0, 0x80000000, 0x1, [], &(0x7f0000000040)=0x9}) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 13:38:34 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x5, &(0x7f0000000080)=""/13, &(0x7f000033bffc)=0x34d) 13:38:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendto$isdn(r1, &(0x7f0000000780)={0x0, 0x10001, "24bf95ffd1f7d6480473fb26251b726927ef363fc8d4284fca740427f898c8be8306c1c8ac7de8769359e8d8e48f58d09207fe1d4fa9a2363c85e0de40b07661358087b220df4646d837df65b67c02fda594d6212ff741b158865e91a3b28c7bbd387a601a300e343ae6affb6c561d18749f48b0ec60f0a8e01d2215841cc108e236b2355b1b54bba0146bee16e17ec4167743b1e740e63f79b1a53ebf001c058bec0fe6165e3bd1670c2b49ba0ceeabdcb00dfbb641b2ddcee9b6574a242cacc0e69f925220702433f909385c88dd719927438d91b28096de6d7e94a4d457f49125642ca67e7d634c1c650e1880f4d0eb375bac8305e9a4a3cb8f5a22aa7b64416020858ea3a8265bb63a341ee404e16a6eaeb136920d408caea76d7ab6e0d3d34c857a338426171e9d3343b81b61e9bcc2519bc9c943f5f1139e74495e97f3ab1ddebd1d165a2dac25b5c5aea1b93cfb5c23adcfed7730d02ac5e86c0210cf1c899ea4085770287cf39dbb8fcd610ff50b297e0fba99a739f3cdfd17083de008057699b8a829e94413b830d39932dabea96ff402d2a1fcfe7d5cce977d77bea0c2fa3c8d27285a2c3180cab37b79326586494b10c149e38e4f717da192d3b8e3398d38133d16bd82fcc0dd61711d5c9790af71c2b483e742f02c10d6e97e8785b273b1b7f357605d22aa772b26b4c7ceeeb020f7146372dbe79f3030d0ef49f1d9c7dd310ccdc16c133df52817519f8b8302fc15c4f78ed04c5e772ffd3aee24305924d01f545a58a3d8d515eb47f59c2979fb5e1295b755da9fbd86025744b44c5e56e15d25ffcd8ec020718ad18b4f516327091a14b4a71c186cf4641addfc915cf4a5a5357ba4cc51ea03df6c37be52c9677831a73a9c811a9554578be416b6d4d6fbf7302c0021cbb28d6fd8cfe80622c5425bdf656f25f1f8e14afb685a465c90d449197934dde2124b997b1d5377e32a33cfd981e18bc3247d3ff6366adfe6637b1ff584c93d4addd3beab48582bea799803e6f6dba51144fa227900934ac60a8d176f24fbaedf43f155ae94ffc8645bf29e33d11102606a77472c3fb4ded4c67e32e5cb7f06315a3c1e7ccbfafed57e1ee4e99bab226b881955c312862b16551c86e82a87d985ba000d6fd41668bdead651b633c8d6387ca96ce0d91a01562079db75e2d3bae8b73e7ad3427c10f9e25bca02c8cb5ce9e2caecef12ec6fd7f2cbb240706be1503651f846844cab429287b3e6c12a4c39cba0e3b23f8443cdfceb9f48c6d7cfc4d3b1b54048a767529da03fed21409e961510256284edc7c440dc9d888b8b25eaa0999a87f7c47ef32c7d4b7ae9a4fac64f145b6998a7f11bec82a4f755747e4652f1de4eec42945ef51d15c62e77963b62e5119fb34dcec4a222c2ed2a0994d6e5dd2cfc38a9033ec8dc2e146da1577d76c169134f57f905f1821af8600292cd14e6f07a91c5fd29e587c815741af084d2ed10d75f058837e8bc34a26c976bffccfa37b25ba3359cd809a06d2b1bb4ea5ca37e94f5878a1a74de2eb21355734e63a35e34aec7ca214d34dc4e50c973eb19882dc3c41c44ed2aee298b6edc095111fa1c8c7b96ef6bedb6c24010bcc9597f348ce76ab5a5cf13b2db0d3f6502214eb7e8d94e69fe3e2c0f81569da0768d4ad508faf59506be34fac53fbbaf00bf08a0e2b0b1d551efce5af1522fa8a391de05b4788388217299d2b3c71eb5f6e4ca2f809327ea7058941d29de93d68f149baa7dc265a3166b59ed4e42c6504348c8d1bee087ba709407fd01285d4ffb8db72fd894577e06931212f6a8494b846ac8103c8667c63b2439c05c9bdaebc6b74a53dc27e571ab61a5047d4cdfb265ce579198592f8bef02cfeca22b7d12a9aff9ef743746a6694029f079c569dafaf7dcb1521394beebe50c1312ffc316b6dec5aacf9de88d9c909f801aa8ce57fbcd273805f9bdc3f1c20c0fd8c4369047916b67bd2f12a6ac4488749eedc8ea42835a8da460fed3728fa664680fd5159d7fcbbb97c2f34fbf1eb80884632a58882ecbc4a94b76058ee91afefd8d0a1799e389f490f49d21ad43ba809a61bd11f8dae3d74c39c42ecab3fa4cb875f26aeec285aee1c0176bb86d443366efb6639b63c550ebc66accf5b40b99db708265e75959ed3442ce4f7fb071a5858db382399c2751b6cf59d57232105e8cdf4c4311d47f2379d42e58e227a6ddb8b110583118a828a2c9697acfa17fbacbacc476edc7b468304ba6fe4f922492d9cd3512e88e8d26ecace149e5321d5805e767c15771b845c5a16b8ec3dd68260b720256e3cac4b5256162e6b6811867968ec2bfdbcebb380f64ff45fada7f40b1455ca18f148ba21a19d34843854e28e1ca087cd49e27d92199e888ede76ed4167c644863002229ef468abe710d529556d52d9d44a2b7f9886e67bbf3b9d843896b6a1368aadda6810c8b8c8d9afa7dc1ab1e876b780e6fbfb7ef69fedd66d659f7daf48c3d796e87302916aae47cc58a048f2df0e639ce4be05b708b29afd1d896208324effa3b9ee618203e4d0a62f7b535571418a2dcca3a577a480b04c426ab944327db0300b7a1bf9eb17645cfbb4c88a06dccc226eb076c80e5298ecdfc91fd07beb6997249b8061793578f26ba371d319fa0be65bb432be7dcf74413004e33ec2b1f82f5cc2c67a6b2fc9dc4c2e55dc80d2e1ea1dd0ad20e475c8696b47540288d335f53913eefef47cac6226c2f5706518903ffda60bf3c886d76c8ee4ba40374b15079edb657d36df9fa80d4da931a2629abf1c7d8d3274f108d6d3d242d296b6cdabcf24631597effc8b008c0fbb1a5d4129bd693b337d0150f986a8995600ac605b2cfbd8a62f9a442cfe52f0d787458f811317b80e93462ed0029b45d185bbcabe219c1e5e959a528ac5fe3adb967aee38a303b07c563f9cda5c4b5c72e31f7f0ee168e69212e4258bd3918168305ad89e5c1cf0d780bf6aaacbf71af2403321daded55d46235f1c3693d7ff6e46118a4cdb4180785c804fc15b46eb957cdc7f1743514199d1aed56d1f24d9144c1ab43fbc9fa854ace59d95676d33e8fe1b656c16a4785a2afc616514278eb2eef419c909f383d3f816c5da0efa1414094deafefacbbaaa46fa5c57baf550cfb742df6151a58441ab0d62006f2d73177e5ebdfd0522abe8aa8677823fb00e409f726a4e921f28c2c34fd4079f664628bc631772db5a9dbf6bd1e3ef06373066aff329f274bb74577496879594b497871799682e757bb39f1f687f743d65752a1ba13b53350817dd9a231e9b217c9f7166445546496bbc795605d768e50e33c33a63f66afa505f867ff9418b2b5130da3c17f1c1116ebe5b75d87bc35b04e9ea00a3c01688e48c5608ce4c29c005e031ad35b5442b4cc3846d2d267f4caeac5ce6f6fa3bbaf8d8f62a91fb17c7c8790b920c5acfa9d899937c0142994a2ff74ab5ca4dd41c9d6c86acc3e9413e33f7faae489b3e648a54fd096109317d70cd3e1e052446a33d7a3869cb4b8c6c9e241381bf622c34282fef6164e9ae3ec50a03ea5038cbcdb253806e62ffd2c993c28713d567a352810e1d4f7fa1faca84d6ab414c930518e74e6646433e62c3c08767a1b4fac8cdda38bb37144e94e33de649e9a248849c02be3880283f435680380be0d94cfa87a82dbfbd86ae2f173