[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 65.375832] audit: type=1800 audit(1552044135.430:25): pid=9633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 65.394917] audit: type=1800 audit(1552044135.440:26): pid=9633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 65.414223] audit: type=1800 audit(1552044135.450:27): pid=9633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. 2019/03/08 11:22:29 fuzzer started 2019/03/08 11:22:34 dialing manager at 10.128.0.26:42131 2019/03/08 11:22:34 syscalls: 1 2019/03/08 11:22:34 code coverage: enabled 2019/03/08 11:22:34 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/08 11:22:34 extra coverage: extra coverage is not supported by the kernel 2019/03/08 11:22:34 setuid sandbox: enabled 2019/03/08 11:22:34 namespace sandbox: enabled 2019/03/08 11:22:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/08 11:22:34 fault injection: enabled 2019/03/08 11:22:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/08 11:22:34 net packet injection: enabled 2019/03/08 11:22:34 net device setup: enabled 11:24:39 executing program 0: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) syzkaller login: [ 210.197605] IPVS: ftp: loaded support on port[0] = 21 [ 210.330034] chnl_net:caif_netlink_parms(): no params data found [ 210.390653] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.397746] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.405939] device bridge_slave_0 entered promiscuous mode [ 210.414970] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.421425] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.429579] device bridge_slave_1 entered promiscuous mode [ 210.461361] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.473024] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.502878] team0: Port device team_slave_0 added [ 210.510807] team0: Port device team_slave_1 added [ 210.696163] device hsr_slave_0 entered promiscuous mode [ 210.852409] device hsr_slave_1 entered promiscuous mode [ 211.011517] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.018086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.025212] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.031723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.106928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.125902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.136838] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.145915] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.156343] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 211.175050] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.190873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.199286] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.205817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.259374] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 211.269672] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 211.286473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.294692] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.301140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.310541] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.319388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.327851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.336538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.347684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.355419] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.389725] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 11:24:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)=""/252, 0xfc}], 0x1}}], 0x1, 0x0, 0x0) 11:24:41 executing program 0: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 11:24:41 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 11:24:42 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') pause() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x2000200) 11:24:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:24:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x2, 0x0, 0x0, r2, 0x1}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0xc, r2, 0x6}) [ 212.276490] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:24:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f00000003c0)={0x1, {&(0x7f00000002c0)=""/207, 0xcf, &(0x7f0000000100)=""/50, 0x0, 0x2402}}, 0x68) write$vnet(r0, &(0x7f0000000440)={0x1, {&(0x7f0000000040)=""/80, 0x50, &(0x7f00000001c0)=""/142, 0x0, 0x2}}, 0x68) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x800, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000180)) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x7d, 0x1) 11:24:42 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x2e, 0x40000) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) rt_tgsigqueueinfo(r0, r1, 0x28, &(0x7f0000000080)={0x0, 0x0, 0x1}) 11:24:42 executing program 0: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x4002, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000600)={0xaa, 0x13}) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000380)) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2e2f66696c65302f66696c653000b5e8416f4141b294708538d5d03d30e1467686fc93cdcaa1d25161aef6a64d052356b40cde6fbc9c6c8cb3cbcc467dc4c65ac6ab07a3e4cf595621668a2e01c8b2184811d831b3c92ba69aaf930100d2cfc71133c314c2"], &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000280)='gfs2meta\x00', 0x201000, 0x0) mount(&(0x7f0000000240), &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000340)='ext4\x00', 0x3002480, &(0x7f0000000700)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80080) execveat(r1, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000400)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='selfvboxnet1*\x00', &(0x7f0000000180)='procppp1userwlan1\x02\x02(,vboxnet0selinuxvmnet1\x00', &(0x7f0000000200)='ext4\x00', &(0x7f00000002c0)='ramfs\x00'], &(0x7f0000000500)=[&(0x7f0000000440)='md5sum^eth1\x00', &(0x7f0000000480)='ramfs\x00', &(0x7f00000004c0)='%eth1!\x00'], 0x1000) getsockname$inet6(r1, &(0x7f0000000640), &(0x7f0000000580)=0x1c) 11:24:43 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x6, 0x1) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="67446698010000000400030003000000f5a11167d004474dc19ed78c8e213bc86a07f3aaf606b1af485cb4e5fbe7f651a8d0d8112ac18673d95da81bb285391d53acf548b41b56bdfa32cc57a895f0b331dc2d30fd5187e7365a049ba4f2084e27a6eb6abe75be0c591ccc57678133a7fcf2af310361d8cda42147ef65fefc231f62bf9ab3120e1db8f3308cc29e8449f12782c8edb11604f1a400000000000040000000000000000000"], 0xa6) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00') 11:24:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd84, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x67c) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@rand_addr="46c47c1ed4a15ba5634a38620c96604b"}) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000080)) [ 213.169455] bridge0: port 1(bridge_slave_0) entered disabled state 11:24:43 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/4096) r0 = syz_open_dev$midi(&(0x7f0000001000)='/dev/midi#\x00', 0x100, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000001040)={0x6, 0x1000}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x1b}, 0x100000001}}, 0x0, 0xab7, 0x0, "808380f3c5805f58295d45c97ddc9f00773ed0c3357294ee1de7908183082000c1035fe3c8678b1d61be437534b962b899a10b12a3f85878a1f4771bce0da370c481c0ab6536ca25b81e6a133561c2ef"}, 0xd8) write$binfmt_aout(r0, &(0x7f0000001240)={{0x10b, 0x3, 0x7, 0x2f8, 0x34d, 0x2, 0xe, 0x8a5d}, "88f93bd529682d91bc96b6843f495a7bafe046e841d9aeef4bbbe3301493fe4672486e64b8f9c942ee99b02299b4f0347c0bc9e7874f6c2a2d194a991f5a33a5185e0c9cdcc47ea931a040644172d4347d8f3b1bcc52d978becda56c78a6c0788339b141cac8e50c6837c480b9337486ef4b8d934d6070be7a58cd6139ffe3c2d305984dbcf25a59cc", [[], [], [], [], []]}, 0x5a9) getxattr(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)=@random={'security.', ')[(\x00'}, &(0x7f0000001880)=""/155, 0x9b) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001a00)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000019c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000001a40)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000001940)=[{0x10, 0x0, [0x8000, 0xfffffffffffffffa, 0x3, 0xff, 0x100000001, 0x5, 0x2, 0x9, 0x8001, 0x1000, 0x2, 0x4, 0x2, 0x8, 0xd79c, 0x8]}], r1, 0x1, 0x1, 0x48}}, 0x20) getgid() getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001a80)={0x0, 0x7fffffff, 0x1, [0x5]}, &(0x7f0000001ac0)=0xa) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001b00)={r2, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}, 0x1, 0x4}, &(0x7f0000001bc0)=0x90) removexattr(&(0x7f0000001c00)='./file1\x00', &(0x7f0000001c40)=@known='trusted.overlay.upper\x00') ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$TIOCSBRK(r0, 0x5427) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000001cc0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000001d80)={&(0x7f0000001c80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001d00)={0x1c, r3, 0x500, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000885}, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000001dc0)={0x28000000, 0x3a8c1f43, 0x15}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001e00), &(0x7f0000001e40)=0x4) semget(0x0, 0x0, 0x8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/net/tun\x00', 0x1, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000001ec0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001f00)='TRUE', 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000001f40)={0x73, 0x40, 0x7, {0x77359400}, 0x1ff, 0x1b9400000000}) timerfd_gettime(r0, &(0x7f0000001fc0)) fsetxattr$trusted_overlay_opaque(r4, &(0x7f0000002000)='trusted.overlay.opaque\x00', &(0x7f0000002040)='y\x00', 0x2, 0x3) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000002080)) signalfd4(r4, &(0x7f00000020c0)={0x4}, 0x8, 0x80800) stat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000021c0)=0x3, 0x4) 11:24:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd84, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4603010200010000000000000003000300a90d000008000000380000004b0100007e7b000006002000010003001e0ff70000000000ba9fa32f344700000500000007000000c75c00000101000009000000090000003dacc89257b159b42ca13ff7f6c6fae421a6450dbad46229b58917ab4a014388c15cfdc100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6a622200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bddb405b386a1dfffbd82ee64f527e7b2e30a411ea44e2fb67a97349439459da5882ff0bc3fb902246895342f4a6bae5a33e2a56bdf6476bb69f9bbb44f1b9b21e6be8277106306b23174d27428e94a83d941e510023078d11df5ef2"], 0x67c) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@rand_addr="46c47c1ed4a15ba5634a38620c96604b"}) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000080)) 11:24:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7ff, 0x2) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) getpeername$packet(r1, &(0x7f0000000140), &(0x7f0000000180)=0x14) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0x2) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="292e96052f8edba2a1510cdf18edf383", 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505331, &(0x7f0000000080)={{0x7ffffffe}, {}, 0x0, 0x3}) 11:24:43 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x805) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x4, 0x53c7, 0x6}, 0x1}, 0x20, 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x41045508, 0x0) r1 = msgget$private(0x0, 0xc) msgctl$IPC_RMID(r1, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x0, 0x57, &(0x7f0000000140)="15a376c5279efc77cfcac9d59eb10a10e5fa1f0dbfd39cc70f6fca41293dece03f411e5405bab8ab62cf2f53b4d1fc10769b22782d6cdf2a8e7215165aa244fee56fd6d442e779d42c6627c0bc0f523581a52a4aaba2dd"}) [ 213.873333] IPVS: ftp: loaded support on port[0] = 21 11:24:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f00000004c0)=[{}], 0x1, 0x200) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x38, 0x400) connect$bt_rfcomm(r2, &(0x7f0000000180)={0x1f, {0x8, 0x3, 0x4, 0x80000001, 0x5, 0x7}, 0x7fff}, 0xa) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0xdf1505a9ebb5e838}) shutdown(r0, 0x0) [ 214.071167] chnl_net:caif_netlink_parms(): no params data found [ 214.170938] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.177534] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.185709] device bridge_slave_0 entered promiscuous mode [ 214.199327] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.205902] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.214091] device bridge_slave_1 entered promiscuous mode [ 214.245021] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.257072] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.288549] team0: Port device team_slave_0 added [ 214.297025] team0: Port device team_slave_1 added 11:24:44 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'nr0\x00', {0x2, 0x4e20, @multicast2}}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20002, 0x0) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000040)={0x5, @pix_mp={0xb4e, 0x400, 0x33734f56, 0x3, 0xb, [{0x80, 0x3}, {0x5a9, 0x3}, {0xffffffffffff564a, 0x9}, {0x0, 0x7}, {0x7, 0x3}, {0x1200000000, 0x7}, {0x1, 0xebf}, {0x4, 0x9e8a}], 0x3f, 0x0, 0x9, 0x1}}) [ 214.396775] device hsr_slave_0 entered promiscuous mode 11:24:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x800, 0x0) ioctl$BLKROSET(r4, 0x125d, &(0x7f00000000c0)=0x2) [ 214.442932] device hsr_slave_1 entered promiscuous mode [ 214.623983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.654585] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 214.678667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.686633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.699457] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.728644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.737162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.745362] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.751856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.759454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.767957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 11:24:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x3f, 0x0, 0xff, 0xb43d, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r2, 0xbd, "6de336a6faa9abbdacd279a2fb55434eb93becea6a143a46e0fbd6f8838601ef04088b5baed046270a57ea89e668c9d5dae4c234e55787ad04882d67138558a1acd9dc8c3a1d6f6beea8d132cac9674a2b3b34e97d5c27ee2805e9e91ed503ade9dcda40d2439da9a9d0113553684445b0c9608f3dcbb911fdcb7eb47273484bf9a125ca6ee416435146db104dbb4b1a4c9ee8418d391c080207648c4e40ed779384dc54c5576c398edf8512296b2388c743de72ad343c0c73ed459ff1"}, &(0x7f0000000440)=0xc5) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x6, 0x9, 0x0, 0x4, 0x14, 0x2, 0x2, 0x400, 0x2, 0x400, 0x5, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = msgget$private(0x0, 0x60) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000240)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) fsetxattr$security_evm(r0, &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "523fa48d973a52270bc2af8b88443467"}, 0x11, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) msgctl$IPC_RMID(r3, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000200)) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x4000) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0)=0x3, 0x4) [ 214.776323] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.782848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.833361] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.842100] QAT: Invalid ioctl [ 214.843101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.860104] QAT: Invalid ioctl [ 214.875578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.876535] QAT: Invalid ioctl [ 214.884335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.894143] QAT: Invalid ioctl [ 214.894449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.897655] QAT: Invalid ioctl [ 214.905683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.916325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 11:24:45 executing program 0: unshare(0x20400) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ramfs\x00', 0x3, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x4, 0x40}) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syncfs(r0) [ 214.936159] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.957329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.964909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 11:24:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "f1d255b7f70a907c13ec1d8b4e979ea505b497ab026abce0bd4c9514845d0bad94b63c096bbd809b96d34d51fcc0416de10a8853a0afb1c14cb66d31a443d4ae96cd8077dbd6866922dde010c5ee1097"}, 0xd8) r1 = dup3(r0, r0, 0x80000) ioctl$KDDISABIO(r1, 0x4b37) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000000)=""/193) close(r0) 11:24:45 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f00000000c0)=0x200) seccomp(0x0, 0x1, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x3, 0xb16, 0x401, 0x41ca}, {0x4, 0x7, 0x6, 0x7}, {0x9, 0xcb, 0x7, 0x5}, {0x0, 0x2, 0x4, 0xa7}, {0x80, 0x0, 0x100000001, 0x3}, {0x100, 0x3f, 0xfffffffffffffffd, 0xd6}, {0x3, 0x0, 0x3df1, 0x400}, {0xffffffff, 0x2, 0x5, 0x5}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7, 0x8000}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000280)=0xfffffffffffffef5) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000200)={0x1, 0x0, {0x6, 0xfffffffffffff4df, 0x301f, 0x3, 0x8, 0x4, 0x2, 0x7}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'gretap0\x00', r2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ifb0\x00', r2}) 11:24:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80080, 0x0) clock_getres(0x4000000006, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000080)={0x1, 0x2, {0xffffffffffffffff, 0x3, 0x835, 0x3, 0x9}}) ioctl$VIDIOC_G_STD(r0, 0x80085617, 0x0) 11:24:45 executing program 1: r0 = epoll_create1(0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x4800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0xffffffffffffff88, @mcast2, 0x1}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x3c) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xfffffffffffffff7, 0x10000) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000140)={'bond0\x00', @remote}) close(r0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@v2={0x7, 0x3, 0x2, 0x101, 0xab, "13a35115630b08fb004c6b3d045373290cf078e4fa64e3163886506c924a4f264d04afe0e8fdc5b17e40ca479fe9236a8afd65f4bc5808452f5c721e49a4d4c493ec7c94d78376076159e0d6c497789ddeb40b2ff7479abf5e60778262d4b529a849e764269beb97c490e5ade8475da5be2f310d73f6ccdf7981ba2aaeda3751cab7b79fbe79ac13ba5dd231d16762df83e035fb7b6de2a54707eae40c362d7337ea7e020fb4789c1e8119"}, 