137b9dea77e02bf84af398aa6ff6e118e64447f9abf2366c2f67f20c4164fee1c28c81fbb9904d8c96d41a1a4a88e6ea0e66fa5cb51f1b2a74321f06b490217fae176ac8b7e5847ebc929c3fa0772caa9118f7c55f5eba4a18afbea401dcea94920b9667aaaa6dcaaa01a42e6bc0e806512377de7952ca979e38fd5b8fa8d292da23e0c3885668fe502a17d5932647869163a0a9d2c7797f4c75bd74f385ab135b2702e45ef2ecbdc8cccc4ff0a411b72adf81f5fbc5f60460c8e8ccfd8040a4856a18b3d9e6196d66506240549a0f4eea8eff92c4b9dd0c3819550a2aae96814804eaa81265c7e421be3b89914adb25645549897af5db737fb58cf07ba7f0354c0c77e4b27ef09a06af0ff819e4d856d59f41ce61a495d4d440b0b7e8605a541e51437a98d33eedb1a7b15a859aaf475a3405177ea1e809c588caa1128e5e3d3cb0210d12e96f9ca74dd550ef66a8ea77c47bb01d1c7c3f4651f2f9b62fc80fe7c4be372c0e03bf437fae52bdb491fea135cc1583bcc158af615e2ceaa17137a5f22eb4e0e2e0135dfec4e11e2ba83096f5f73b17cb0b353696fdea3c87f0314c60d3104c8e76070eae1edd26700233a3"}, 0xbef, 0x80, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f00000000c0)={0x0, {0x8, 0x1}}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x9) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r3, 0x5502) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc193838b24473677, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, 0x0, 0x0) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1}], 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 13:38:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000000c52de1cecb1af26072c0dfdf89b100001239ff5368865eff0f0cd00dd26c0d13ae50817aab6116c6cd7009280bce883b2773f7eec1553117553090787283655027040bd519c0d2f2ade47a72b5ec4ae47972e39e4767ad81c551e4b50fda6d21864f69dea692ce18149275"], 0x14}}, 0x0) [ 215.837158][ T9232] input: syz0 as /devices/virtual/input/input5 13:38:34 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f0000000040)) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f00000001c0)) r0 = socket$netlink(0x10, 0x3, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='trusted.overlay.origin\x00') r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = socket(0x1e, 0x5, 0x0) connect$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 13:38:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0xfd, 0x0, 0x0, 0xa040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000c659ca800437f400000010000000170800000000000000200000000000000000bfbbb18016410f67f8ed2fbda6599591076756fcb9ff7daf0bdd7cfa3d4ade61ccb14424af8c63ab6fd1845b0c90c78bf8059655", 0x58}], 0x2) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:fonts_cache_t:s0\x00', 0x23, 0x3) 13:38:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendto$isdn(r1, &(0x7f0000000780)={0x0, 0x10001, "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"}, 0xbef, 0x80, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f00000000c0)={0x0, {0x8, 0x1}}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x9) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r3, 0x5502) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc193838b24473677, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, 0x0, 0x0) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1}], 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 13:38:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x20000000080003, 0xc) write(r1, &(0x7f0000000080)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca310000", 0x2e6) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) [ 216.422204][ T9257] input: syz0 as /devices/virtual/input/input8 13:38:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0x2, 0x300) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$FIBMAP(r2, 0x2287, &(0x7f0000001380)) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000003c0)="39000000140081ae00003c9733f5f087110008abead99025e4ca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702fc", 0x39}], 0x1}, 0x0) 13:38:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1, 0x2000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x200, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, 0x0, &(0x7f00000004c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=ANY=[@ANYBLOB="defdbfef321cb81fb5", @ANYRES16=r3, @ANYBLOB="01000000000000000000140000900c0007000800020000000000"], 0x20}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="28010000", @ANYRES16=0x0, @ANYBLOB="000200000000fcdbdf25060000003c00010038000400200001000a004e208000000100000000000000000000ffff00000007060000001400020002004e24ac1e010100000000000000003c00070008000100810000000c00040053000000000000000c00030003000000000000000800010003000000080002000400000008000100ff6d0000100002000400040008000100070000002400090008000100018000000800020000000000080002000000000008000100000000001800040014000700080001001b00000008000100070000000c0005000800010065746800280001002400020008000400fcffffff08000200010000000800030000020000080001001d0000001c00020008000100760000000800010001000000080001004d05000085d35c9b47256c430fa76ccc336282c402467dce2957201c4e3eb2d17f97680797e73afc2d446c0e358b6c40ae593e41711b8f1bd93b81c701735803f70623dbba4219993725c71f21bd07b7218d0db4887529fc964b1d1f9607486bbe5d642ddd023aae32d7a3f955991cca4aad894ea1caaf2c52423caa532a2c59b963412ae9b2e4298bac7a54e7bc0f8bc712de8aad06ee151b6d149456e7fd6b341d87182d7b7b5c06ce147f3664edfd943652587f1e2de8c49e55e38a03a0a23c5e86afd471b588f7c4b128eeeefbd002f645039150c7255ee4217147adc4aa321c86de12d132d78072c7638e07ad32898b060a41efaec9d6"], 0x128}, 0x1, 0x0, 0x0, 0x143e5fc0a941b546}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) sendmsg(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000100)="9ab5d379bdd8542b6935c251853185ebbb6a4d47a9fdaf1e992182d302615894cfb2e69997c4cdd96bd6db97029c93e6cfcdd27d8c5dd2f5", 