0xb5, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000003a40)) 11:24:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x7, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) fcntl$getflags(r0, 0x1) [ 215.596053] (unnamed net_device) (uninitialized): option arp_interval: invalid value (18446744073709551615) [ 215.606295] (unnamed net_device) (uninitialized): option arp_interval: allowed values 0 - 2147483647 [ 215.620274] (unnamed net_device) (uninitialized): option arp_interval: invalid value (18446744073709551615) [ 215.630358] (unnamed net_device) (uninitialized): option arp_interval: allowed values 0 - 2147483647 11:24:45 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xe7, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x480000, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000001c0)={{0x7, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\xaf\x0e\x00\x00\x00\x00\x00\x00\x00\x9e\x00'}, 0x0, [], {0x77359400}}) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) accept$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) 11:24:45 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0xc74, 0x10000) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000002c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="1b040000000000001e5aae075b8ab8330700000044022e1ede4bc4040000002b2f00000000000010"]}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f21298055806494ee0e961cd5bd077bd7756f9e39dd3abdbe5c598cc5cbd44c5c319af923fbc4731545ff134749c2f42ee8454bf33ef309a6323dc847676d5be2fcb9abc717fc1e29396943ec0e264a80d64ca66ef2c42a57112a8a146097d9f4256ef6e6fd73be26e9a5f79b21dae42066d9cf4441021d64a2d6fd61c7ea709948d4be380e0fa4b76dff6aeef45", 0x1a1, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x401, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000240)={'bpq0\x00', 0x3}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f00000001c0)={'sit0\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) fremovexattr(r1, &(0x7f00000003c0)=@known='trusted.overlay.origin\x00') 11:24:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x32, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa4d639cb5c394e48ec05ee8000112022f3bf6caa600000000010008004600004da8a949cc0d839e4d55fb5788"], 0x0) 11:24:46 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000840)=ANY=[@ANYBLOB="0180c2fa70cba08a554fe0bb080045000030000000000067bdb332559e7e7cdae390780a000000ffbfd81528d4efb656650cf215ffffff2100908400000000450000030000000000000000ac14ffbbe00000011eed3b778802ddf6896adbd6ad1ab431d8c708c2a7d57f3d533ccddb671dbc6846746f08e38415b1f4bb55e2dc3cec832482ad7b3bd38d19f784c8e1c98a"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x326]}) socket$tipc(0x1e, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200082, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) move_pages(r1, 0x7, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil], &(0x7f0000000180)=[0x8d, 0x3, 0x2e, 0x200, 0x2, 0x10000], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x6) r2 = getpgid(0x0) process_vm_writev(r2, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/194, 0xc2}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000380)=""/3, 0x3}, {&(0x7f00000003c0)=""/50, 0x32}, {&(0x7f0000000400)=""/109, 0x6d}, {&(0x7f0000000480)=""/163, 0xa3}, {&(0x7f0000000540)=""/1, 0x1}, {&(0x7f0000000580)=""/40, 0x28}], 0x8, &(0x7f0000000800)=[{&(0x7f0000000640)=""/57, 0x39}, {&(0x7f0000000680)=""/213, 0xd5}, {&(0x7f0000000780)=""/70, 0x46}], 0x3, 0x0) 11:24:46 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000040)=""/5) r1 = socket$rxrpc(0x21, 0x2, 0xa) recvmmsg(r1, &(0x7f0000001740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 11:24:46 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) io_submit(r2, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x501000, 0x0) 11:24:46 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000840)=ANY=[@ANYBLOB="0180c2fa70cba08a554fe0bb080045000030000000000067bdb332559e7e7cdae390780a000000ffbfd81528d4efb656650cf215ffffff2100908400000000450000030000000000000000ac14ffbbe00000011eed3b778802ddf6896adbd6ad1ab431d8c708c2a7d57f3d533ccddb671dbc6846746f08e38415b1f4bb55e2dc3cec832482ad7b3bd38d19f784c8e1c98a"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x326]}) socket$tipc(0x1e, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200082, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) move_pages(r1, 0x7, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil], &(0x7f0000000180)=[0x8d, 0x3, 0x2e, 0x200, 0x2, 0x10000], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x6) r2 = getpgid(0x0) process_vm_writev(r2, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/194, 0xc2}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000380)=""/3, 0x3}, {&(0x7f00000003c0)=""/50, 0x32}, {&(0x7f0000000400)=""/109, 0x6d}, {&(0x7f0000000480)=""/163, 0xa3}, {&(0x7f0000000540)=""/1, 0x1}, {&(0x7f0000000580)=""/40, 0x28}], 0x8, &(0x7f0000000800)=[{&(0x7f0000000640)=""/57, 0x39}, {&(0x7f0000000680)=""/213, 0xd5}, {&(0x7f0000000780)=""/70, 0x46}], 0x3, 0x0) 11:24:46 executing program 1: sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x100000000006, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x4, 0x3, 0x4, 0x1000, {0x77359400}, {0x2, 0x0, 0x1f, 0x3ff, 0x61a50f5d, 0x8, "75a1c813"}, 0x8, 0x1, @offset=0x2, 0x4}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0585605, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1}) 11:24:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = socket(0x14, 0x1, 0xfffffffffffffffb) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @loopback, 0x0, 0x0, 'sh\x00'}, 0x2c) r2 = socket$rxrpc(0x21, 0x2, 0xa) sendfile(0xffffffffffffffff, r2, &(0x7f0000000000), 0x0) 11:24:46 executing program 1: r0 = open(&(0x7f0000000000)='./file0/../file0\x00', 0x2, 0xfff7fffffffffffb) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x200000) 11:24:46 executing program 1: r0 = socket(0x400200000000010, 0x80000000002, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@loopback, 0x7, 0x3, 0x3, 0x4, 0x994f, 0xfffffffffffffff8}, 0x20) write$P9_RSTAT(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="4d0000007d0200000046001f000800000040040000000300000000000000000080060104000080000000020000ebffffffffffffff000e006e6f6465764073656c6673656c816abc3a540014760c41bf575d27c35fae66d440ff585a27df2cdca0a47d9b690cc709fd6b085a4ebf4f023ed09c769f4f7603db0c8cf11616f87f80de469ad4e91e29f11f01259be3c7a9ef94"], 0x4d) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000000)=0x5f) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000080)=""/36) write(r0, &(0x7f0000000100)="240000002a007fc34b00000000ed76012c0aaf4bc900ff01000000000000ffff010002bd", 0x24) 11:24:46 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000180)={0x48424072, 0xfffffffffffffff8, 0x1}, 0xc) ioctl$KDSKBLED(r1, 0x4b65, 0x80) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:46 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4002, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f00000001c0)={0x0, {0xfff, 0x7}}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x40000, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)=0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x200002) prctl$PR_SET_PTRACER(0x59616d61, r4) io_setup(0x40, &(0x7f0000000180)=0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="3f5385175b92c9d5b74c36d2d0bd7c15ce1812ffb74c4dba6f50208dd4668de370cbf81dde84d05f8b089bfd82e45456de2bce5422c2504c6bb0a81f613686902e9d7ca2f9845c746326dd450964a44b88733de7cacac72aedd4d1e138291bd824246e8cef58af3ae995a5c0a55ad1fa6968e368f604b4251fa0da6878c50e3e401cbe740d7c2a27870b31af155b6a11d4ed27a2f8392e93eaa0b41b98a1299f0e935cd957935ae83ab5aa66c047161a7d901a0be3a80d23e9b17d0a22d36ecdbd05"], 0x1) r7 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x145100) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000340)=""/237) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000800)=0x8, 0x4) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000740)=""/132) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000540)={0x0, 0xd3, "f6528e74c4aacc4c56d3a2457ce07f709885ca8026a3b8ee8ac8ba2347d818e8f286800895347078ae80570d52b0caa2ebfad71dc30a9c16a714573725f1268d191b2a8d2aa07c2b354b9487eb4bd95cf711f54c42335795aec745f472385328773c9936772e05110de41677e3a28665832703e0ec2b4d3b1d94c09247e1673d97a5d77d363f40258d4c905e458d6c1b992d59fff8e0e955fb31b91f433b86f6dd1cf03690d80df58d6a78e35d9cb7fced98141fe1589f5025edcf85655f0e9a1d5dec95d1d760bf5647774e79af22641646fd"}, &(0x7f0000000000)=0xdb) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r7, 0x84, 0x6c, &(0x7f0000000640)=ANY=[@ANYRES32=r8, @ANYBLOB="c4000000408c6e7bda5f63f8d3c595ed1ca299ac94de567a0d3d46f99ed3053343df4b06cadfd826fc364263231bf27545316218889a308c081f171bf7dae7aefa177771f7f4601558cd9d4f11de9612ee3002e0431a53c45ed6ca23490723b4ab48b66e1ca6e84373e29878795ea09e010ea65bb3ec0a5d851292de818ac028ba7ea69fa296a61b8012647a4f11d9bb17ae7483ca4fbd98f5ad8a4773abba021e34f1ade44fe05bf2f765cabaf088dfccbdac763acff50b4be495fc2a0cfdf04a1dc0d10e1eab2b"], &(0x7f0000000040)=0xcc) io_submit(r6, 0x0, &(0x7f0000001540)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000880)={0xffffffffffffffff}, 0x111, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000900)={0x1, 0x10, 0xfa00, {&(0x7f0000000840), r9}}, 0x18) 11:24:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000180)={0x48424072, 0xfffffffffffffff8, 0x1}, 0xc) ioctl$KDSKBLED(r1, 0x4b65, 0x80) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:47 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f00000000c0)={0xb57, 0x1}) 11:24:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000180)={0x48424072, 0xfffffffffffffff8, 0x1}, 0xc) ioctl$KDSKBLED(r1, 0x4b65, 0x80) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="fdc0e5f506e09dbafc27eaa056d2e572df5de6b9f1b6e5afb84437270012d29bcf5dc03b73fa201c2a66d5d41935ed654af3f67538eb976192d413d5dc59e1bb66630e9309e1dfcec57339f92cc39753a5695c65a7edaea3c207b5b4c7a5a3d75ac21d4e272d303c0a231545368b1aeb9aeb075ab232176008001087ace3f172abe36ddb6945c6b4c3b71e743833f555c232138f89a7479f"], 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000000)='/dev/sequencer\x00', 0xf) [ 217.374123] protocol 88fb is buggy, dev hsr_slave_0 [ 217.379661] protocol 88fb is buggy, dev hsr_slave_1 11:24:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x7, {{0x2, 0xd1f8, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1}, 0x90) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000080c20000000000000000000000b8000000f000000028010000697000000000000000000000000000000000000000000000000000000000000020000000b3000000007f000001ac14140000000000d6f36837684796d91ed97d00000000008420000000000000030000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000bc411c943a134043083ca0397a3c00000000736e61740000000000000000010000000000000000000000000000000000"]}, 0x230) [ 217.554988] syz-executor.0 (9982) used greatest stack depth: 53544 bytes left 11:24:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000180)={0x48424072, 0xfffffffffffffff8, 0x1}, 0xc) ioctl$KDSKBLED(r1, 0x4b65, 0x80) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x7, {{0x2, 0xd1f8, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1}, 0x90) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 11:24:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x3, 0x3, 0x10, 0x3, 0xb8}}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)={0x0}) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f00000004c0)={r3, 0x3}) ioctl$SG_IO(r0, 0x227d, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, @buffer={0xee, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1d, &(0x7f0000000200)={@mcast1, r4}, 0x14) 11:24:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000180)={0x48424072, 0xfffffffffffffff8, 0x1}, 0xc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)={0x3, 0x0, [{0x40000001, 0x10000, 0x4, 0x7, 0x1893, 0x9, 0x2}, {0x8000000b, 0x6e, 0x6, 0x3, 0x4, 0x1000, 0x14ccaec6}, {0x4, 0xff, 0x5, 0x63, 0xffffffffffffff01, 0x32c9, 0x7}]}) [ 218.020214] protocol 88fb is buggy, dev hsr_slave_0 [ 218.025674] protocol 88fb is buggy, dev hsr_slave_1 11:24:48 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)={0x3, 0x0, [{0x40000001, 0x10000, 0x4, 0x7, 0x1893, 0x9, 0x2}, {0x8000000b, 0x6e, 0x6, 0x3, 0x4, 0x1000, 0x14ccaec6}, {0x4, 0xff, 0x5, 0x63, 0xffffffffffffff01, 0x32c9, 0x7}]}) 11:24:48 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)={0x3, 0x0, [{0x40000001, 0x10000, 0x4, 0x7, 0x1893, 0x9, 0x2}, {0x8000000b, 0x6e, 0x6, 0x3, 0x4, 0x1000, 0x14ccaec6}, {0x4, 0xff, 0x5, 0x63, 0xffffffffffffff01, 0x32c9, 0x7}]}) 11:24:48 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)={0x3, 0x0, [{0x40000001, 0x10000, 0x4, 0x7, 0x1893, 0x9, 0x2}, {0x8000000b, 0x6e, 0x6, 0x3, 0x4, 0x1000, 0x14ccaec6}, {0x4, 0xff, 0x5, 0x63, 0xffffffffffffff01, 0x32c9, 0x7}]}) 11:24:48 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) 11:24:48 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:49 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) 11:24:49 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:49 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0xc0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x4a) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x4, 0x1, {0xa, 0x4e23, 0x0, @mcast1, 0x5}}}, 0x3a) readahead(r0, 0x5, 0x4) write(r0, &(0x7f00000000c0)="8631d555a4ce23883d3b5564cdce46e86d351667d42801e701c98d3ca015adc2336a278dc41a28efd75abed4cb16f433", 0x30) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000100)={0x3, 0x0, 0x2080, {0xf000, 0x0, 0x1}, [], "9c90e45ee525aade18aa95d66acd273917dddeef57a1de8a809307b6ac8969fea2ab989ce5b5354cb5eae460342438e95215ed2d5865a693c7e7f9fb2a895d9b56dee801767480032baac829114dc8993395e09420991a62075744cd4b6b05601961f335360ddc084682ffdb4c9853aa9be445a697fbfe0516b4210ce2f74685a3ba6a58ad0b2a05428f0e5faebdb01017795a8b5e87c19f10f1ce9d92fb4f61ee11221599043b8805201dceac773e200b39f92830bc69807560184b088c67beda8df0dbbca3a52c762a7a905541804ac3258f6329a2ab159fc18e2714ec8f7d7bb860093f3a0facc329a12f1dfda8d3a8e6373aeff20da9b5845ab54b35b0fd2a5c21bc326795de24320de177b1eb5d8b795531fbae947cb78998f04120f9c13a4d871cda8216965b9711eca974f0f7a3289032a33036c35aba35e8573c5dc6adf37ab12066e55e7dab7a066a90abcf21b78c851e19b95ac444dd79cda89925501981c26e85e7cc65d82f2dbea7ef2d247427b110375d046a0fbf32e93e33ada7215f38dbee7449cbe1186bc94eab775c6fc846c93ed7c96107cb94db1f5b9d6aaf7029774100fd2ebaf86fe79945322ea1063144df9b77bdbb2d38a0eb8e732a3f4122414c139b7d43163c9cb68f0f1a2a535f21702d743bf75a1cfa4bcfc0f17af2d5f4df71bdf30125ed6872a1d865ea851249055a0f8f0fd00840236a03806c6d97426c88e60a3e0e300dfdc1e1845b317661008b1d1b608771af45f8d4cac190bd0624af7b7d8117d59157cdbbf5a47515e1f5ab056db556e5b7bf682339019ea684bced0ff629ef23083db28dde1ad7268087720adcb10b66e90f614860061571abc9f7d2055a1a4746f5e1b1022e09d8644d10675f6d8fdbb628a592d8bc100d66458312ef4f70f457222785c3944eb89d82813c31c5dc42f526ea025545703ebb494203742931dde1a4b88e334a4490c391a30755728744daedf95f9422d63c3e21e7e2f9bc977ad1f4952a5870e6d91d3f522a4f9f4ff834e23b32ca8582016a4c756f03495608d9aa5be6394c06505db67e81afc29eb8e8b7d390e988001f16858d6030acde7c807f44753c79959e54acedfe47238916bd75bc9b6e7536ee1a062d014795f1ddb32f8fbbf95a25b95fb2394f3c0ca92bc220d4497456aeb44ff0a26e2e0fe573e260931109713b8d989165a39351df3b58b93bdceaffd60a8d1566973ce9928218d56cecc2b638101f3f45ae5c9d4a5c683fb61cfe8a4be35b7be36bff7059384fa61f49bb69efb43d9c08decd2537c730b4e8d5793e466e1f82e0fee7abcc47d3a1f60cbae1cb8e5774a4064751a2fe857bc909a8b40db315aa5d09df849f46ebca1b1dd3bbd3e6749c2652f1b9ee80b804a23c4bb8a8c2c792891d0b670b1947e05a98a292cc4c404215d776cfde32283548c696aa767e915db3ad3ca73186512ee90231f0b945feb2fd4a1b5de47e680ef26eb47e9bd6eb67476a415d6026cc4c84d6c5c2d4585e477a69f9a1b1eb2982f08136eb301998d16f2c5062f9119d63f83934f969f7b9aaff317eff1725974c64137d77087efa217870e1a181ed39199abf381c76380a183281f7c45b41c811a937ad53733e34cfbbc3307372dcb335fbacc1749f2cd907805121555611f8b8ca594b590f73702bacff07bd484005e242c6ef5064c7f6928dbdaff212b55634ea5712cf5376574f47a9616299e9f3672dcc37b18c72002612bd766f5f566e915cf3dae4c83a2bf8af15a161ae45a2e08a65d19a70464448cebae2e8aa003f31e3afde12d1889682458900a7acbfd6e1c47b11db3a39103565081fc4ec0c734b8e7d24072cf766e694f606b3d7b573fd394bdf9b58b9163d92970991569409077e4e5c48c43fa5d4b77eb350aa8b9684692ace3d3c8ecf17531eefee1be2c871f3e2c23519807d470a30dd5c7c98a5dbc2a08d13165d2ae71fbf936bb83f62f5b509356f0a903e381a7a17e8a20e7158cda291d30dd3f06e1ff8cfda9e34fc877f6f036f29ef1c7b75af6006c938718bc9d4ca87e7a705d6ce4050e6f9a1f940bf2cc6c65af2dc5d29caa742752b8bc321ac0d4be073b69dfea346acbe0229aa842c578395e8ede491112ecfa7affd8eda175cc99906d734d67c3bd929def98bb503a4180990c92447b666af2f7ea1363d9d91a9a129fc3a898cdba3a6323ba0ea6d301e8e50e46e3e458cbf0ad7d78e696239f8eea1938d3886b0f53390ba153a8403875d1f4c9f5b9eff14aa9d7563a020e128940481bbab2e4d9182d2c0de4b00d444bccdec82c490c620746c11b27324d27b7a18327a92258dc2dbe4a7974a771f28ea01c57152611cf391848be7cc7acc09c869d8b9a1141cc9d3cb9162d9048ec2eca6a5609b6f5bc9eb3c98f5c1b3696c67e2991cadf4af782c6085d69e474bd305e1c97d46afe1d2d332bb94fff8483dfe650b0fde208e02843e3d35facfff818a154272612e16b9887137255746a0f7af6fef6e36b36784e09f68c7e725716c3d09318333de3a841a2ec13c52a45409df002256e2f7a9796486b38b8d506de420f87843e3eaef758c9a9a686c221ebd918f76f62bb5b4ec1578683482434601321a9a43a3dae75e3ad670447b0c1e74cda1681b5a3e86a915eace58127e33b2b02b87c645acd6fa5159b4845a5cdb0e7ecc03518be454b22ce8b89f30982cff73e1fec67199d965784ee2e0e3291277e2003e57095cf272889b8c093628c390496d3d8f375464c6546950fb8ca742ca50bcbdf87f8a5e76acb4ad8bd783e883ece52aa34c8a502b10d13b47762b5a623030c9e83cda1b9a113628709d346753ce3d9d2689f6083111f6960ad88ca20c557b84616b3109b4ee84f8b7945ab5c9e6cceb651d97b930bd522a319bb2ac581442e0ffc384c53325136e8168196baffcbb5d4c20893a1fa4f04ad4389a9c4e57d79676e72a96ad77b6451e95c3a5b4a57e7408085a845b9c1206434cdf0de0070a4f70bfdeb4113d346225481f24280496c6b0d1c1edb628b7200cf5a427d4dcad651153204f7c2c8cf99ef18a7b695f633a429617a35e8a0477210269911ba0066e374d228e0cf632631d64e6b06f962fa09af508719d10fdfe2c2a17515895ca28e8be85e5e69915489bfb60ecfe983c3f828945aad3e3be6721b0a9fe639b1f5fbdc9da4d2c10b86986bf95544464f5a21c4a59cead1e9c1df4eb693e2fbca6f63f3aa5bfdcfca3586f0e664f8fb2fadb1fd1c6faf4f0867aba6bfec71dac7fe89859cd0fe6914228c978e785b23addbf27afa5579965e0a76e79b156691407cb3c6caf8cbe5de22545a3381c26649a49f8a5fde41f1eafdb9c6435ba542395ecaabc6fdf65fb04daee69bd4b4bea388d824ef962ce3ffe70b5ca9c29042826eda9a77b3a523ddb43ad5d628848cd54f149fb4296dc17c6f565c110470cf9d65a66f74b04b8d7f338f965496ac3353a4a11123480c8e36676de29835a7e11ff4afbd87cb18687de5511aa5eca02831d916d94947f373f4d9aa3f8d66f6bca9b8dca67ddf8d7bb9b5d97badda971449ae6d156a240c57af3984cafd10c3744a24cab783dcb5648aba6541daefa889cf9362e939e6b14464d9ee51751309f4b70f35aa92f3da7a99e12513d5482b402d7233423aaf920b7cd8a9ff4d24ab5e203c6fc01cb3f69cf8e5145a3e00425a6b22e543275e09eb5f3ecfed2464471a1e8fbb429aeb2d3a4176670f71affa1200ffa0a4276a09cb8263675a015155f8dca385107132c88e2ae80d9ce354b25c085730d33e29ade4287af7b48f9b0df1f64cbd87492ef0d925ce58a2966c5ed8b6dde62c07ca6a1cbdd3684d8732972cd84ab09efc645befd468bbffe4eab5f15d7b01cbcc533da3ea7eb4bb5d232a6b0e92ee58ee410acc339ec8c2d7440cfce05dd24e20a3b82db32bc5f014bf84a78b2d233f3e4af36f7de10fd336041a366e53c41b3e9dadb5447d7d16b6f079053c5e2f4b3798505298fe99a46044fc9db8af37ca05302206511bfc2fb3cb71dd36294ed0f70d609d920534a354917aeab84201055d0785e05ed823caee210c0cb9df168f9f252dc420e63fb6421d5f76c7d07cc7b24a3a3591ed1d16fbe37ab2009a753d7525c31dfe1efae5d25c8503c4df1e8f65ead9268891cf98a259e602c8bc1dfbcbfa1f7c168cc53b4641f1479695c70d659b10ebc6ef84ac0e4bae98278189bd29fe1a2a5a5cb9f4124be13ab5b07fa03529485bd6dfb565b2852d38602805897f61770b5815448ae3d1a00fba2332a2824c12773b99ead9d758139a5286bd46fe6c31276142c22a96b0f2e84c3c3e46874ad939c6ebd39818ede52a3b1e015bd657062baaa58823035718bade432778833b0c552c332e170b66f196469545a59982bbebcc3a879a0a4aefcb8ba33ea8f4f3550fd716c021b42805c51f72f984e2126c109ac41a0eba96aadba02cb85076506992ae0f47a4c95c020685fd7b0fcb8cb4c416c700f26f1723a82443ecafed17213fe6a81e481a7dbaa54034af3b336c77c20b9cebfda8e4a45125adff3559c5e56eaad669e99f8d6c1fd751e851e882c552623deef64bf85dbf87c825a11723c9ac8dc1a6bb557834bdde4ac0f0e30da76333d46c98ba74d1259f910b33a32d55af865fd9c415f1d3a64c67aa7bd173154845844c81362630ca7848b2b5016878ef0ac980495d2dedcb330cdb3aaad32aad9282dbb882cedf42954ce9cdaf03fae09a6f50d5462dc2274dccac05c99df74fe3f506055b1853d1f428e3665951b07f07923a9c598ee27ae8aed26ce3f862c2e0d6e9f625ce6e6418e39e38229fd7a08e07ead0ff239bd729cf77fff8c6a2f28137a3a7f9b5e9cab5bdb7804ffd8305d012e6c4cdd0f469c16314d3bd4db4b3451b4b62d9955862f74139fc32b94cd6aa3f67da1ea4e16e204c3d9e6a879a0654da9cbc06ef0423e044299a9c22b8674f8f54dad9c6aa6e5a0d05aac6da31b7bb78b78917ea7c099cfcca36ebbc343004f36d0ef2a077a9e1ad9cc73db2996c2c5b8b101617497a3c03651016f26eec27ca304acce4be584c01f5dcb32b82d33bc4cda2953e58938bb2ad0053e33f018d47f89e3da0073f6aaac6593f261f4305eeea34b6f62d7c4a806f2e41dc1532d9decedd5d6ea2b668a17fd1d28a8911b1d9bcc15d4c773ea726e559b7cd2239bec47f02d41af8a9822a3f748f38bb8246063aee2817de7a2a51480b3af51bdf35bf4ebf0eeb5c305ffb635102fbd94f3067bce11fbd9c700d001c19d7025d8bda053cff9adf5a67d5f0c62c1eaed9e7aab44e1270b970818ae8aca3eec41a48159c8f560808f58a116b43e51750f6df2e4081b3f20d6edea236bce2b1f81a185fd9b0c1f6c28fbc4e3c380da3538e4fccf0f115f396f1ad57d0e2e69d2321444296451aad723710cc14655d92dc54c12a16c07c332aa4462071a30cf07cd80094e270231ad9fc36de5ca3901dfb5662d5e9e0a3031ed5a6c075ee698684c59592efb300269aac79d3f4fc30a167145ac7165004f38e392aff1b66714a5b7983eb321309ef4b07ba4b7251903cd26ac4cc8a7cf1c1b35d8de66be7de788a2955e1a6eb811bfa3f2c36c65701a932450fd43bb4a9c762cd50593361ccb2c37ae0d16b04067ff238852edf6cf00239d54e52c40b52cdf943634b7428e8bbe65f57ff85854d361c90aa5102d8957a91b6ab7fc934891bf1d3ab47d8eb93d2aa56c6e205054f94e6773041c71a6a3066bb5f23ab3c8a575", "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"}) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000002200)=[@textreal={0x8, &(0x7f0000002180)="baf80c66b8a869318c66efbafc0c66b80d00000066efbaf80c66b84c916b8e66efbafc0c66edf4f20f78ff00c6670ffecbd9270f217d66b9800000c00f326635000100000f300f01d10f001d", 0x4c}], 0x1, 0x71, &(0x7f0000002240)=[@vmwrite={0x8, 0x0, 0x6, 0x0, 0x80000000, 0x0, 0x80000000, 0x0, 0x5}, @flags={0x3, 0x100}], 0x2) lsetxattr$security_smack_transmute(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000002300)='TRUE', 0x4, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000002340)=@sack_info={0x0, 0x80, 0x3}, &(0x7f0000002380)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000023c0)={r2, 0x82}, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000002400)='IPVS\x00') ioctl(r0, 0x7, &(0x7f0000002440)="5851958f9835d70de951") ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000002480)={{0x2002, 0xf000, 0x9, 0x800, 0x0, 0x8, 0x6, 0xfffffffffffffbff, 0xc543, 0x2, 0x3ff, 0x1}, {0x1000, 0x6000, 0xb, 0xff2, 0x1f, 0x83, 0x282, 0x8000, 0x8, 0x7, 0x2, 0x8}, {0x2, 0x100000, 0xe, 0xdfd0, 0x4, 0x1, 0x4000000000, 0x101, 0x64eff1d, 0x1, 0xfffffffffffeffff, 0x1aa7}, {0x1002, 0xf000, 0xf, 0x7f, 0x4, 0xbc6, 0x9, 0x10001, 0x2, 0x5f, 0x4, 0xfc14}, {0xf000, 0x2000, 0x4, 0x20, 0x9, 0x6, 0x8001, 0x4, 0x400, 0x21, 0x5, 0x8}, {0x10f000, 0xd000, 0x4, 0xa8, 0x5, 0x3, 0x0, 0x4, 0x1, 0x8001, 0x5, 0x9}, {0xd000, 0x3000, 0x4a0fb9a9d21a87e0, 0xa5, 0x4, 0x9, 0x8, 0x4, 0x1, 0x2, 0x7, 0x6}, {0x10000, 0x2000, 0xc, 0x9c3, 0xd8, 0x8, 0x400, 0xf1, 0xfffffffffffffff8, 0x4, 0x1, 0x3}, {0x98113dab20ee4566, 0x5000}, {0x3000, 0x100000}, 0xc, 0x0, 0x3000, 0x200020, 0x5, 0x800, 0x1f002, [0x3, 0x5, 0xfffffffffffffbff, 0x3ff]}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000025c0)={r0, r1}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002b40)={0x0, 0xfffffffffffffffc, 0x5, 0x1ff, @scatter={0x6, 0x0, &(0x7f0000002940)=[{&(0x7f0000002600)=""/121, 0x79}, {&(0x7f0000002680)=""/59, 0x3b}, {&(0x7f00000026c0)=""/155, 0x9b}, {&(0x7f0000002780)=""/74, 0x4a}, {&(0x7f0000002800)=""/172, 0xac}, {&(0x7f00000028c0)=""/84, 0x54}]}, &(0x7f00000029c0)="ef970d45b4", &(0x7f0000002a00)=""/223, 0x0, 0x10, 0x0, &(0x7f0000002b00)}) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000002bc0)) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000002d00)={0x0, 0x0, @ioapic}) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000002e00)=0xfff, 0x4) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000002e40)={0x3f, @loopback, 0x4e21, 0x1, 'dh\x00', 0x2, 0x82, 0x3a}, 0x2c) lsetxattr$trusted_overlay_opaque(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)='trusted.overlay.opaque\x00', &(0x7f0000002f00)='y\x00', 0x2, 0x2) open$dir(&(0x7f0000002f40)='./file0\x00', 0x181100, 0x4) unlink(&(0x7f0000002f80)='./file0\x00') getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f00000030c0)={0x100000001, 0x2, 0x3, 0x1ff, &(0x7f0000003040)=[{}, {}]}) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000003140), 0x4) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000003180)=0x3) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000031c0)='trusted.overlay.upper\x00', &(0x7f0000003200)={0x0, 0xfb, 0x2e, 0x6, 0x1, "3745d140b8a751f8ed5ab069f66ea69e", "b74e47a1541f65c0b5116954a905a63158e225e445eca30d3d"}, 0x2e, 0x3) connect$inet(r1, &(0x7f0000003240)={0x2, 0x4e23, @local}, 0x10) ioctl$TCSBRK(r1, 0x5409, 0x0) getpeername$packet(r1, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000050c0)=0x14) connect$can_bcm(r1, &(0x7f0000005100)={0x1d, r3}, 0x10) 11:24:49 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:49 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0x2b, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 219.701131] IPVS: ftp: loaded support on port[0] = 21 11:24:49 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) 11:24:49 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 219.855477] chnl_net:caif_netlink_parms(): no params data found [ 219.921731] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.928185] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.936089] device bridge_slave_0 entered promiscuous mode [ 219.958385] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.965038] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.972995] device bridge_slave_1 entered promiscuous mode [ 220.056619] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.067171] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:24:50 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 220.097008] team0: Port device team_slave_0 added [ 220.104859] team0: Port device team_slave_1 added [ 220.187056] device hsr_slave_0 entered promiscuous mode 11:24:50 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 220.262367] device hsr_slave_1 entered promiscuous mode [ 220.333263] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.339826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.346851] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.353337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.450483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.470779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.480236] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.490918] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.502440] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 220.530885] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.556808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.565691] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.572188] bridge0: port 1(bridge_slave_0) entered forwarding state 11:24:50 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 220.660974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.670040] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.676547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.685588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.694458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.702857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.711045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.726108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:24:50 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) [ 220.756745] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.791282] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.842385] protocol 88fb is buggy, dev hsr_slave_0 11:24:51 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:51 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8240000, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r0, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendto$inet(r0, &(0x7f0000000080)="2ee34fa862a1ee326de2e7a3d353072edcc641e7c66cf9cc3da5f8ec5f0584eb5097e7d3430ce37bc78fe2f159539a14558f09160359752c7b99b7845bc7abd57d4174f8c91546e2155975a5d9fd2ac634e97cc1aad0a314b385be831c37c8a5c0e15c2d5cdd079831cf51df77c5683f0ffa33da876d8884c9edd8c173", 0x7d, 0x4, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr=0x9}, 0x10) 11:24:51 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8240000, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r0, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendto$inet(r0, &(0x7f0000000080)="2ee34fa862a1ee326de2e7a3d353072edcc641e7c66cf9cc3da5f8ec5f0584eb5097e7d3430ce37bc78fe2f159539a14558f09160359752c7b99b7845bc7abd57d4174f8c91546e2155975a5d9fd2ac634e97cc1aad0a314b385be831c37c8a5c0e15c2d5cdd079831cf51df77c5683f0ffa33da876d8884c9edd8c173", 0x7d, 0x4, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr=0x9}, 0x10) 11:24:51 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:51 executing program 2: io_setup(0x5b3, &(0x7f0000000040)=0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) getresgid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) r9 = getgid() fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getresgid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x1}, [{0x2, 0x3, r2}, {0x2, 0x3, r3}, {0x2, 0x6, r4}, {0x2, 0x2, r5}, {0x2, 0x3, r6}], {0x4, 0x4}, [{0x8, 0x7, r7}, {0x8, 0x7, r8}, {0x8, 0x1, r9}, {0x8, 0x0, r10}, {0x8, 0x0, r11}, {0x8, 0x1, r12}, {0x8, 0x2, r13}], {0x10, 0x2}, {0x20, 0x7}}, 0x84, 0x3) io_submit(r0, 0x1, &(0x7f0000001540)=[&(0x7f0000000800)={0x0, 0x4000000000000000, 0xf0000000000012, 0x0, 0x0, r1}]) 11:24:51 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0xa, 0x522000000003, 0x11) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:51 executing program 2: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f00000000c0)={0x0, 0x0, 0xb}) fcntl$lock(r1, 0x26, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x5}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xf, 0x100) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd442}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0xeff8, 0x4, 0x2, 0x81, 0x4, 0x0, 0x0, 0x4, 0x59, 0x38, 0x246, 0xdd, 0x0, 0x20, 0x2, 0x3, 0xfffffffffffffffe, 0xed8}, [{0x60000000, 0x2, 0x1, 0x5, 0x9, 0x1, 0x1, 0x8}, {0x70000003, 0x6, 0x3, 0x8, 0x40000, 0x2, 0x2e18}], "c04a1f2bc3b3d015175de7750420621fda1fba42a030129578e42c8ba2a00579bf", [[], [], [], [], []]}, 0x599) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x148, r4, 0x602, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x7f14814eaab20502}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x38}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x4}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x400}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x148}, 0x1, 0x0, 0x0, 0xc014}, 0x4000000) dup3(r0, r1, 0x0) 11:24:51 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:51 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) 11:24:51 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:51 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000002b00812de45ae087185082cf0124b0eba16ec400014100000000001700c150fcde6de050cb3a00400300", 0x2e}], 0x1}, 0x0) 11:24:52 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x7ff, 0x0, 0x922e, 0x400, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x80000001, 0x80, 0x100, 0x400, 0x2}, &(0x7f00000001c0)=0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f00000002c0)="2a6e90e4e8badc2c152f345f8085c17a1d48a41fc95acae9dc7887c5c1a42c5535292cf761f33b7561fa82a1a9eeac63fa70d44b472d947604a01ac98fc3729c0c5092fa606d7036ce9f3509b6bbd159b32c974627c1320244221c396df9d9c8bfe1c90b3752dcad66bda691510b178c1f31c317b3d32d98d4000b1a8cd7407cba21883d1e82cae368643e7bb92a6aa85905c8b72a7fa6f8728b065ba3073e008b4f25cbda80066af61ea551be979f08", 0xb0) ioctl$sock_proto_private(r2, 0x89e7, &(0x7f0000000440)="fb931bcc837eb168f8e62a39b94e0b3544b6391d7a661e82cf199d945253bf1bcd09cb4a92273e0ab0dec1eb420da4d343865d449a802c524effb9eb560a7b598776eb385bd913de759fb1102a5c072be022b42b0982fe5bbffcb22c3a351851ed47116f6e461050f7834acea8dc4639cdf6c92243937e3d8de8d131ba93c6f1313676f96065730df92b3db17d528c7b49994510cc19badecc7a820c3f2ce03c17896c676a9e864dec0398e885d5d1bd7e98b6d8c0bf8c83af6d6a059484815eff8580edb5d1ce864c1d456a45e9e8e297fe45df3a6fad8031fe755642830eee3d3163c8300a460b1afb") setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x1e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000080), &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}, 0x314) 11:24:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 221.981058] kernel msg: ebtables bug: please report to author: Wrong len argument [ 221.998576] kernel msg: ebtables bug: please report to author: Wrong len argument 11:24:52 executing program 2: unshare(0x2000400) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x3, 0x101, 0x8001, 0x34, r1}) 11:24:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:52 executing program 2: unshare(0x2000400) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x3, 0x101, 0x8001, 0x34, r1}) 11:24:52 executing program 2: unshare(0x2000400) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x3, 0x101, 0x8001, 0x34, r1}) 11:24:52 executing program 2: unshare(0x2000400) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x3, 0x101, 0x8001, 0x34, r1}) 11:24:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4000010004001) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000003700)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x631}]) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x2000) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000140)) 11:24:52 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:52 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r2 = socket$tipc(0x1e, 0x6, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x3}, 0x10) close(r1) 11:24:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x7) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote, 0x7ff}, 0x1c, &(0x7f00000014c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x1, &(0x7f0000562000), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="20000000000038000084000000080000000000df6d04a2383857d547df67157601b06300001733b5050000ffffac1e01"], 0x20}], 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x1f, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x4, 'none\x00', 0x3, 0x3ff, 0x35}, {@multicast2, 0x4e21, 0x10000, 0x3ff, 0x8, 0x9}}, 0x44) 11:24:53 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 223.166937] IPVS: set_ctl: invalid protocol: 31 172.30.1.3:20001 [ 223.191847] IPVS: set_ctl: invalid protocol: 31 172.30.1.3:20001 11:24:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f00000006c0)='/dev/radio#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000009c0)={&(0x7f0000000700), 0xc, &(0x7f0000000980)={&(0x7f0000000780)={0x1d0, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @local, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x101, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x76ee}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x10}, 0x8004) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:24:53 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x5) socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f00000006c0)='/dev/radio#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000009c0)={&(0x7f0000000700), 0xc, &(0x7f0000000980)={&(0x7f0000000780)={0x1d0, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @local, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x101, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x76ee}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x10}, 0x8004) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:24:53 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:53 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101800, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x2}) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create(0x20000000000002ec) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x6ffffffe}) read(r1, &(0x7f0000000500)=""/207, 0xcf) poll(&(0x7f0000000000)=[{r2}], 0x1, 0x0) 11:24:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000100)=0x1, 0x2c8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000340)=[@in={0x2, 0x0, @rand_addr=0x8001}], 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140)=""/228, &(0x7f0000000080)=0xe4) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) sendto$inet(r0, &(0x7f0000000000)=']', 0x1, 0x4044, &(0x7f0000000500)={0x2, 0x0, @dev}, 0x10) sendmsg$nl_crypto(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@delrng={0x10, 0x14, 0x200, 0x70bd2d, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8080}, 0x4004) 11:24:53 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 223.892132] IPVS: length: 228 != 24 [ 223.906782] IPVS: length: 228 != 24 11:24:54 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x8) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000180)=0x7, 0x1) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 11:24:54 executing program 0: socket$kcm(0x11, 0x0, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:54 