0x38}, {&(0x7f0000000640)="5b7ecb918b383f5e2d0bfddcde59600823ab7b6aa31c0e6ad4b0d9ced7f4ae6563822559ee6a43cbf7bcf8aa6bd3ccd9fca1d548e7e263a2e437a9855357be1ba584ca303d62b655d25be16fee6c6102d178e479b70a91f7a609ddc87900ff03cecb3699e8a3b8272c4a4288a45a1a607f5f1c2136baba32b942dc5bc17adf3c99bb3fcba79f892ae2227e22dbc579e1fe70c73196f45fae822c79a8b050693fc13543597eb23ee012b8e44e62b4caf38aae9d09c18041a5", 0xb8}, {&(0x7f0000000700)="3a429b4c2f7870058672b8349b2a5dda47de8c2f2fcffec6e0dd1039ffafe5ac40735a65598887ec136b9cabdda615916525397383399a372b0ea8a820dedf0522b9bc47e3f345a7ac924e4f637a8c04752792ae9b183304beb95daf58c14c8146c6e06b21d8931be0530fb82793e66fec8992a0dfe069ba62cb0e09b0e847f762abca7ed93ea64f9075951bb33c4d96719607c6366249763e196b43a92fd1e52b9cbf614f8f6103fd2c4830c57a5f0efe3dabfbff4c684fd873698163532e8a3cd224c775658d9dd74cda668e565ef2dc", 0xd1}], 0x3, &(0x7f0000000800)=[{0x28, 0x10f, 0x2, "609541f6da98b780dcc5c7ef0bc8107a19f6523f619a6388"}, {0x110, 0x112, 0xff, "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"}, {0x28, 0x88, 0x1, "83e7cda30899ea6e1606b31182f2670b8c38bde75f2e"}, {0xd8, 0x112, 0x1, "3a0039a1e4d145880686da5cc51ea8bf64aee2a0f9ddbdfba3c00f08eb986d3ca9749decc3a75321e8b7f9195cb8489d262d591a625084ecd244755d3f905493337e7a21e9edaf0cd1119eb547d98a4d936ee00ec1da130814552b45931d84a2469b031561f6bbc6f92e4f0e196dd0f7da9dd2824dcfce8c1566995a8487cc84aea6e225440f471e387ad755b9eb946027b18bbe367274a4f01ea01915eb20b6d16246eae541b77993cbf0c83cd48d4c4c661cc117ae84c08e783d6a66cb4b1ad463b998"}], 0x238}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) tkill(0x0, 0x0) r6 = gettid() tkill(r6, 0x12) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x100000000}) process_vm_writev(r7, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/248, 0xf8}, {&(0x7f0000000c80)=""/196, 0xc4}, {&(0x7f0000000d80)=""/93, 0x5d}], 0x4, &(0x7f00000005c0)=[{&(0x7f0000000e00)=""/196, 0xc4}, {&(0x7f0000000f00)=""/154, 0x9a}, {&(0x7f0000000fc0)=""/115, 0x73}, {&(0x7f0000001040)=""/65, 0x41}], 0x4, 0x0) gettid() r8 = syz_open_procfs(0x0, &(0x7f0000000440)='attr/current\x00') preadv(r8, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) connect$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) socket(0x0, 0x0, 0x10000000000002) socket$unix(0x1, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, &(0x7f0000000080)={{0x4}, 0x8, 0x1, 0x2}) 13:38:35 executing program 4: ustat(0x0, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, 0x0) 13:38:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x8000, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x7f, 0x20, 0x3f, 0x20, 0x0, 0x57b, 0x20, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x401, 0x1, 0x1, 0x800000000, 0x7, 0x1000}, r1, 0x0, r2, 0x8) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x101000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L+', 0x6}, 0x28, 0x0) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x104000}, 0x334, &(0x7f0000000180)={&(0x7f0000000140)={0xffffffffffffff5f, r4, 0x4, 0x70bd25, 0x25dfdc03, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000090}, 0x408c0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) 13:38:35 executing program 5: r0 = socket(0x100000000011, 0x200000000002, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$sock(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1ca45bfbca3424}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0), 0x10}}], 0x2, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/175) 13:38:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x8000, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x7f, 0x20, 0x3f, 0x20, 0x0, 0x57b, 0x20, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x401, 0x1, 0x1, 0x800000000, 0x7, 0x1000}, r1, 0x0, r2, 0x8) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x101000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L+', 0x6}, 0x28, 0x0) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x104000}, 0x334, &(0x7f0000000180)={&(0x7f0000000140)={0xffffffffffffff5f, r4, 0x4, 0x70bd25, 0x25dfdc03, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe94}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000090}, 0x408c0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) 13:38:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x10001, 0x4}, 0xc) sendmmsg$inet6(r0, &(0x7f0000005580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="1400000000000000290000000500000000020201"], 0x14}}], 0x2, 0x0) 13:38:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x3) r2 = dup(r1) ioctl$FIBMAP(r2, 0x2287, &(0x7f0000001380)) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f00000001c0)={0x0, 0x0, 0x2080}) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x13) r3 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5bbb89452fd9bb6708ae89ba29", 0xde, 0xfffffffffffffffe) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r3, r4, r5) ioctl$TUNSETGROUP(r2, 0x400454ce, r5) 13:38:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1ffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0xe) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$FIBMAP(r1, 0x2287, &(0x7f0000001380)) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r5, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={r6, 0xd37}, &(0x7f0000000180)=0x8) timerfd_create(0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000040)={{0x77359400}}, 0x0) r7 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r8 = dup(r7) ioctl$FIBMAP(r8, 0x2287, &(0x7f0000001380)) r9 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000380)="2ebf75bd612391186c9e5728345787d8915b6fe7754731c084d6f7cfdb5fde8cf8ba63046df75c56014eea55474fd21bdc760d1cecd6873c6b2ad021f526494921f683e2777da4123084fd9a59c1848fe83db82815f2cf8eaf2d167986de34b4d3bbf4c15d5998fb49cf6cfb457b5e0ab4a84de5d389e0ebaae52c007c9a2007aaf10ddc9a63308aa702", 0x8a) r10 = dup(r9) ioctl$FIBMAP(r10, 0x2287, &(0x7f0000001380)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x8001, 0x4, [0x20, 0x1, 0x0, 0x0]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000240)={r11, 0x7f5d, 0x9, 0xc3, 0x7, 0x3f}, 0x14) 13:38:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe07bf070") r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$FIBMAP(r4, 0x2287, &(0x7f0000001380)) ioctl$UI_DEV_CREATE(r4, 0x5501) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r2, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x298) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000fcff00"/16], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000680)={0x53, 0xfffffffffffffffb, 0x3b, 0x0, @scatter={0x5, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)}, {&(0x7f00000002c0)=""/2, 0x2}, {&(0x7f0000000300)=""/107, 0x6b}, {&(0x7f00000003c0)=""/31, 0x1f}, {&(0x7f0000000480)=""/122, 0x7a}]}, &(0x7f0000000400)="06b6dc6bd1ae34ef56da31aa76bc7ee4e50500d2c5ab6accc12e43e7a5efe00f4e95c05ce7d9fbf3a5fe74d752018eef2ef4cd16b0bf7c1e8afaa2", &(0x7f0000000580)=""/159, 0x1, 0x8b1160329138cbd3, 0x3, &(0x7f0000000640)}) 13:38:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x400000002, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000180007041dfffd946f610529802000001f040005000008000800070002000000280000001100ffffba16a0aa1c0900000000000012090000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 13:38:36 executing program 1: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) ftruncate(r2, 0x1000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 13:38:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x100000c, 0x30, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x480804) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000040)={@remote, 0x0}, &(0x7f0000000080)=0x14) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) r6 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x2) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000340)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e20, 0x259, @remote, 0x3}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e20, @rand_addr=0x600}, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @loopback}], 0x98) setreuid(r7, r8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@multicast2, @in=@multicast2, 0x4e23, 0x2, 0x4e22, 0x70, 0xa, 0x20, 0x70, 0x0, r3, r7}, {0x0, 0x8000, 0x7, 0x3, 0x6, 0x623, 0x0, 0xf1}, {0xfffffffffffffffd, 0xffffffffffffff23, 0x7, 0x3}, 0x1, 0x0, 0x1, 0x0, 0x3, 0xf27d4f9fe1bbcd7c}, {{@in6=@mcast1, 0x4d2, 0x2b}, 0xa, @in=@broadcast, 0x3503, 0x2398ad5e5a01e3a1, 0x3, 0x1d, 0x200, 0x20, 0x3}}, 0xe8) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) ioctl$SIOCGSTAMP(r5, 0x8906, &(0x7f00000000c0)) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffce9, 0x0, 0x0, 0x0) 13:38:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x680002, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000780)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x320, r2, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffbff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ea}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffbe71}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_LINK={0x10c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb26}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x36a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8fa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff9c8d}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7e63}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xfffffc00, @mcast1}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x320}, 0x1, 0x0, 0x0, 0x40000000}, 0x800) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) setsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f00000002c0)=0x1, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080)=0x580, 0x30) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="de000000", @ANYRES16=r6, @ANYBLOB="01"], 0x3}}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800044}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r6, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x841}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x19}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x34}}, 0xc001) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000180)=0x4b, 0x258) r7 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r8 = dup(r7) ioctl$FIBMAP(r8, 0x2287, &(0x7f0000001380)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r8, 0x84, 0x78, &(0x7f0000000280), 0x4) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2002) [ 217.443930][ T9306] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 13:38:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001600)={0x0, 0x989680}) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00', @ifru_flags}) 13:38:36 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x2, &(0x7f0000000180)='!securitysecurityselfGPLmd5sumposix_acl_access\x00', 0x1c) [ 217.537481][ T9316] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:38:36 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000040)) ftruncate(r1, 0x8001) sendfile(r0, r1, 0x0, 0x400008bca) 