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x800) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@v2={0x3, 0x3, 0x13, 0xb9, 0x9b, "3c399f5b5cfb566e2fb6efd66f5e2ec49a3add4e60f968e8f60e2bbd3984061ce939dbbbf8a33344e66cc9fcbf15ad83dc831b494f1c851bf4d6accac812eed2eca25b4604cfc303e4ac00b8f271b5cc15db3632d823313d7b651097e01911682ff2af9f9fb930fff536aae9884683bdf5cbca5334c1ed569502ae4b6535cc43a272ab2f4ae2294d96b3692cf6cbeb1b2247ccf8565bd32b75c978"}, 0xa5, 0x2) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ip_tables_matches\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0xc0000002}) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f00000000c0)=0x8) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0) 11:24:54 executing program 0: socket$kcm(0x11, 0x0, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:54 executing program 2: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={0x0}, 0x10) r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x82) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000280)="39434230b31af81497515153a685a93f71d83c3c52be99b13466920d9316939e086381082d3335a94d70d00b27f735a7dd281aecdf8f3fe75f67aa77bc2e75289d13e04711eb1a28ac28593121e89f50709846b01b9be0c0d276570f5c73c2dd3df4a38d1029b2da8c30a17211fe124a4dc9200c00856d497bd8d1b9aeebd99919cbe00efe481c2ac4e386e22a48c35c01b4add022a0aeb794054440879bbeb77bcfc6d4e0a23444f94336960993ac109370f4aa9255cf958f49c613b1a506bd76ad5665b74a050fd0978d0f03585359980e91d4c43b65b4c75c9eee4ebe2ddcda88e85ea29c3be527b7a3dff203c134", 0xf0}], 0x100000000000026f) [ 224.363769] sg_write: data in/out 351804047/194 bytes for SCSI command 0x2d-- guessing data in; [ 224.363769] program syz-executor.2 not setting count and/or reply_len properly 11:24:54 executing program 0: socket$kcm(0x11, 0x0, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:54 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:54 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f00000001c0)=0x24, 0x4) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000100)={0x401, "f178c4c2fcbe5807ab1018fe6087c8ad89935886df191b62ca7ed3eba6786587", 0x4, 0x2, 0x5, 0xd9c, 0x4, 0x3, 0x2ed4}) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in6, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x0, 0x0, 0xff}}, {{@in6=@local}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x9}}, 0xe8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r2, 0xffffffff, 0x6}, 0x8) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x7, 0x340) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0), 0x0, 0x22, 0x0) [ 224.633230] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:24:54 executing program 2: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:crond_unit_file_t:s0\x00', 0x27, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8000, 0x0) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x0) memfd_create(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x37a) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x41, 0x4, 0x1}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000300)) 11:24:54 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 224.879918] Unrecognized hibernate image header format! [ 224.885534] PM: Image mismatch: architecture specific data [ 224.895606] Unrecognized hibernate image header format! [ 224.901083] PM: Image mismatch: architecture specific data 11:24:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x24, 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="36f2d7c771f2a722fd1818d155230e68", 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x7) close(r0) 11:24:55 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xc, 0x1, @remote}]}, 0x54}}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000140)) 11:24:55 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8}, 0x5d1) ioctl$int_in(r0, 0x80000100004ffe, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x8, 0x2, 0xd30, 0xafb8}, 0x10) 11:24:55 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:55 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) fchdir(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x80000) r3 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) connect$rds(r3, &(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x100000000}, 0x10) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000000c0)={0xe, 0x9, 0x80000000, 0x100, 0xd0, "a0f6f529b07c70ba4b47642cfcdeb72f24c0bb707d21bff75aa4a3d58c5c6eeba4ad7dc7b6f6147bfac59dda703213c4ff4c278de3111939fac66272984270f8c53b7b2eea45324555d1eedf1fb9dd36e430bdda6fa81674264720291c868f0a78384a8e7fcc8c34cef2d6a02acbd88ad1b39e59b0138eb5436e79fef04b88d7bee193745f4481512edac367f9cf790e1fd272fd8aa1ec4f92e6b425b2f9387952de42ce22bbef477e717470de1f128c858ac42dc85dba873c6b8ed990cded2e84bfbfa546c60af331c1e887920717c8"}, 0xdc) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000480)={@loopback, @empty, 0x0}, &(0x7f00000004c0)=0xc) accept$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000580)={@loopback, @empty, 0x0}, &(0x7f00000005c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000800)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000600)={0x1ac, r4, 0x2, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x190, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) recvfrom$rxrpc(r1, &(0x7f0000000840)=""/177, 0xb1, 0x2002, 0x0, 0x0) r10 = syz_open_dev$midi(&(0x7f0000000900)='/dev/midi#\x00', 0x8, 0x1) ioctl$BLKGETSIZE(r10, 0x1260, &(0x7f0000000940)) setuid(r6) lsetxattr$security_evm(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='security.evm\x00', &(0x7f0000000a00)=@v2={0x5, 0x2, 0x1, 0x3, 0x2a, "93d03b55582cc3cacd7af1c57af9aca9f68d674648f046d5450982e0de64895fdc0de685bf9bc901639c"}, 0x34, 0x3) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000000a40)={0x0, 0x4, 0x30}, &(0x7f0000000a80)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000ac0)={r11, 0x7, 0x8, 0x224}, &(0x7f0000000b00)=0x10) ioctl$VHOST_SET_LOG_FD(r10, 0x4004af07, &(0x7f0000000b40)=r1) unlink(&(0x7f0000000b80)='./file0\x00') ioctl$int_in(r3, 0x5421, &(0x7f0000000bc0)=0xe1) ioctl$DRM_IOCTL_MARK_BUFS(r10, 0x40206417, &(0x7f0000000c00)={0x7, 0x100000000, 0x6, 0xc0000000000000, 0x0, 0xd41e}) write$FUSE_GETXATTR(r1, &(0x7f0000000c40)={0x18, 0x0, 0x5, {0xa2a0}}, 0x18) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000c80)={'nr0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2b}}}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000cc0)={'teql0\x00', {0x2, 0x4, @empty}}) setsockopt$bt_BT_DEFER_SETUP(r10, 0x112, 0x7, &(0x7f0000000d00), 0x4) ioctl$NBD_SET_BLKSIZE(r10, 0xab01, 0x1) clock_getres(0x5, &(0x7f0000000d40)) 11:24:55 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:55 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:55 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:55 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:55 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:55 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 225.910642] IPVS: ftp: loaded support on port[0] = 21 11:24:56 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 226.053303] chnl_net:caif_netlink_parms(): no params data found [ 226.127369] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.133902] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.141719] device bridge_slave_0 entered promiscuous mode [ 226.170335] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.177728] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.185579] device bridge_slave_1 entered promiscuous mode 11:24:56 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(0xffffffffffffffff, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 226.212252] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.236986] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:24:56 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 226.285126] team0: Port device team_slave_0 added [ 226.308421] team0: Port device team_slave_1 added 11:24:56 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8}, 0x5d1) ioctl$int_in(r0, 0x80000100004ffe, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x8, 0x2, 0xd30, 0xafb8}, 0x10) 11:24:56 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(0xffffffffffffffff, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 226.419124] device hsr_slave_0 entered promiscuous mode [ 226.452539] device hsr_slave_1 entered promiscuous mode [ 226.506023] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.512635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.519568] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.526075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.662021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.685321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.704538] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.720501] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.740906] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 226.763322] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.783868] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.792123] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.798627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.806239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.814412] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.820921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.860503] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 226.870713] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 226.900735] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.914846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.923750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.932322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.940580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.959504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.967009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 11:24:57 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000080), &(0x7f0000013000)=0x3) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 11:24:57 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:57 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(0xffffffffffffffff, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:57 executing program 2: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:57 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 227.280844] protocol 88fb is buggy, dev hsr_slave_0 [ 227.286206] protocol 88fb is buggy, dev hsr_slave_1 11:24:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x24fbc44b63254df1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x1}, 0xc) 11:24:57 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:57 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) sendfile(r0, r1, &(0x7f0000000100), 0x80000002) sendfile(r1, r1, &(0x7f0000000180), 0x40) 11:24:57 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:57 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0/bus/../file0\x00') mount(&(0x7f0000000280)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0/bus\x00', &(0x7f00000005c0)='cpuset\x00', 0x4008, &(0x7f0000000600)='\x00') lsetxattr(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0, 0x4f9ec618, 0x2) recvmsg(0xffffffffffffff9c, &(0x7f00000001c0)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/170, 0xaa}, {&(0x7f0000000100)=""/105, 0x69}], 0x2, &(0x7f0000000480)=""/247, 0xf7}, 0x42) recvfrom(r0, &(0x7f0000000200)=""/2, 0x2, 0x2, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x3, @local, 'syzkaller0\x00'}}, 0x80) setxattr$security_ima(&(0x7f0000000240)='./file0/bus/../file0\x00', 0x0, 0x0, 0x0, 0x0) 11:24:57 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) sendfile(r0, r1, &(0x7f0000000100), 0x80000002) sendfile(r1, r1, &(0x7f0000000180), 0x40) 11:24:57 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80000, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='/usr/sbin/ntpd\x00', 0xf, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f00000000c0)={{}, {0x0, 0x1a0ffffffff}}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0x3, 0x0, 0x2, 0x8}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000001c0)={0x2, r1, 0x0, 0x7}) 11:24:57 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000900)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000140)={0x100323, 0x2}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dlm-control\x00', 0x82280, 0x0) recvmsg$kcm(r0, &(0x7f0000000840)={&(0x7f0000000000)=@in6, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000080)=""/59, 0x3b}, {&(0x7f0000000200)=""/213, 0xd5}, {&(0x7f0000000300)=""/109, 0x6d}, {&(0x7f0000000400)=""/179, 0xb3}, {&(0x7f00000004c0)=""/216, 0xd8}, {&(0x7f00000005c0)=""/246, 0xf6}, {&(0x7f00000006c0)=""/243, 0xf3}, {&(0x7f00000000c0)=""/64, 0x40}], 0x8, &(0x7f0000000380)=""/21, 0x15}, 0x2022) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000008c0)={0x7, 0x5, 0x1, 0x5d, 0x2}, 0x14) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/87, 0x57}], 0x1) 11:24:58 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8, 0x20000) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000140)=@in={0x2, 0x4e20, @rand_addr=0x4}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000180)="33844db374d05ef6380ca38a2421ba8a2fc115982abd814f35cb773acd4617900f617948f7236e51b9f1929d1f8146c3a3f118ccd46cf4237875509311ea2067f32af041cf1e86f6aad4072374de94d0ca5a22c74bce1492706f8c9bf1973a584aa45e4ac9d1ef526520c62c916567204b4b9735d219fa6d20122f454cfd47aaad5f3e88d6696c98321c946bc32d3c2c2fbd55ec0a05dff1598f08194c74cf767b282200d83a42115d61f7f9a228414ef79edbc099f2d0b9817a9074f3895c", 0xbf}], 0x1, 0x0, 0x0, 0x87072d1ac0360bb4}, 0x801) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x401) 11:24:58 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffd, 0x0, 0x0, 0x100a0}) 11:24:58 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:58 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffd, 0x0, 0x0, 0x100a0}) [ 228.418195] protocol 88fb is buggy, dev hsr_slave_0 [ 228.423563] protocol 88fb is buggy, dev hsr_slave_1 11:24:58 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getitimer(0x80000000000000, &(0x7f0000000000)) 11:24:58 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f00000000c0)={0x40, 0x7fffffff}) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000480)=@l2, 0x80, 0x0}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) 11:24:58 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:58 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'osx.', '/dev/dri/card#\x00'}, &(0x7f0000000140)=""/249, 0xf9) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000000c0)={0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "684c1591b2b4f0ab6a279e0b8b2e38ad414b677ae8dbf853e59d267a39227508"}}) 11:24:58 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x600000) set_robust_list(&(0x7f0000000280)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x7, &(0x7f0000000240)={&(0x7f00000001c0)}}, 0x18) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x81, 0x2c0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video36\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x20}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x9000000, 0x5}, 0x8) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff00"], 0x2) r3 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x8, 0x8000) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000300)=0x5) readv(r0, &(0x7f0000000140), 0xca0ed37) 11:24:59 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_GETXATTR(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000280)={0xb, 0x10, 0xfa00, {&(0x7f0000000340), 0xffffffffffffffff, 0x3f}}, 0x18) read$FUSE(r0, &(0x7f0000002000), 0x46d) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x46, 0x9, 0x0, 0x3f, 0x7fffffff, 0x2, 0x3e, 0x0, 0x284, 0x38, 0x7, 0x7, 0x5, 0x20, 0x1, 0x7a8a, 0xfff, 0x6340d279}, [{0x7, 0x7, 0x7ff, 0x101, 0xcff, 0xffffffffffffffff, 0x80000000, 0x2}], "7d7485cbf73f7b415683f9fe9d13279e10edc483cc5a990a9a262313928e958ce8a575ef1192664bcf36c72fef382db48dec2e4d64947b1c942a85513bd5157410879162502dc9ec45e4920e636eb97ff15275367148b52977461653f6a0c2e722275ff7e792a860bb5980fc95bbec9f57c76e43d0994accddfbfddd286e8ac04991b1d0c3659e9fee01a58b7e1d7ab7cb4264b836bb94eb0785e0c011a2df0cbcda66218e7985c8e658a9660e2b89929bc9a05f6f", [[], [], [], []]}, 0x50d) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/46, 0x2e) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 11:24:59 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:59 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:24:59 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:24:59 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000001000008916, &(0x7f0000000080)="e821d0023c123f3188a070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x3a, 0x1, 0x3a], [0xc2]}) 11:24:59 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 229.427274] kvm [10469]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 [ 229.452147] protocol 88fb is buggy, dev hsr_slave_0 [ 229.452208] protocol 88fb is buggy, dev hsr_slave_0 [ 229.457534] protocol 88fb is buggy, dev hsr_slave_1 [ 229.462566] protocol 88fb is buggy, dev hsr_slave_1 11:24:59 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:24:59 executing program 2: r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/4096, 0xffffffffffffff66}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x3}, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="560000001a0081aee0050c00000f01fe078bc36f16058eb200", 0xd}], 0x1}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9, 0x80) ioctl$TIOCSTI(r1, 0x5412, 0x1000) recvmsg$kcm(r0, &(0x7f0000002bc0)={0x0, 0x0, 0x0}, 0x0) 11:24:59 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:24:59 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:24:59 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:00 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:00 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:00 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:00 executing program 0: socket$kcm(0x11, 0xa, 0x300) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:00 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:00 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:00 executing program 0: socket$kcm(0x11, 0xa, 0x300) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:00 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 230.492290] protocol 88fb is buggy, dev hsr_slave_0 [ 230.497807] protocol 88fb is buggy, dev hsr_slave_1 11:25:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x20400) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) poll(&(0x7f0000000100)=[{r0, 0x100a}, {r0, 0xc5}, {r0, 0x4004}], 0x3, 0x200) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x42) 11:25:00 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:00 executing program 0: socket$kcm(0x11, 0xa, 0x300) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:00 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @remote, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bond_slave_0\x00', 0x10) syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x4e23, 0x4e20, 0x8}}}}}}, 0x0) 11:25:00 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:01 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:01 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:01 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:01 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:01 executing program 3: clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:01 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x14400, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000500)={&(0x7f0000000200), 0xc, &(0x7f00000004c0)={&(0x7f0000000280)={0x214, r1, 0x32e, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfe15}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2c38}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xb374}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf55}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffc00}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x22}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xcad}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd8b3884400000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x95}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe763}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x214}}, 0x81) r2 = gettid() r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x400482, 0x0) r4 = socket$netlink(0x10, 0x3, 0x5) setsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f0000000180)=0x7, 0x4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8140000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r5, 0x220, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x44001}, 0x80) waitid(0x2, r2, 0x0, 0x3, 0x0) 11:25:01 executing program 3: clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:01 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:01 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000ccaff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2275, &(0x7f0000000680)) 11:25:01 executing program 3: clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:01 executing program 3: ioprio_set$pid(0x0, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:01 executing program 2: utimensat(0xffffffffffffffff, 0x0, 0x0, 0x102) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x5, 0x2, 0x5, 0x7]}) 11:25:01 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:02 executing program 3: ioprio_set$pid(0x0, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf4, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0xcc, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6942}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x169}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x13d3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x782}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4398}]}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000800) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xe42, 0x4) 11:25:02 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:02 executing program 3: ioprio_set$pid(0x0, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:02 executing program 3: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:02 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:02 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:02 executing program 2: r0 = timerfd_create(0x0, 0x0) read(r0, 0x0, 0x0) 11:25:02 executing program 3: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 232.572166] protocol 88fb is buggy, dev hsr_slave_0 [ 232.577565] protocol 88fb is buggy, dev hsr_slave_1 11:25:02 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:02 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:02 executing program 3: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:02 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:02 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:03 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:03 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:03 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:03 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:03 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:03 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:03 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40, 0x2) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0xef05}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @broadcast}}, 0x10001, 0x181, 0x1, 0x5, 0x1755}, &(0x7f0000000200)=0x98) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000240)={'tunl0\x00', {0x2, 0x4e24, @empty}}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000280)) prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)=']\x00') connect(r0, &(0x7f0000000300)=@ax25={{0x3, @bcast, 0x3}, [@bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x80) r4 = socket$alg(0x26, 0x5, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x10, r0, 0x80000000) write$nbd(r1, &(0x7f0000000380)={0x67446698, 0x1, 0x2, 0x3, 0x3, "9ddc95243e5864a51f3edf99d4cd885d803b4ac5ed1980707edee0d64bea2ea360810cb370543b9e19be8f524dba26d8a6ec4563516aa3da68cde60ab9a00053295c1fc6966235a0f5f290ed7ae58fe66523d5043de1fe5b44878934c8a09a4811192c81b3f86abd3117851e8ddca65ec43611f206e31c49f833b9a8"}, 0x8c) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x5, 0x5ba2}, 0x90) write$P9_RLOPEN(r1, &(0x7f0000000500)={0x18, 0xd, 0x1, {{0x1, 0x0, 0x3}, 0x4}}, 0x18) syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x3, 0x2) modify_ldt$read_default(0x2, &(0x7f0000000580)=""/30, 0x1e) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000600)={0x5, 0x1, 0x3, 0x172, &(0x7f00000005c0)=[{}]}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r5 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0x0) get_mempolicy(&(0x7f0000000740), &(0x7f0000000780), 0xffff, &(0x7f0000ffd000/0x3000)=nil, 0x2) sync() prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) unlinkat(r1, &(0x7f00000007c0)='./file0\x00', 0x0) write$FUSE_GETXATTR(r5, &(0x7f0000000800)={0x18, 0x0, 0x4, {0x4}}, 0x18) socket$inet(0x2, 0x80007, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x7ff, 0x400) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000880)={r3, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000008c0)={r2, @in6={{0xa, 0x4e22, 0x0, @loopback, 0x6}}, 0x3, 0xfffffffffffffffc, 0x1, 0x7, 0x2}, &(0x7f0000000980)=0x98) mknod(&(0x7f00000009c0)='./file0\x00', 0x2, 0x6) 11:25:03 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 11:25:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x3ffe, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x20000002}) fcntl$setsig(r0, 0xa, 0x1f) 11:25:03 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 233.612177] protocol 88fb is buggy, dev hsr_slave_0 [ 233.612190] protocol 88fb is buggy, dev hsr_slave_0 [ 233.617662] protocol 88fb is buggy, dev hsr_slave_1 [ 233.622686] protocol 88fb is buggy, dev hsr_slave_1 11:25:03 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 11:25:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x1, 0x4) listen(r0, 0x0) 11:25:04 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 234.016925] protocol 88fb is buggy, dev hsr_slave_0 [ 234.022670] protocol 88fb is buggy, dev hsr_slave_1 11:25:04 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 11:25:04 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0xff}, 0x0, @in6=@dev}}, 0xe8) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xfffffffffffffff8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000841}, 0x1) 11:25:04 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:04 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 234.485126] IPVS: ftp: loaded support on port[0] = 21 11:25:04 executing program 0 (fault-call:6 fault-nth:0): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 234.611738] cgroup: fork rejected by pids controller in /syz1 [ 234.652216] protocol 88fb is buggy, dev hsr_slave_0 [ 234.657749] protocol 88fb is buggy, dev hsr_slave_1 [ 234.733073] FAULT_INJECTION: forcing a failure. [ 234.733073] name failslab, interval 1, probability 0, space 0, times 1 [ 234.744543] CPU: 1 PID: 10730 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 234.751494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.760874] Call Trace: [ 234.763516] dump_stack+0x173/0x1d0 [ 234.767180] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 234.772537] should_fail+0xa19/0xb20 [ 234.776317] __should_failslab+0x278/0x2a0 [ 234.780619] should_failslab+0x29/0x70 [ 234.784549] kmem_cache_alloc+0xff/0xb60 [ 234.788653] ? sock_alloc_inode+0x61/0x330 [ 234.792938] ? sockfs_mount+0xa0/0xa0 [ 234.796785] sock_alloc_inode+0x61/0x330 [ 234.800880] ? sockfs_mount+0xa0/0xa0 [ 234.804737] new_inode_pseudo+0x95/0x460 [ 234.808853] __sock_create+0x2fa/0xf10 [ 234.812793] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 234.818026] __sys_socket+0x174/0x620 [ 234.821860] __se_sys_socket+0x8d/0xb0 [ 234.825789] __x64_sys_socket+0x4a/0x70 [ 234.829793] do_syscall_64+0xbc/0xf0 [ 234.833543] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 234.838758] RIP: 0033:0x45aa97 [ 234.842004] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.860944] RSP: 002b:00007f58e42ef9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 234.868704] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 000000000045aa97 [ 234.869748] chnl_net:caif_netlink_parms(): no params data found [ 234.876001] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 234.876022] RBP: 000000000073bfa0 R08: 0000000000000009 R09: 0000000000000000 [ 234.876049] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f58e42efa40 [ 234.903916] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 [ 234.982582] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.989044] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.996975] device bridge_slave_0 entered promiscuous mode [ 235.018664] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.025237] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.033254] device bridge_slave_1 entered promiscuous mode [ 235.071203] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.095423] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.128737] team0: Port device team_slave_0 added [ 235.138657] team0: Port device team_slave_1 added [ 235.237550] device hsr_slave_0 entered promiscuous mode [ 235.332967] device hsr_slave_1 entered promiscuous mode [ 235.471037] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.477574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.484584] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.491034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.560895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.579647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.590286] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.599731] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.610800] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 235.629839] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.645732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.654138] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.660655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.709268] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.719098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.736435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.744571] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.751019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.760422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.769309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.777762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.786139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.798382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.806104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.835216] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:06 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40, 0x2) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0xef05}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @broadcast}}, 0x10001, 0x181, 0x1, 0x5, 0x1755}, &(0x7f0000000200)=0x98) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000240)={'tunl0\x00', {0x2, 0x4e24, @empty}}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000280)) prctl$PR_SET_NAME(0xf, &(0x7f00000002c0)=']\x00') connect(r0, &(0x7f0000000300)=@ax25={{0x3, @bcast, 0x3}, [@bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x80) r4 = socket$alg(0x26, 0x5, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x10, r0, 0x80000000) write$nbd(r1, &(0x7f0000000380)={0x67446698, 0x1, 0x2, 0x3, 0x3, "9ddc95243e5864a51f3edf99d4cd885d803b4ac5ed1980707edee0d64bea2ea360810cb370543b9e19be8f524dba26d8a6ec4563516aa3da68cde60ab9a00053295c1fc6966235a0f5f290ed7ae58fe66523d5043de1fe5b44878934c8a09a4811192c81b3f86abd3117851e8ddca65ec43611f206e31c49f833b9a8"}, 0x8c) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x5, 0x5ba2}, 0x90) write$P9_RLOPEN(r1, &(0x7f0000000500)={0x18, 0xd, 0x1, {{0x1, 0x0, 0x3}, 0x4}}, 0x18) syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x3, 0x2) modify_ldt$read_default(0x2, &(0x7f0000000580)=""/30, 0x1e) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000600)={0x5, 0x1, 0x3, 0x172, &(0x7f00000005c0)=[{}]}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r5 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0x0) get_mempolicy(&(0x7f0000000740), &(0x7f0000000780), 0xffff, &(0x7f0000ffd000/0x3000)=nil, 0x2) sync() prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) unlinkat(r1, &(0x7f00000007c0)='./file0\x00', 0x0) write$FUSE_GETXATTR(r5, &(0x7f0000000800)={0x18, 0x0, 0x4, {0x4}}, 0x18) socket$inet(0x2, 0x80007, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x7ff, 0x400) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000880)={r3, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000008c0)={r2, @in6={{0xa, 0x4e22, 0x0, @loopback, 0x6}}, 0x3, 0xfffffffffffffffc, 0x1, 0x7, 0x2}, &(0x7f0000000980)=0x98) mknod(&(0x7f00000009c0)='./file0\x00', 0x2, 0x6) 11:25:06 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000080), 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x6ae1, 0x5b6, 0xff, 0x10000, 0x2, 0x1f, 0x8}, 0x1c) 11:25:06 executing program 0 (fault-call:6 fault-nth:1): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:06 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:06 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:06 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0xfffffffffffffffe}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xdb, 0x3, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xffffffffffff2c16, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000280)={0x1, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000002c0)={0x7, r2, 0x2, 0x9}) msgsnd(r0, &(0x7f00000005c0)=ANY=[@ANYRES32], 0x1, 0x800) 11:25:06 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 236.547635] FAULT_INJECTION: forcing a failure. [ 236.547635] name failslab, interval 1, probability 0, space 0, times 0 [ 236.559105] CPU: 0 PID: 10760 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 236.566051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.575419] Call Trace: [ 236.578071] dump_stack+0x173/0x1d0 [ 236.581759] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 236.586997] should_fail+0xa19/0xb20 [ 236.590764] __should_failslab+0x278/0x2a0 [ 236.595099] should_failslab+0x29/0x70 [ 236.599041] kmem_cache_alloc_trace+0x125/0xb40 [ 236.603752] ? kmem_cache_alloc+0x585/0xb60 [ 236.608118] ? sock_alloc_inode+0x61/0x330 [ 236.612394] ? sock_alloc_inode+0x101/0x330 [ 236.616762] sock_alloc_inode+0x101/0x330 [ 236.620956] ? sockfs_mount+0xa0/0xa0 [ 236.624812] new_inode_pseudo+0x95/0x460 [ 236.628910] __sock_create+0x2fa/0xf10 [ 236.632843] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 236.638094] __sys_socket+0x174/0x620 [ 236.641942] __se_sys_socket+0x8d/0xb0 [ 236.645872] __x64_sys_socket+0x4a/0x70 [ 236.649872] do_syscall_64+0xbc/0xf0 [ 236.653754] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 236.658968] RIP: 0033:0x45aa97 [ 236.662219] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.681158] RSP: 002b:00007f58e42ef9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 236.688903] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 000000000045aa97 [ 236.696191] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 236.703483] RBP: 000000000073bfa0 R08: 0000000000000009 R09: 0000000000000000 [ 236.710775] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f58e42efa40 [ 236.718071] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:06 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x8, 0x4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:06 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3f, 0x301000) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x9, 0x5}, &(0x7f0000000140)=0xc) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x404000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000180)={r2, 0x1, 0x7fffffff, 0x1}, &(0x7f00000001c0)=0x10) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, '-eqiv_e(_%iniv(rfc4106(ccm_base(cbc(camellia),sha3-224-generic))'}, 0x3d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000080)={0xfffffffffffffffd, 0x345, 0x10000, 0x1, 0x3, 0x0, 0x10238ad1, 0x98b4, 0x9, 0x7f}) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0xffffffffffffffff, 0x200000000141480) 11:25:06 executing program 0 (fault-call:6 fault-nth:2): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:07 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 237.089068] FAULT_INJECTION: forcing a failure. [ 237.089068] name failslab, interval 1, probability 0, space 0, times 0 [ 237.100678] CPU: 0 PID: 10779 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 237.107647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.117016] Call Trace: [ 237.119666] dump_stack+0x173/0x1d0 [ 237.123331] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 237.128558] should_fail+0xa19/0xb20 [ 237.132321] __should_failslab+0x278/0x2a0 [ 237.136617] should_failslab+0x29/0x70 [ 237.140542] __kmalloc+0xaf/0x3a0 [ 237.144056] ? sk_prot_alloc+0x1da/0x500 [ 237.148152] sk_prot_alloc+0x1da/0x500 [ 237.152074] sk_alloc+0xde/0xb90 [ 237.155482] ? genl_bind+0x460/0x460 [ 237.159246] netlink_create+0x7b4/0xce0 [ 237.163264] ? genl_rcv+0x80/0x80 [ 237.166764] ? genl_bind+0x460/0x460 [ 237.170516] ? __netlink_lookup+0x920/0x920 [ 237.174905] __sock_create+0x65f/0xf10 [ 237.178841] __sys_socket+0x174/0x620 [ 237.182679] __se_sys_socket+0x8d/0xb0 [ 237.186621] __x64_sys_socket+0x4a/0x70 [ 237.190651] do_syscall_64+0xbc/0xf0 [ 237.194411] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 237.199621] RIP: 0033:0x45aa97 [ 237.202850] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.221866] RSP: 002b:00007f58e43109c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 237.230139] RAX: ffffffffffffffda RBX: 00007f58e4310a58 RCX: 000000000045aa97 11:25:07 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x41, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000080)=0x8000000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x20, 0x3f, 0x8, 0x9, 0x1}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) poll(&(0x7f0000000100)=[{r0, 0x4000}, {r0, 0x106}, {r0, 0x20}, {r0, 0x9004}, {r0, 0x8000}, {r0, 0x28}], 0x6, 0xdff) ioctl$int_in(r0, 0x800000c0045019, &(0x7f0000000000)=0xc0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000140)={0xffffffe000000000, 0x8, 0x6, 0x3, 0x80, 0x7fffffff}) 11:25:07 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 237.237431] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 237.244746] RBP: 000000000073bf00 R08: 0000000000000009 R09: 0000000000000000 [ 237.252038] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f58e4310a40 [ 237.259328] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:07 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:07 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:07 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x9) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc040564a, &(0x7f0000000040)={0x0, 0x0, {0x3013}}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x111300, 0x0) 11:25:07 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)="c0", 0x1}], 0x1, &(0x7f0000000940)}, 0x0) flistxattr(r0, &(0x7f0000000080)=""/212, 0xd4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @loopback}, 0x7, 0x3, 0x3, 0xd, 0x6, 0x83}, &(0x7f0000000240)=0x20) accept(r0, 0x0, &(0x7f0000000280)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x2, 0x880) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1054) 11:25:07 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '&&\n\v\xd0a\x1bp\xcb\x06\x9aQnN\x1e\xd5\xaa\n\xfa\x14]S\xf7l5,ne\xc3\x19\xc5\x13\x88\x8e\x96\b\x8c\xdeTd.3\xfb\x89#\x8dU\xee\b\x86B\x15\xa8\v\xa0o!