13:38:36 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$cec(0x0, 0x1, 0x2) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x0, 0x2711, @host}, 0xf, 0x800) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_getoverrun(0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x43, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="030400000300600000000000fff57b016d2763bd56373780398d537500e50600591f301ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40008efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000000d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r3) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x42102, 0x1) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r5) r6 = socket$unix(0x1, 0x5, 0x0) dup2(r6, r4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f0000002400)) r7 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r8 = dup(r7) ioctl$FIBMAP(r8, 0x2287, &(0x7f0000001380)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r8, 0x80045301, &(0x7f0000000140)) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r11 = dup2(r10, 0xffffffffffffffff) ioctl$PPPIOCATTCHAN(r11, 0x40047438, 0x0) 13:38:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x14d114775de95e04, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x200, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x3, "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", 0xb9, 0x4, 0x0, 0x2, 0x100000000, 0x1, 0x3}, r3}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e23, 0xffffff80, @local, 0x706d}, r3}}, 0x38) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:38:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000100)={'lo\x00', {0x2, 0x4e24, @local}}) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r7 = dup(r6) ioctl$FIBMAP(r7, 0x2287, &(0x7f0000001380)) r8 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r9 = dup(r8) ioctl$FIBMAP(r9, 0x2287, &(0x7f0000001380)) read$alg(r9, &(0x7f0000001540)=""/5, 0x5) io_uring_register$IORING_REGISTER_BUFFERS(r7, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000080)=""/79, 0x4f}, {&(0x7f0000000180)=""/179, 0xb3}, {&(0x7f00000002c0)=""/112, 0x70}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/93, 0x5d}, {&(0x7f0000001400)=""/174, 0xae}], 0x6) bind$packet(r2, &(0x7f0000000000)={0x11, 0x800, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) r10 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r11 = dup(r10) ioctl$FIBMAP(r11, 0x2287, &(0x7f0000001380)) epoll_ctl$EPOLL_CTL_DEL(r11, 0x2, r6) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000340)=@ccm_128={{}, "401afb3d73a8444a", "f403583ecfe1a11a5dcc12a413b71924", "75e40551", "286f26a1361b4df9"}, 0x28) 13:38:36 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000f060523460080fffdffff2e098031080c000300070055f04ca4fec5e6e769576c00a6c4c50c22ff"], 0x2c}, 0x1, 0x40030000000000}, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(r1, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="00fbbe"], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x6, &(0x7f00000000c0)) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 13:38:36 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$FIBMAP(r1, 0x2287, &(0x7f0000001380)) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r5, 0x8f}, &(0x7f0000000140)=0xc) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x218}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmmsg(r6, &(0x7f0000000180), 0x400000000000117, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x80000001}, 0x28, 0x6) 13:38:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, 0x0, 0x0) tkill(r1, 0x1) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000002c0)={0x0, @win={{0x8, 0x3, 0x5, 0xfffffffd}, 0x5, 0x3, &(0x7f00000000c0)={{0x3, 0x8, 0x9, 0x3ff}, &(0x7f0000000040)={{0xc1, 0x7ff0b929, 0x3, 0x4}, &(0x7f0000000000)={{0x20, 0x6, 0x0, 0x401}}}}, 0x6, &(0x7f0000000100)="9f78e05661dc6e071061295472d0f3ded0e785e71d93fea56cee7c27edd497c46305d6ba5391f03a3f0c735c7051be48fedbb01d8cb4bdac8ce6702472a609f1b843fa25545b33b1f61b8e1fe51a3537fa5bb6252b13674090fa543ed216561a9d967614a37d16a548792cc1c4387a9d54ce585b67d19ab86d3d02f0975dea30b05b19c1d3d0097cfffc91a69d26402c2c8e0b681530", 0xff}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 218.426978][ T9365] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:38:37 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$cec(0x0, 0x1, 0x2) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x0, 0x2711, @host}, 0xf, 0x800) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_getoverrun(0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x43, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="030400000300600000000000fff57b016d2763bd56373780398d537500e50600591f301ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40008efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000000d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r3) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x42102, 0x1) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r5) r6 = socket$unix(0x1, 0x5, 0x0) dup2(r6, r4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f0000002400)) r7 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r8 = dup(r7) ioctl$FIBMAP(r8, 0x2287, &(0x7f0000001380)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r8, 0x80045301, &(0x7f0000000140)) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r11 = dup2(r10, 0xffffffffffffffff) ioctl$PPPIOCATTCHAN(r11, 0x40047438, 0x0) [ 218.613415][ T9365] ptrace attach of "/root/syz-executor.1"[8942] was attempted