%\xebk\x17c\x8eP\x97e*\xcb!\xae\t\x85\xc8\xe5Z\xe6g\xd5\xf5.\x1f\xd1\x94~\xcb\xe1'}, 0x5c) [ 237.772166] net_ratelimit: 4 callbacks suppressed [ 237.772185] protocol 88fb is buggy, dev hsr_slave_0 [ 237.782340] protocol 88fb is buggy, dev hsr_slave_0 [ 237.782500] protocol 88fb is buggy, dev hsr_slave_1 [ 237.787799] protocol 88fb is buggy, dev hsr_slave_1 [ 237.917759] kauditd_printk_skb: 3 callbacks suppressed [ 237.917835] audit: type=1400 audit(1552044307.970:31): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=26260A0BD0611B70CB069A516E4E1ED5AA0AFA145D53F76C352C6E65C319C513888E96088CDE54642E33FB89238D55EE08864215A80BA06F2125EB6B17638E5097652ACB21AE0985C8E55AE667D5F52E1FD1947ECBE1 pid=10819 comm="syz-executor.4" 11:25:08 executing program 3 (fault-call:4 fault-nth:0): ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:08 executing program 0 (fault-call:6 fault-nth:3): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@ipv4={[], [], @local}, @dev={0xfe, 0x80, [], 0x1f}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4, 0x6, 0x2, 0x400, 0x3, 0x40380028, r2}) sendmsg$nl_route(r0, &(0x7f0000006f80)={0x0, 0x0, &(0x7f0000006f40)={&(0x7f0000006ec0)=ANY=[@ANYBLOB="1c0000001a002ba9003fe3ae4b7c8134d6000000deffffffff1a0000"], 0x1c}}, 0x0) 11:25:08 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:08 executing program 4: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0xfffe, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000000)={0x2, 0x2}) r1 = add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="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", 0xfa, 0xfffffffffffffffc) keyctl$read(0xb, r1, &(0x7f0000000200)=""/115, 0x73) [ 238.253590] protocol 88fb is buggy, dev hsr_slave_0 [ 238.259308] protocol 88fb is buggy, dev hsr_slave_1 11:25:08 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 238.363125] FAULT_INJECTION: forcing a failure. [ 238.363125] name failslab, interval 1, probability 0, space 0, times 0 [ 238.374618] CPU: 1 PID: 10838 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 238.381569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.390938] Call Trace: [ 238.394121] dump_stack+0x173/0x1d0 [ 238.397789] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 238.403025] should_fail+0xa19/0xb20 [ 238.406789] __should_failslab+0x278/0x2a0 [ 238.411071] should_failslab+0x29/0x70 [ 238.415010] kmem_cache_alloc_trace+0x125/0xb40 [ 238.419718] ? apparmor_sk_alloc_security+0xe7/0x220 [ 238.424866] apparmor_sk_alloc_security+0xe7/0x220 [ 238.429830] ? apparmor_setprocattr+0x13a0/0x13a0 [ 238.434724] security_sk_alloc+0x125/0x1f0 [ 238.439023] sk_prot_alloc+0x269/0x500 [ 238.442979] sk_alloc+0xde/0xb90 [ 238.446384] ? genl_bind+0x460/0x460 [ 238.450122] netlink_create+0x7b4/0xce0 [ 238.454121] ? genl_rcv+0x80/0x80 [ 238.457608] ? genl_bind+0x460/0x460 [ 238.461349] ? __netlink_lookup+0x920/0x920 [ 238.465701] __sock_create+0x65f/0xf10 [ 238.469633] __sys_socket+0x174/0x620 [ 238.473466] __se_sys_socket+0x8d/0xb0 [ 238.477384] __x64_sys_socket+0x4a/0x70 [ 238.481385] do_syscall_64+0xbc/0xf0 [ 238.485134] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.490343] RIP: 0033:0x45aa97 [ 238.493558] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:25:08 executing program 3: r0 = gettid() ioprio_set$pid(0x2, r0, 0x80000001) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) clone(0x12000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x6, 0x7}) getsockname$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 238.512477] RSP: 002b:00007f58e42ef9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 238.520212] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 000000000045aa97 [ 238.527500] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 238.534784] RBP: 000000000073bfa0 R08: 0000000000000009 R09: 0000000000000000 [ 238.542069] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f58e42efa40 [ 238.549351] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0x6, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff00000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xe1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffff8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xca99}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x53d}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x70}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast1}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x40}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000540)="99e5ced7bc5541fa38045f4cf93b33660c608e697fc6afe714d87ab4efea049f0ace77ec6b6b4007f65c43632dbe553188c572b4a1fb27ca7697aacef9b5f35d17aa59f6a74f3632ca93b4cb0016b5eeb656fc1832b8525cd6fb41e7cd6474b0f9eb0262925d5bb74bc0f30ac1cfd6187fef2877e5428f5b23e911d125a1009fc6bfbd043321f8db0ed005a09a8be062becf6a120317b55fccebdd808c93ac265c89ba9efab403ed7e6df8043f3802858fb8f674365253d3e6fa79c187c5463a98d82a9cde528274875ac1857072ac9da8473721442e8c834858ae4fad8444f1acda250ab7149e38c3380d78250455a07243b9c648ff187c6f66bc9c35bdcf562dd6637f49fb26ce95847c4301265456514b8e856d15abe5f8e422c490cee59f59daa6b72982c89b3e5b1f0ca41676a3bacb98e912bbdc", 0x0}, 0x18) 11:25:08 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ioprio_set$pid(0x3, r1, 0x200) 11:25:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4000, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x8) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x52) [ 238.812202] protocol 88fb is buggy, dev hsr_slave_0 [ 238.817695] protocol 88fb is buggy, dev hsr_slave_1 11:25:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) 11:25:09 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_robust_list(&(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)}}, 0xfffffdb8) 11:25:09 executing program 0 (fault-call:6 fault-nth:4): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:09 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ioprio_set$pid(0x3, r1, 0x200) [ 239.098025] kvm: pic: single mode not supported [ 239.113070] kvm: pic: level sensitive irq not supported [ 239.153138] kvm: pic: level sensitive irq not supported [ 239.257202] kvm: pic: single mode not supported [ 239.329205] FAULT_INJECTION: forcing a failure. [ 239.329205] name failslab, interval 1, probability 0, space 0, times 0 [ 239.345349] CPU: 1 PID: 10878 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 239.352296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.361663] Call Trace: [ 239.364303] dump_stack+0x173/0x1d0 [ 239.367968] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 239.373201] should_fail+0xa19/0xb20 [ 239.376962] __should_failslab+0x278/0x2a0 [ 239.381269] should_failslab+0x29/0x70 [ 239.385207] kmem_cache_alloc+0xff/0xb60 [ 239.389309] ? __d_alloc+0x98/0xc30 [ 239.392998] __d_alloc+0x98/0xc30 [ 239.396955] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 239.402371] d_alloc_pseudo+0x68/0x80 [ 239.406210] alloc_file_pseudo+0x19f/0x4e0 [ 239.410485] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 239.415711] sock_alloc_file+0x1b2/0x5b0 [ 239.419817] __sys_socket+0x252/0x620 [ 239.423666] __se_sys_socket+0x8d/0xb0 [ 239.427589] __x64_sys_socket+0x4a/0x70 [ 239.431600] do_syscall_64+0xbc/0xf0 [ 239.435360] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 239.440568] RIP: 0033:0x45aa97 [ 239.443816] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.462754] RSP: 002b:00007f58e43109c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 239.470492] RAX: ffffffffffffffda RBX: 00007f58e4310a58 RCX: 000000000045aa97 11:25:09 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ioprio_set$pid(0x3, r1, 0x200) 11:25:09 executing program 3: getpgrp(0x0) r0 = getpid() r1 = getpgrp(r0) ioprio_set$pid(0x2200000000000002, r1, 0x200007c37) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200100, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0x800, @remote, 0x2}, @in6={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000}, @in={0x2, 0x4e23, @local}], 0x68) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000100)=""/103) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f00000000c0)=0x7, 0x8) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @empty, 0x0}, &(0x7f0000000240)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) sendmsg$nl_xfrm(r2, &(0x7f0000001780)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001740)={&(0x7f0000000300)=@newspdinfo={0x1410, 0x24, 0x18, 0x70bd26, 0x25dfdbfc, 0x20, [@user_kmaddress={0x2c, 0x13, {@in6=@mcast1, @in6=@mcast1, 0x0, 0xa}}, @policy_type={0xc, 0x10, {0x1}}, @replay_thresh={0x8, 0xb, 0x9}, @sa={0xe4, 0x6, {{@in=@dev={0xac, 0x14, 0x14, 0x24}, @in=@broadcast, 0x4e22, 0x8, 0x4e21, 0x1, 0xa, 0x80, 0x80, 0x2c, r4, r5}, {@in6=@rand_addr="eac97f02d92e12eff54bcb5cbdddd7c6", 0x4d3, 0xff}, @in=@remote, {0x6, 0x1, 0x5, 0x1, 0x70, 0x2, 0x8001, 0x7}, {0x6, 0x7ff, 0x69ba, 0x81}, {0x0, 0x3ff, 0xfffffffffffff435}, 0x70bd2d, 0x3501, 0xa, 0x6, 0x6, 0x40}}, @policy_type={0xc, 0x10, {0x1}}, @encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e23, 0x4e20, @in=@dev={0xac, 0x14, 0x14, 0x15}}}, @encap={0x1c, 0x4, {0x2, 0x4e22, 0x4e24, @in=@rand_addr=0x1}}, @algo_aead={0x114, 0x12, {{'aegis128l-aesni\x00'}, 0x628, 0x380, "85d4369f28ff50873104263eb9d3893f85facd6a2229694e878fdb79cb9e0dfdd5778fc50882c4b535d566b1e6ca886e4e9d69c321170d23a1ce5b73f85a743140ccc58b4738d63be59b1ac01c2ddd34749883dce6d33401181fd34def649c44470f2e6bc5010ee7d04c1340628bc32f0fd58149972718fe66655f266df0f5f6f55e45a84c5385fbf680831b1e0d3c6a439d0c3b2e7012d64b4d87cac916c1f418c99247b59f5f6f6a27811d3f386f629af20476afb12fa99973826b48304e04fd683e83b5"}}, @algo_crypt={0x1048, 0x2, {{'ctr-aes-neonbs\x00'}, 0x8000, "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"}}, @migrate={0x138, 0x11, [{@in6=@mcast2, @in6=@remote, 0x7c, 0x0, 0x0, 0x3503, 0x2}, {@in=@local, @in=@rand_addr=0x8, 0x32, 0x2, 0x0, 0x3502, 0xa, 0xa}, {@in6=@mcast1, @in=@local, 0x2b, 0x0, 0x0, 0x3507, 0xa, 0xa}, {@in=@multicast2, @in=@multicast2, 0xff, 0x6, 0x0, 0x3505, 0x0, 0x2}, {@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@remote, 0xff, 0x3, 0x0, 0x3507, 0x2, 0xa}, {@in6=@mcast2, @in6=@mcast1, 0xff, 0x0, 0x0, 0x3506, 0xa, 0xa}, {@in=@loopback, @in6=@local, 0x0, 0x4, 0x0, 0x3503, 0xa, 0xa}]}]}, 0x1410}, 0x1, 0x0, 0x0, 0x24000800}, 0x840) [ 239.477778] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 239.485064] RBP: 000000000073bf00 R08: 0000000000000009 R09: 0000000000000000 [ 239.492436] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f58e4310a40 [ 239.499721] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:09 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:09 executing program 3: fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000000)='!(@\x00', 0xffffffffffffffff}, 0x30) ioprio_set$pid(0x2, r0, 0x200000007c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) poll(&(0x7f0000000080)=[{r1, 0x404}, {r2, 0x2300}, {r2, 0x8004}], 0x3, 0x11) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x3) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:09 executing program 0 (fault-call:6 fault-nth:5): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:09 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ioprio_set$pid(0x3, r1, 0x200) 11:25:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) 11:25:10 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4400, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000000c0)={0xfffffffffffffffe, "228ece75184e4d40227c320b6f0704ec7185321df174a434ac3ead8fc3ad46d9", 0x4, 0x80, 0x20, 0x1, 0x14, 0x2, 0x2, 0x3}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) ioprio_set$pid(0x2, r1, 0x8) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000140), r3, 0x1}}, 0x18) r4 = add_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, r4) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) connect$unix(r5, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 11:25:10 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) [ 240.051308] FAULT_INJECTION: forcing a failure. [ 240.051308] name failslab, interval 1, probability 0, space 0, times 0 [ 240.063069] CPU: 0 PID: 10913 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 240.070126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.079518] Call Trace: [ 240.082158] dump_stack+0x173/0x1d0 [ 240.085831] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 240.091058] should_fail+0xa19/0xb20 [ 240.094845] __should_failslab+0x278/0x2a0 11:25:10 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 240.099122] should_failslab+0x29/0x70 [ 240.103049] kmem_cache_alloc+0xff/0xb60 [ 240.107137] ? __alloc_file+0xa3/0x710 [ 240.111062] ? __msan_poison_alloca+0x1f0/0x2a0 [ 240.115763] __alloc_file+0xa3/0x710 [ 240.119513] alloc_empty_file+0x1f5/0x4b0 [ 240.123691] alloc_file+0xa5/0x7b0 [ 240.127271] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 240.132775] alloc_file_pseudo+0x3ff/0x4e0 [ 240.137065] sock_alloc_file+0x1b2/0x5b0 [ 240.141174] __sys_socket+0x252/0x620 [ 240.145047] __se_sys_socket+0x8d/0xb0 [ 240.149000] __x64_sys_socket+0x4a/0x70 [ 240.153019] do_syscall_64+0xbc/0xf0 [ 240.156785] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 240.162005] RIP: 0033:0x45aa97 [ 240.165236] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.184161] RSP: 002b:00007f58e43109c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 240.191904] RAX: ffffffffffffffda RBX: 00007f58e4310a58 RCX: 000000000045aa97 [ 240.199197] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 240.206493] RBP: 000000000073bf00 R08: 0000000000000009 R09: 0000000000000000 [ 240.213792] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f58e4310a40 [ 240.221180] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:10 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 240.252130] protocol 88fb is buggy, dev hsr_slave_0 [ 240.257597] protocol 88fb is buggy, dev hsr_slave_1 [ 240.331040] kvm: pic: single mode not supported [ 240.336280] kvm: pic: level sensitive irq not supported [ 240.344216] kvm: pic: level sensitive irq not supported 11:25:10 executing program 3: getcwd(&(0x7f0000000000)=""/116, 0x74) ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) 11:25:10 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:10 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) read(r0, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:10 executing program 0 (fault-call:6 fault-nth:6): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:10 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x3, r1}) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:10 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) 11:25:11 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:11 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioprio_set$pid(0x3, r0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ipddp0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', r2}) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 240.377407] kvm: pic: single mode not supported [ 241.104172] FAULT_INJECTION: forcing a failure. [ 241.104172] name failslab, interval 1, probability 0, space 0, times 0 [ 241.120302] CPU: 1 PID: 10962 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 241.127264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.136646] Call Trace: [ 241.139304] dump_stack+0x173/0x1d0 [ 241.142993] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 241.148236] should_fail+0xa19/0xb20 [ 241.152023] __should_failslab+0x278/0x2a0 [ 241.156314] should_failslab+0x29/0x70 [ 241.160260] kmem_cache_alloc_trace+0x125/0xb40 [ 241.164996] ? apparmor_file_alloc_security+0x23b/0x6e0 [ 241.170426] apparmor_file_alloc_security+0x23b/0x6e0 [ 241.175682] ? apparmor_file_permission+0x490/0x490 [ 241.180748] security_file_alloc+0xcf/0x1a0 [ 241.185122] __alloc_file+0x1bf/0x710 [ 241.188986] alloc_empty_file+0x1f5/0x4b0 [ 241.193186] alloc_file+0xa5/0x7b0 [ 241.196790] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 241.202295] alloc_file_pseudo+0x3ff/0x4e0 [ 241.206588] sock_alloc_file+0x1b2/0x5b0 [ 241.210708] __sys_socket+0x252/0x620 [ 241.214555] __se_sys_socket+0x8d/0xb0 [ 241.218491] __x64_sys_socket+0x4a/0x70 [ 241.222513] do_syscall_64+0xbc/0xf0 [ 241.226650] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 241.231869] RIP: 0033:0x45aa97 [ 241.235111] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:25:11 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 241.254037] RSP: 002b:00007f58e42ef9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 