by "/root/syz-executor.1"[9365] [ 218.658615][ T9365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 218.707518][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 218.707835][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 218.713639][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 218.719577][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:38:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @empty}}}, 0x88) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) ioctl$FIBMAP(r3, 0x2287, &(0x7f0000001380)) r4 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000000)={r7}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100)={r7, 0x4}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={r7, 0x75, 0xaee9}, 0x8) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000000040)=0x90) 13:38:37 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$FIBMAP(r1, 0x2287, &(0x7f0000001380)) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r5, 0x8f}, &(0x7f0000000140)=0xc) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x218}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmmsg(r6, &(0x7f0000000180), 0x400000000000117, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x80000001}, 0x28, 0x6) [ 219.184818][ T9365] ptrace attach of "/root/syz-executor.1"[8942] was attempted by "/root/syz-executor.1"[9365] [ 219.188019][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 219.197786][ T9365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 219.201953][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:38:37 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$FIBMAP(r1, 0x2287, &(0x7f0000001380)) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r5, 0x8f}, &(0x7f0000000140)=0xc) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x218}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmmsg(r6, &(0x7f0000000180), 0x400000000000117, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x80000001}, 0x28, 0x6) 13:38:38 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000), 0x4) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$FIBMAP(r2, 0x2287, &(0x7f0000001380)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:38:38 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000f060523460080fffdffff2e098031080c000300070055f04ca4fec5e6e769576c00a6c4c50c22ff"], 0x2c}, 0x1, 0x40030000000000}, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(r1, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="00fbbe"], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x6, &(0x7f00000000c0)) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) [ 219.428805][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 219.437977][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:38:38 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000800)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000540)={0x1c, r4, 0x4, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004010}, 0x90) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000680)=@v3={0x3000000, [{0x1, 0x1}, {0x4, 0x1ff}], r5}, 0x18, 0x2) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) r6 = getpgrp(0x0) setpriority(0x0, r6, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f00000000c0)={0x0, 0x0}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000bc0)={0x4, 0x70, "3d4ebc0fe446cd8534dd347816a92b4ac0c4e798cd4cf691243fa92060075db4b9b3d0f094f2479310df11eca875fce5e83b3d1ee3bf0dbb5e71cb9f149519247683bb52ee98c0f015031ca4bbabd43a94e9c2cd90653f50398b6fab80de11a1691125b99a99a532e49de1e5a6729a16"}) pidfd_send_signal(r1, 0x3a, &(0x7f0000000480)={0x2, 0x0, 0x7fffffff}, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$DRM_IOCTL_NEW_CTX(r7, 0x40086425, &(0x7f0000000640)={0x0, 0x3}) getpeername$inet6(r1, &(0x7f0000000840)={0xa, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x1c) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000ac0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x12000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r8, 0x300, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80000c8}, 0x4000000) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000080)={r3, 0x84, &(0x7f0000000340)=[@in={0x2, 0x4e20, @rand_addr=0xff}, @in6={0xa, 0x4e20, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}, @in6={0xa, 0x4e22, 0x4, @local, 0x1e}, @in6={0xa, 0x4e24, 0xfffffffffffffff7, @local, 0x2}, @in={0x2, 0x4e23, @multicast1}]}, &(0x7f0000000100)=0x10) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffb, 0x32, 0xffffffffffffffff, 0x0) fallocate(r7, 0x20, 0x700, 0x6a46) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000880)="98", 0x1}], 0x1) [ 219.627727][ T9399] ptrace attach of "/root/syz-executor.1"[8942] was attempted by "/root/syz-executor.1"[9399] 13:38:38 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$cec(0x0, 0x1, 0x2) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x0, 0x2711, @host}, 0xf, 0x800) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_getoverrun(0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x43, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="030400000300600000000000fff57b016d2763bd56373780398d537500e50600591f301ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40008efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000000d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r3) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x42102, 0x1) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r5) r6 = socket$unix(0x1, 0x5, 0x0) dup2(r6, r4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f0000002400)) r7 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r8 = dup(r7) ioctl$FIBMAP(r8, 0x2287, &(0x7f0000001380)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r8, 0x80045301, &(0x7f0000000140)) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r9, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r11 = dup2(r10, 0xffffffffffffffff) ioctl$PPPIOCATTCHAN(r11, 0x40047438, 0x0) 13:38:38 executing program 2: ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$FIBMAP(r2, 0x2287, &(0x7f0000001380)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x3, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000100)={0x10000, &(0x7f0000000080), 0x1, r3}) r4 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="ee7300000000000000f0ffffff0000000000000000", @ANYRES32=0x0], &(0x7f0000000180)=0x2) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000000)={r7}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100)={r7, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={r7, @in={{0x2, 0x4e23, @rand_addr=0x80000001}}, [0x81, 0x2, 0x6, 0x3, 0x40, 0x2, 0x800, 0x101, 0x6, 0x200, 0x8000, 0x200, 0x10001, 0x3, 0x3]}, &(0x7f0000000480)=0x100) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x80000000, 0x5, 0x90, &(0x7f0000ffd000/0x3000)=nil, 0xba17}) r8 = dup(r0) ioctl$FIBMAP(r8, 0x2287, &(0x7f0000001380)) r9 = socket$inet(0x2, 0x80000, 0x0) r10 = syz_open_dev$sg(&(0x7f0000000580), 0x0, 0x408080) r11 = dup(r10) ioctl$FIBMAP(r11, 0x2287, &(0x7f0000001380)) ioctl$KVM_INTERRUPT(r11, 0x4004ae86, &(0x7f0000000180)=0x80000020) connect$l2tp(r8, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r9, 0x0, 0x1, 0x3, 0x4, {0xa, 0x4e24, 0x7f, @dev={0xfe, 0x80, [], 0x1b}, 0x6}}}, 0x3a) clone(0x2008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r12 = dup(0xffffffffffffffff) ioctl$TCSETAF(r12, 0x5408, &(0x7f0000000000)={0x7, 0xf800, 0x4, 0x1, 0xa, 0x0, 0x3, 0xb7, 0x439, 0x20}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r13, &(0x7f0000000200)=""/235, 0x11a, 0x3, &(0x7f0000000300)=@file={0xba0b235963ff3862, './file0\x00'}, 0xa762) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) 13:38:38 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$FIBMAP(r1, 0x2287, &(0x7f0000001380)) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r5, 0x8f}, &(0x7f0000000140)=0xc) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x218}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmmsg(r6, &(0x7f0000000180), 0x400000000000117, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x80000001}, 0x28, 0x6) [ 219.808646][ T9399] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 219.988902][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 219.995844][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:38:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x6}, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) io_setup(0x1, &(0x7f0000000100)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x52}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0x101b2}]) 13:38:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000015000)=0x1004, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) ioctl$FIBMAP(r3, 0x2287, &(0x7f0000001380)) setsockopt$inet6_int(r3, 0x29, 0x34e1bc75acf0b1d5, &(0x7f0000000040)=0x800, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) 13:38:39 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$FIBMAP(r1, 0x2287, &(0x7f0000001380)) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'gre0\x00'}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x10000004e23, 0x0, @loopback}, 0x1c) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r5}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r5, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r5, 0x8f}, &(0x7f0000000140)=0xc) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x218}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmmsg(r6, &(0x7f0000000180), 0x400000000000117, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x80000001}, 0x28, 0x6) 13:38:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000047c0)="11dca50d5c0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000001c0)={0xfff, 0x0, 0x0, 0x7fff}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) ioctl$FIBMAP(r3, 0x2287, &(0x7f0000001380)) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r5 = dup(r4) ioctl$FIBMAP(r5, 0x2287, &(0x7f0000001380)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={r5}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x2c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in={0x2, 0x0, @broadcast}]}, &(0x7f0000000480)=0x10) 13:38:39 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000f060523460080fffdffff2e098031080c000300070055f04ca4fec5e6e769576c00a6c4c50c22ff"], 0x2c}, 0x1, 0x40030000000000}, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(r1, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="00fbbe"], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x6, &(0x7f00000000c0)) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 13:38:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x20000003e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000002c0)={{0x0, 0x1, 0x4, 0x0, 0x100}, 0x0, 0x0, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x0, 0xdcf4}) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) dup(r1) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7, 0x1, 0x4, 0x8, 0x2, 0x3, 0x9, 0x2e9, 0x40, 0x182, 0x1f, 0x0, 0x38, 0x1, 0x8001, 0x4, 0x200}, [{0x60000000, 0x7e0d, 0x3ff, 0xffffffffffffff81, 0xff, 0x0, 0x3}, {0x4, 0x67c, 0x1, 0x2, 0x7f, 0xffffffffffff7fff, 0x1000, 0x6}], "eec6618ea2401763f7643f461dddff0263f38d5e67e26e04af6acd72332cd1215b48fa27eae45308ab6acf2241aa8ce8e3707d745ef6c5623ebb9b7bb381b9b232112284d12a544062cb1f737f4fca0313dca1d4e120d84cc13e61535ebd7e74d17f8bdb2d895e65b5fa1d93faf996d655893164e168a2a67d11702c7a50755d65fb6e3d8fe66367a298ced675168939ffd5b96fe0a2ad146f486ffef48c2be581e393e08eb1b10e2d59791391c67708032026dadd473ad2a44a99ec8b2d82", [[], [], [], [], [], [], []]}, 0x86f) 13:38:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x853d661429228749, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xf, 0x3, 0x10000000000102) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='bbr\x00', 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = syz_open_dev$mouse(0x0, 0x0, 0x10000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) ioprio_get$uid(0x3, 0x0) accept$packet(r1, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0xffffffffffffffd0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) link(0x0, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x3b2) [ 221.057048][ T9460] ptrace attach of "/root/syz-executor.1"[8942] was attempted by "/root/syz-executor.1"[9460] 13:38:39 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000a000)=@canfd={{0x5}, 0xffffff7f, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$VT_RELDISP(r1, 0x5605) 13:38:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000280)=""/250, 0x223, &(0x7f0000000580)={&(0x7f0000000080)={'sha256-generic\x00'}}) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000080)='big_key\x00', 0x0, &(0x7f00000000c0)="2434acca97", 0xfe94, r3) keyctl$search(0xa, r1, &(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x1}, r3) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c00810ee00f80ecdb4cb9e307f029a00d0000002f003efb0a0002000000000000000f0006000c000000", 0x2e}], 0x1}, 0x0) [ 221.182518][ T9460] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 13:38:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000020028080008000400e9110000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='\x00', r2}, 0x10) 13:38:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) ioctl$FIBMAP(r3, 0x2287, &(0x7f0000001380)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="de000000", @ANYRES16=r4, @ANYBLOB="cadc8e07d713cd39e779ad5617460492b9000000004a869ededfc662804bde4bc9b0fd66ac9499286e343bb695ce31c3ee78de288cf0cca2c5c98e8b4d4b02bca21a1d2e98a5d62f2f8c8907d52cb7b240f90a66631ed322f243afe50c2985c72aa0f481c5f8a41faa1a716e6c52deee57afcdab961d306786608ac645a925ae08c0d4ddb231deaf59daa7a96b81880000000000000000000000000033aa03887eb22e504b69a14f414c64f9cd63fdd42f1550e4569fffb8c2a269518ef29fb1cd94"], 0x3}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8010002}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r4, 0x100, 0x70bd28, 0x25dfdbfe}, 0x14}}, 0x4000) sendmsg$nl_route_sched(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=@newtaction={0x90, 0x30, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [{0x7c, 0x1, @m_bpf={0x78, 0x8, {{0x8, 0x1, 'bpf\x00'}, {0x18, 0x2, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8, 0x5, r0}]}, {0x50, 0x6, "e202292992e88bf3f345d7f4b7291a4217649e3c3a9a5587bdb70be1d3e1367da5b9867285f5860c1d30d5bce6369594b336b52348d63c8577d11ee58cb2fc4d4deb6bac380b8dfe394578"}}}}]}, 0x90}, 0x1, 0x0, 0x0, 0x44024}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x20, 0x13, 0xffffff1f, 0x0, 0x0, {}, [@nested={0xc, 0x0, [@typed={0x8, 0xa, @ipv4=@multicast1}]}]}, 0x20}}, 0x0) r5 = syz_open_dev$video(&(0x7f0000000400)='/dev/video#\x00', 0x1f, 0x7a080) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000440)) [ 221.275592][ T9470] bridge: RTM_NEWNEIGH with invalid ether address 13:38:39 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0xd, 0x0, 0x10000}}) ioctl$RTC_UIE_OFF(r0, 0x7002) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$FIBMAP(r2, 0x2287, &(0x7f0000001380)) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$FIBMAP(r4, 0x2287, &(0x7f0000001380)) accept4$alg(r4, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100c080}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="de020000000000000000", @ANYRES16=r6, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x400}, 0x8000000) 13:38:39 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x88900, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$FIBMAP(r2, 0x2287, &(0x7f0000001380)) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0)=0x2c6, 0x4) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000040)={{0x1, 0xe78f0ee8e979489b, 0x7, 0x3, 0x590}, 0x4, 0x7fff, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r3, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)="12f57aa3e70f98457c3a4a5a30a8ade350072389714976db0ad830860f3fe1367896771e37a5c156747e06e829ee", 0x2e}], 0x1, 0x0, 0x0, 0xeffdffff}}], 0x3ffffffffffff37, 0x4000) [ 221.409979][ T9479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 13:38:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'\x00', 0x1000}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0x3, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff21) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffd67) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x41, 0x0) write$P9_RREMOVE(r3, 0x0, 0xffffffffffffff1b) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @loopback, 0x9}, 0x1c) utime(0x0, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x180000) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) r4 = openat$c