241.261793] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 000000000045aa97 [ 241.269092] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 241.276390] RBP: 000000000073bfa0 R08: 0000000000000009 R09: 0000000000000000 [ 241.283693] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f58e42efa40 [ 241.291002] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:11 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x440802, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x9493d635ba33a0c2, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 241.369191] kvm: pic: single mode not supported [ 241.378698] kvm: pic: level sensitive irq not supported [ 241.386091] kvm: pic: level sensitive irq not supported [ 241.398268] kvm: pic: single mode not supported [ 241.576417] IPVS: ftp: loaded support on port[0] = 21 11:25:11 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(0xffffffffffffffff, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 241.874043] chnl_net:caif_netlink_parms(): no params data found [ 241.934312] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.940738] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.948361] device bridge_slave_0 entered promiscuous mode [ 241.956474] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.962947] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.970301] device bridge_slave_1 entered promiscuous mode [ 241.991101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.001216] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 242.022486] team0: Port device team_slave_0 added [ 242.029539] team0: Port device team_slave_1 added [ 242.084775] device hsr_slave_0 entered promiscuous mode [ 242.132363] device hsr_slave_1 entered promiscuous mode [ 242.189197] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.195739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.202780] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.209231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.263674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.277826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.286712] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.295173] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.303939] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 242.318203] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.329271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.338839] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.345325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.358146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.366042] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.372549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.396176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.413818] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.421455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.429775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.440693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.451849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.476067] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.597422] kvm: pic: single mode not supported [ 242.602299] kvm: pic: level sensitive irq not supported [ 242.613634] kvm: pic: level sensitive irq not supported 11:25:12 executing program 5: ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000d40)={0x0, @empty, 0x0, 0x0, 'wlc\x00'}, 0x2c) 11:25:12 executing program 3: clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@generic={0x0, 0x5, 0x2}) 11:25:12 executing program 0 (fault-call:6 fault-nth:7): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) 11:25:12 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:12 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(0xffffffffffffffff, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 242.625454] kvm: pic: single mode not supported [ 242.892386] net_ratelimit: 2 callbacks suppressed [ 242.892403] protocol 88fb is buggy, dev hsr_slave_0 [ 242.907517] protocol 88fb is buggy, dev hsr_slave_1 11:25:13 executing program 5: 11:25:13 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x10000901, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x16) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 242.964335] kvm: pic: single mode not supported [ 242.974578] protocol 88fb is buggy, dev hsr_slave_0 [ 242.984905] protocol 88fb is buggy, dev hsr_slave_1 [ 242.998724] kvm: pic: level sensitive irq not supported [ 243.001506] kvm: pic: level sensitive irq not supported [ 243.033784] kvm: pic: single mode not supported [ 243.090018] FAULT_INJECTION: forcing a failure. [ 243.090018] name failslab, interval 1, probability 0, space 0, times 0 [ 243.106425] CPU: 1 PID: 11014 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 243.113380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.122775] Call Trace: [ 243.125419] dump_stack+0x173/0x1d0 [ 243.129084] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 243.134315] should_fail+0xa19/0xb20 [ 243.138089] __should_failslab+0x278/0x2a0 [ 243.142491] should_failslab+0x29/0x70 [ 243.146426] kmem_cache_alloc_node+0x123/0xc20 [ 243.151058] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 243.156453] ? __alloc_skb+0x218/0xa20 [ 243.160383] __alloc_skb+0x218/0xa20 [ 243.164141] netlink_sendmsg+0xb82/0x1300 [ 243.168338] ___sys_sendmsg+0xdb9/0x11b0 [ 243.172452] ? netlink_getsockopt+0x1460/0x1460 [ 243.177195] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 243.182441] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 243.187840] ? __fget_light+0x6e1/0x750 [ 243.191985] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 243.197231] __se_sys_sendmsg+0x305/0x460 [ 243.201458] __x64_sys_sendmsg+0x4a/0x70 [ 243.205556] do_syscall_64+0xbc/0xf0 [ 243.209309] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 243.214518] RIP: 0033:0x411f51 [ 243.217760] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 11:25:13 executing program 5: [ 243.236996] RSP: 002b:00007f58e42ef9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 243.244744] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 0000000000411f51 [ 243.252049] RDX: 0000000000000000 RSI: 00007f58e42efa00 RDI: 0000000000000007 [ 243.259355] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 243.266653] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e42efa40 [ 243.273956] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:13 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000009000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000ff8000/0x1000)=nil, 0x0}, 0x68) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x7ffff000}], 0x12, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:13 executing program 5: 11:25:13 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$inet6(r0, 0x0, &(0x7f0000000100)) 11:25:13 executing program 0 (fault-call:6 fault-nth:8): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:13 executing program 5: 11:25:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:25:13 executing program 2: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:13 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x3, r1}) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 243.741211] FAULT_INJECTION: forcing a failure. [ 243.741211] name failslab, interval 1, probability 0, space 0, times 0 [ 243.752786] CPU: 1 PID: 11046 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 243.759736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.769106] Call Trace: [ 243.771745] dump_stack+0x173/0x1d0 [ 243.775417] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 243.780662] should_fail+0xa19/0xb20 [ 243.784435] __should_failslab+0x278/0x2a0 [ 243.788715] should_failslab+0x29/0x70 [ 243.792661] __kmalloc_node_track_caller+0x202/0xff0 [ 243.797812] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 243.803343] ? kmem_cache_alloc_node+0x1d2/0xc20 [ 243.808154] ? netlink_sendmsg+0xb82/0x1300 [ 243.812523] ? netlink_sendmsg+0xb82/0x1300 [ 243.816872] __alloc_skb+0x309/0xa20 [ 243.820607] ? netlink_sendmsg+0xb82/0x1300 [ 243.824968] netlink_sendmsg+0xb82/0x1300 [ 243.829186] ___sys_sendmsg+0xdb9/0x11b0 [ 243.833315] ? netlink_getsockopt+0x1460/0x1460 11:25:13 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(0xffffffffffffffff, &(0x7f0000000480)=""/215, 0x29) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:13 executing program 5: [ 243.838058] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 243.843290] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 243.848681] ? __fget_light+0x6e1/0x750 [ 243.852706] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 243.857952] __se_sys_sendmsg+0x305/0x460 [ 243.862159] __x64_sys_sendmsg+0x4a/0x70 [ 243.866256] do_syscall_64+0xbc/0xf0 [ 243.870028] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 243.875244] RIP: 0033:0x411f51 [ 243.878480] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 243.897407] RSP: 002b:00007f58e42ef9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 243.905149] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 0000000000411f51 [ 243.912460] RDX: 0000000000000000 RSI: 00007f58e42efa00 RDI: 0000000000000007 [ 243.919757] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 243.927051] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e42efa40 [ 243.934344] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:14 executing program 5: [ 244.012232] protocol 88fb is buggy, dev hsr_slave_0 [ 244.017771] protocol 88fb is buggy, dev hsr_slave_1 [ 244.022240] protocol 88fb is buggy, dev hsr_slave_0 [ 244.028152] protocol 88fb is buggy, dev hsr_slave_1 11:25:14 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0xffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8002, 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000040)=""/159, &(0x7f0000000100)=0x9f) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') lseek(r0, 0xfffdfffffffffffe, 0x3) [ 244.126019] kvm: pic: single mode not supported [ 244.144362] kvm: pic: level sensitive irq not supported [ 244.151330] kvm: pic: level sensitive irq not supported 11:25:14 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'caif0\x00', 0x1}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x100) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x2, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x80) r3 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_ENDIAN(0x14, 0x1) 11:25:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 11:25:14 executing program 0 (fault-call:6 fault-nth:9): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:14 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00', 0x3}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0) dup3(r1, r2, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 244.201085] kvm: pic: single mode not supported [ 244.647244] FAULT_INJECTION: forcing a failure. [ 244.647244] name failslab, interval 1, probability 0, space 0, times 0 [ 244.663483] CPU: 0 PID: 11092 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 244.670431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.679804] Call Trace: [ 244.682446] dump_stack+0x173/0x1d0 [ 244.686122] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 244.691360] should_fail+0xa19/0xb20 [ 244.695128] __should_failslab+0x278/0x2a0 [ 244.699409] should_failslab+0x29/0x70 [ 244.703340] kmem_cache_alloc+0xff/0xb60 [ 244.707454] ? skb_clone+0x2fd/0x570 [ 244.711218] skb_clone+0x2fd/0x570 [ 244.714818] netlink_deliver_tap+0x7b3/0xe80 [ 244.719303] netlink_unicast+0xde9/0x1020 [ 244.723503] netlink_sendmsg+0x127f/0x1300 [ 244.727808] ___sys_sendmsg+0xdb9/0x11b0 [ 244.731904] ? netlink_getsockopt+0x1460/0x1460 [ 244.736619] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 244.741852] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 244.747257] ? __fget_light+0x6e1/0x750 [ 244.751294] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 244.756540] __se_sys_sendmsg+0x305/0x460 [ 244.760743] __x64_sys_sendmsg+0x4a/0x70 [ 244.764842] do_syscall_64+0xbc/0xf0 [ 244.768608] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 244.773839] RIP: 0033:0x411f51 [ 244.777059] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 244.795960] RSP: 002b:00007f58e42ef9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 244.803684] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 0000000000411f51 [ 244.810950] RDX: 0000000000000000 RSI: 00007f58e42efa00 RDI: 0000000000000007 [ 244.818230] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 244.825506] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e42efa40 [ 244.832774] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) 11:25:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') lseek(r0, 0x0, 0x3) 11:25:15 executing program 2: clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:15 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x300, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40010) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:15 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:15 executing program 0 (fault-call:6 fault-nth:10): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') [ 245.082311] kvm: pic: single mode not supported [ 245.098432] kvm: pic: level sensitive irq not supported [ 245.115812] kvm: pic: level sensitive irq not supported 11:25:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), 0x0, 0x2}, 0x20) 11:25:15 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x100) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x9}, 0x2) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0xfffffffffffffffe, 0x2, {0x7, 0x1c, 0xbde7, 0x80000, 0xff, 0x1, 0x6, 0x40}}, 0x50) 11:25:15 executing program 2: clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 245.141883] kvm: pic: single mode not supported [ 245.294446] FAULT_INJECTION: forcing a failure. [ 245.294446] name failslab, interval 1, probability 0, space 0, times 0 [ 245.310587] CPU: 0 PID: 11126 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 245.317550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.327013] Call Trace: [ 245.329645] dump_stack+0x173/0x1d0 [ 245.333401] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 245.338618] should_fail+0xa19/0xb20 [ 245.342395] __should_failslab+0x278/0x2a0 [ 245.346675] should_failslab+0x29/0x70 [ 245.350620] kmem_cache_alloc+0xff/0xb60 [ 245.354725] ? skb_clone+0x2fd/0x570 [ 245.358490] skb_clone+0x2fd/0x570 [ 245.362075] dev_queue_xmit_nit+0x52b/0x1200 [ 245.366539] dev_hard_start_xmit+0x26c/0xc40 [ 245.370994] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 245.376226] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 245.381438] __dev_queue_xmit+0x2e48/0x3b80 [ 245.385803] dev_queue_xmit+0x4b/0x60 [ 245.389652] netlink_deliver_tap+0x9ef/0xe80 [ 245.394138] netlink_unicast+0xde9/0x1020 [ 245.398332] netlink_sendmsg+0x127f/0x1300 [ 245.402619] ___sys_sendmsg+0xdb9/0x11b0 [ 245.406719] ? netlink_getsockopt+0x1460/0x1460 [ 245.411588] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 245.416828] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 245.422259] ? __fget_light+0x6e1/0x750 [ 245.426286] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 245.431512] __se_sys_sendmsg+0x305/0x460 [ 245.435714] __x64_sys_sendmsg+0x4a/0x70 [ 245.439812] do_syscall_64+0xbc/0xf0 [ 245.443604] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 245.448818] RIP: 0033:0x411f51 [ 245.452046] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 245.470969] RSP: 002b:00007f58e42ef9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 245.478719] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 0000000000411f51 [ 245.486031] RDX: 0000000000000000 RSI: 00007f58e42efa00 RDI: 0000000000000007 11:25:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') lseek(r0, 0x53, 0x1) 11:25:15 executing program 3: ioprio_set$pid(0x1, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000040)={0x0, 0x0, 0x5}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 245.493322] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 245.500607] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e42efa40 [ 245.507896] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:15 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0xfffffffffffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000000)=0x6) 11:25:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:25:15 executing program 2: clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:15 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') lseek(r0, 0x3fffffffffffffd, 0x0) 11:25:15 executing program 0 (fault-call:6 fault-nth:11): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:16 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:16 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getitimer(0x0, &(0x7f0000000000)) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:16 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') lseek(r0, 0x0, 0x3) [ 246.004500] FAULT_INJECTION: forcing a failure. [ 246.004500] name failslab, interval 1, probability 0, space 0, times 0 [ 246.015960] CPU: 0 PID: 11150 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 246.022950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.032331] Call Trace: [ 246.034993] dump_stack+0x173/0x1d0 [ 246.038672] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 246.043909] should_fail+0xa19/0xb20 [ 246.047674] __should_failslab+0x278/0x2a0 11:25:16 executing program 2: ioprio_set$pid(0x0, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 246.052058] should_failslab+0x29/0x70 [ 246.055990] kmem_cache_alloc_node+0x123/0xc20 [ 246.060624] ? __alloc_skb+0x218/0xa20 [ 246.065290] __alloc_skb+0x218/0xa20 [ 246.069036] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 246.074272] ctrl_getfamily+0x7c5/0xba0 [ 246.078335] ? ctrl_fill_info+0x1d40/0x1d40 [ 246.082697] genl_rcv_msg+0x185f/0x1a60 [ 246.084560] kvm: pic: single mode not supported [ 246.086748] netlink_rcv_skb+0x431/0x620 [ 246.092102] protocol 88fb is buggy, dev hsr_slave_0 [ 246.095500] ? genl_unbind+0x390/0x390 [ 246.100853] protocol 88fb is buggy, dev hsr_slave_1 [ 246.104471] genl_rcv+0x63/0x80 [ 246.104516] netlink_unicast+0xf3e/0x1020 [ 246.104560] netlink_sendmsg+0x127f/0x1300 [ 246.121215] ___sys_sendmsg+0xdb9/0x11b0 [ 246.125342] ? netlink_getsockopt+0x1460/0x1460 [ 246.130057] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 246.135314] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 246.139888] kvm: pic: level sensitive irq not supported [ 246.140717] ? __fget_light+0x6e1/0x750 [ 246.150104] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 246.153114] kvm: pic: level sensitive irq not supported [ 246.155339] __se_sys_sendmsg+0x305/0x460 [ 246.164894] __x64_sys_sendmsg+0x4a/0x70 [ 246.169000] do_syscall_64+0xbc/0xf0 [ 246.172778] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 246.177997] RIP: 0033:0x411f51 [ 246.181215] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 246.185459] kvm: pic: single mode not supported [ 246.200260] RSP: 002b:00007f58e43109c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 246.212751] RAX: ffffffffffffffda RBX: 00007f58e4310a58 RCX: 0000000000411f51 [ 246.220044] RDX: 0000000000000000 RSI: 00007f58e4310a00 RDI: 0000000000000007 [ 246.227690] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 246.234993] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e4310a40 [ 246.242284] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:16 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x3, 0x4, 0x7, 0x0, r1}) 11:25:16 executing program 2: ioprio_set$pid(0x0, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:16 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) read(r0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:25:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) open(0x0, 0x0, 0x0) inotify_init() 11:25:16 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(r0, 0x9) 11:25:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:25:16 executing program 2: ioprio_set$pid(0x0, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='proc\x00', 0x0, 0x0) 11:25:16 executing program 0 (fault-call:6 fault-nth:12): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:16 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x58620000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, r1, 0x110, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x40}, 0x40090) 11:25:16 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) 11:25:17 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 247.022758] FAULT_INJECTION: forcing a failure. [ 247.022758] name failslab, interval 1, probability 0, space 0, times 0 [ 247.034243] CPU: 0 PID: 11223 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 247.041193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.050571] Call Trace: [ 247.053207] dump_stack+0x173/0x1d0 [ 247.056885] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.062132] should_fail+0xa19/0xb20 [ 247.065900] __should_failslab+0x278/0x2a0 [ 247.070190] should_failslab+0x29/0x70 [ 247.074221] __kmalloc_node_track_caller+0x202/0xff0 [ 247.079366] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 247.084783] ? kmem_cache_alloc_node+0x1d2/0xc20 [ 247.089576] ? ctrl_getfamily+0x7c5/0xba0 [ 247.093773] ? ctrl_getfamily+0x7c5/0xba0 [ 247.097965] __alloc_skb+0x309/0xa20 [ 247.101719] ? ctrl_getfamily+0x7c5/0xba0 [ 247.105905] ctrl_getfamily+0x7c5/0xba0 [ 247.109926] ? ctrl_fill_info+0x1d40/0x1d40 [ 247.114284] genl_rcv_msg+0x185f/0x1a60 [ 247.118321] netlink_rcv_skb+0x431/0x620 [ 247.122422] ? genl_unbind+0x390/0x390 [ 247.126371] genl_rcv+0x63/0x80 [ 247.129691] netlink_unicast+0xf3e/0x1020 [ 247.133883] netlink_sendmsg+0x127f/0x1300 [ 247.138169] ___sys_sendmsg+0xdb9/0x11b0 [ 247.142277] ? netlink_getsockopt+0x1460/0x1460 [ 247.147054] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.152305] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 247.157703] ? __fget_light+0x6e1/0x750 [ 247.161721] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.166952] __se_sys_sendmsg+0x305/0x460 11:25:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') preadv(r0, &(0x7f0000000480), 0x100000000000012e, 0x0) [ 247.171172] __x64_sys_sendmsg+0x4a/0x70 [ 247.175279] do_syscall_64+0xbc/0xf0 [ 247.179046] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 247.184358] RIP: 0033:0x411f51 [ 247.187583] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 247.206517] RSP: 002b:00007f58e43109c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 247.214259] RAX: ffffffffffffffda RBX: 00007f58e4310a58 RCX: 0000000000411f51 11:25:17 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 247.221549] RDX: 0000000000000000 RSI: 00007f58e4310a00 RDI: 0000000000000007 [ 247.229356] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 247.236753] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e4310a40 [ 247.244060] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:25:17 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2000080000, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:17 executing program 0 (fault-call:6 fault-nth:13): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:17 executing program 5: pipe2(0x0, 0x80000) mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 11:25:17 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000280)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x0, 0xf000000}, 0xf000000}}, 0x10, 0x0}, 0x0) 11:25:17 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x11, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) [ 247.683843] kvm: pic: single mode not supported [ 247.690167] kvm: pic: level sensitive irq not supported [ 247.702693] kvm: pic: level sensitive irq not supported [ 247.736685] kvm: pic: single mode not supported [ 247.742959] FAULT_INJECTION: forcing a failure. [ 247.742959] name failslab, interval 1, probability 0, space 0, times 0 [ 247.758930] CPU: 1 PID: 11276 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 247.765872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.775241] Call Trace: [ 247.777879] dump_stack+0x173/0x1d0 [ 247.781672] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.786897] should_fail+0xa19/0xb20 [ 247.790700] __should_failslab+0x278/0x2a0 [ 247.795010] should_failslab+0x29/0x70 [ 247.798942] ? netlink_trim+0x398/0x400 [ 247.802963] __kmalloc_node_track_caller+0x202/0xff0 [ 247.808128] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.813349] ? netlink_trim+0x398/0x400 [ 247.817358] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 247.822884] ? netlink_trim+0x398/0x400 [ 247.826908] pskb_expand_head+0x220/0x18f0 [ 247.831184] ? kmsan_memcpy_memmove_metadata+0xbb4/0xf10 [ 247.836690] netlink_trim+0x398/0x400 [ 247.840545] netlink_unicast+0xe8/0x1020 [ 247.844687] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.849931] ctrl_getfamily+0xad2/0xba0 [ 247.853963] ? ctrl_fill_info+0x1d40/0x1d40 [ 247.858323] genl_rcv_msg+0x185f/0x1a60 [ 247.862356] netlink_rcv_skb+0x431/0x620 [ 247.866448] ? genl_unbind+0x390/0x390 [ 247.870366] genl_rcv+0x63/0x80 [ 247.873694] netlink_unicast+0xf3e/0x1020 [ 247.878011] netlink_sendmsg+0x127f/0x1300 [ 247.882309] ___sys_sendmsg+0xdb9/0x11b0 [ 247.886429] ? netlink_getsockopt+0x1460/0x1460 [ 247.891131] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.896378] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 247.901797] ? __fget_light+0x6e1/0x750 [ 247.905815] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 247.911054] __se_sys_sendmsg+0x305/0x460 [ 247.915261] __x64_sys_sendmsg+0x4a/0x70 [ 247.919359] do_syscall_64+0xbc/0xf0 [ 247.923124] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 247.928347] RIP: 0033:0x411f51 [ 247.931571] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 247.950580] RSP: 002b:00007f58e42ef9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 247.958318] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 0000000000411f51 [ 247.965613] RDX: 0000000000000000 RSI: 00007f58e42efa00 RDI: 0000000000000007 [ 247.972900] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 247.980191] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e42efa40 11:25:18 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lapb0\x00', 0x0}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x34740, 0x0) r2 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev={0xfe, 0x80, [], 0x21}, @in6=@dev={0xfe, 0x80, [], 0x2b}, 0x4e21, 0x1000, 0x4e22, 0x80000001, 0xa, 0x20, 0x20, 0x72, r1, r2}, {0x5, 0x6, 0x1000, 0x49, 0x0, 0x5, 0x6, 0x2}, {0x8, 0x9f3, 0x9, 0x3}, 0xfff, 0x6e6bbd, 0x1, 0x0, 0x1}, {{@in6=@mcast2, 0x4d5}, 0xa, @in6=@dev={0xfe, 0x80, [], 0xa}, 0x3507, 0x3, 0x1, 0x81, 0xffffffff, 0x6, 0x5aa209b4}}, 0xe8) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000280)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x0, 0xf000000}}}, 0x10, 0x0}, 0x0) [ 247.987477] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:18 executing program 5: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) close(r1) 11:25:18 executing program 0 (fault-call:6 fault-nth:14): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:18 executing program 1: r0 = inotify_init() fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) recvfrom$inet(r1, &(0x7f0000000080)=""/241, 0xf1, 0x60, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x8) 11:25:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/73, 0x49}, &(0x7f00000001c0)}, 0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:25:18 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000004c0)={&(0x7f0000000080), 0xc, &(0x7f0000000480)={&(0x7f0000000100)={0x360, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffba}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5fd}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3b9c406}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x41}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x364c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4aa8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffff00000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5edd478b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5bdc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x47}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x47f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffbff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x643b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff5c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3d3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x69}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6a51}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf055}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}]}, 0x360}, 0x1, 0x0, 0x0, 0x40800}, 0x8004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000000)={0x2, 0x0, [{0x2, 0x2, 0x0, 0x0, @irqchip={0x100000000, 0x212b}}, {0x6ae4, 0x3, 0x0, 0x0, @msi={0x9, 0x40, 0x7}}]}) 11:25:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) close(r0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x90) 11:25:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) write$nbd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="674466980000000003000100040000007bb63d138273b5dad0cd899592b8df7efa44034e1ad3ebc493b6f8f6825328754fcd7dc9c5c7000e00704c3a07e1a6da3de4a9254b036af43232cdc1c5a978a5b0f76456ad627b"], 0x1) [ 248.463958] FAULT_INJECTION: forcing a failure. [ 248.463958] name failslab, interval 1, probability 0, space 0, times 0 [ 248.475481] CPU: 1 PID: 11300 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 248.482443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.491833] Call Trace: [ 248.494474] dump_stack+0x173/0x1d0 [ 248.498264] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 248.499327] kvm: pic: single mode not supported [ 248.503512] should_fail+0xa19/0xb20 [ 248.512043] __should_failslab+0x278/0x2a0 [ 248.516332] should_failslab+0x29/0x70 [ 248.520368] kmem_cache_alloc+0xff/0xb60 [ 248.524470] ? skb_clone+0x2fd/0x570 [ 248.528090] kvm: pic: level sensitive irq not supported [ 248.528230] ? pskb_expand_head+0x6d1/0x18f0 [ 248.529600] kvm: pic: level sensitive irq not supported [ 248.538062] skb_clone+0x2fd/0x570 [ 248.541473] kvm: pic: single mode not supported [ 248.547026] netlink_deliver_tap+0x7b3/0xe80 [ 248.556173] netlink_unicast+0x9bd/0x1020 [ 248.560466] ctrl_getfamily+0xad2/0xba0 [ 248.564490] ? ctrl_fill_info+0x1d40/0x1d40 [ 248.568846] genl_rcv_msg+0x185f/0x1a60 [ 248.572904] netlink_rcv_skb+0x431/0x620 [ 248.577027] ? genl_unbind+0x390/0x390 [ 248.580956] genl_rcv+0x63/0x80 [ 248.584300] netlink_unicast+0xf3e/0x1020 [ 248.588498] netlink_sendmsg+0x127f/0x1300 [ 248.592800] ___sys_sendmsg+0xdb9/0x11b0 [ 248.596911] ? netlink_getsockopt+0x1460/0x1460 [ 248.601626] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 248.606865] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 248.612308] ? __fget_light+0x6e1/0x750 [ 248.616342] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 248.621585] __se_sys_sendmsg+0x305/0x460 [ 248.625810] __x64_sys_sendmsg+0x4a/0x70 [ 248.629916] do_syscall_64+0xbc/0xf0 [ 248.633712] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 248.638937] RIP: 0033:0x411f51 [ 248.642176] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 248.661104] RSP: 002b:00007f58e43109c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 248.668854] RAX: ffffffffffffffda RBX: 00007f58e4310a58 RCX: 0000000000411f51 [ 248.676152] RDX: 0000000000000000 RSI: 00007f58e4310a00 RDI: 0000000000000007 [ 248.683453] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 248.690759] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e4310a40 [ 248.698064] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:18 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:18 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x10900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000000)=0x9) ftruncate(r0, 0x1) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 248.712946] net_ratelimit: 6 callbacks suppressed [ 248.712962] protocol 88fb is buggy, dev hsr_slave_0 [ 248.723306] protocol 88fb is buggy, dev hsr_slave_1 [ 248.728930] protocol 88fb is buggy, dev hsr_slave_0 [ 248.734335] protocol 88fb is buggy, dev hsr_slave_1 11:25:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:25:18 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r0, &(0x7f0000000340), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000001c0)="20163635", 0x4) 11:25:19 executing program 0 (fault-call:6 fault-nth:15): socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 11:25:19 executing program 3: r0 = gettid() ioprio_set$pid(0x2, r0, 0x7c37) clone(0x1000002203, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000000ebff10fe84cb5dcca44639d02d59c179bf68aa814918d48feb06217163119ff6d4e1c11f55922b21258c21cc85af9b94a780c95e18c7746fff822d3feff5abf95d05a082975ad33114e0ff630839e13484aaf6ff21eae30938fbde1963c22680a5a0f0a4349907782b735bd8c15cdf56e9"]) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) clone(0x280100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 249.212197] protocol 88fb is buggy, dev hsr_slave_0 [ 249.217778] protocol 88fb is buggy, dev hsr_slave_1 11:25:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) creat(&(0x7f0000000700)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000740)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}]}, 0x38}, 0x1, 0x0, 0x0, 0x2004c000}, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/60, 0x3c}, {&(0x7f0000000140)=""/152, 0x98}, {&(0x7f0000000200)=""/32, 0x20}, {&(0x7f0000000240)=""/5, 0x5}], 0x4, &(0x7f0000000300)=""/49, 0x31}, 0x40000000) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000480)=0x210, 0x4) [ 249.231123] kvm: pic: single mode not supported 11:25:19 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) [ 249.256006] kvm: pic: level sensitive irq not supported [ 249.284922] kvm: pic: level sensitive irq not supported [ 249.302284] protocol 88fb is buggy, dev hsr_slave_0 [ 249.313230] protocol 88fb is buggy, dev hsr_slave_1 [ 249.315391] kvm: pic: single mode not supported [ 249.450834] FAULT_INJECTION: forcing a failure. [ 249.450834] name failslab, interval 1, probability 0, space 0, times 0 [ 249.466935] CPU: 0 PID: 11353 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 249.474008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.483384] Call Trace: [ 249.486066] dump_stack+0x173/0x1d0 [ 249.489742] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 249.494991] should_fail+0xa19/0xb20 [ 249.498764] __should_failslab+0x278/0x2a0 [ 249.503046] should_failslab+0x29/0x70 [ 249.507020] kmem_cache_alloc+0xff/0xb60 [ 249.511125] ? skb_clone+0x2fd/0x570 [ 249.514885] skb_clone+0x2fd/0x570 [ 249.518491] dev_queue_xmit_nit+0x52b/0x1200 [ 249.522967] dev_hard_start_xmit+0x26c/0xc40 [ 249.527425] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 249.532668] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 249.538102] __dev_queue_xmit+0x2e48/0x3b80 [ 249.542479] dev_queue_xmit+0x4b/0x60 [ 249.546296] netlink_deliver_tap+0x9ef/0xe80 [ 249.550737] netlink_unicast+0x9bd/0x1020 [ 249.554906] ctrl_getfamily+0xad2/0xba0 [ 249.558905] ? ctrl_fill_info+0x1d40/0x1d40 [ 249.563255] genl_rcv_msg+0x185f/0x1a60 [ 249.567254] netlink_rcv_skb+0x431/0x620 [ 249.571316] ? genl_unbind+0x390/0x390 [ 249.575216] genl_rcv+0x63/0x80 [ 249.578509] netlink_unicast+0xf3e/0x1020 [ 249.582681] netlink_sendmsg+0x127f/0x1300 [ 249.586940] ___sys_sendmsg+0xdb9/0x11b0 [ 249.591030] ? netlink_getsockopt+0x1460/0x1460 [ 249.595717] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 249.600917] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 249.606287] ? __fget_light+0x6e1/0x750 [ 249.610278] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 249.615493] __se_sys_sendmsg+0x305/0x460 [ 249.619663] __x64_sys_sendmsg+0x4a/0x70 [ 249.623742] do_syscall_64+0xbc/0xf0 [ 249.627476] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 249.632699] RIP: 0033:0x411f51 11:25:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x336) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 11:25:19 executing program 3: ioprio_set$pid(0x2, 0x0, 0x7c37) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0xfffffffffffffea3) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 249.635904] Code: 75 14 b8 2e 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 74 18 00 00 c3 48 83 ec 08 e8 ea fa ff ff 48 89 04 24 b8 2e 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 249.654812] RSP: 002b:00007f58e42ef9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 249.662528] RAX: ffffffffffffffda RBX: 00007f58e42efa58 RCX: 0000000000411f51 [ 249.669799] RDX: 0000000000000000 RSI: 00007f58e42efa00 RDI: 0000000000000007 [ 249.677073] RBP: 0000000000000007 R08: 0000000000000009 R09: 0000000000000000 [ 249.684357] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f58e42efa40 [ 249.691633] R13: 00000000004cd898 R14: 00000000004dbbc8 R15: 0000000000000006 11:25:19 executing program 2: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:25:19 executing program 5: r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002b00812de45ae087185082cf0124b0d057e74400074100000000001883b2e6dc02d9817bb2fcfd33a6bb191dcd64292e6af3a6cf603fbb4d79172bc4337cfaf5d2c109e9769c82825765884e055ec3051ded24b08a67a6beecefec9271546205d2d5a020", 0x68}], 0x1}, 0x0) [ 249.999914] ================================================================== [ 250.007461] BUG: KMSAN: uninit-value in memchr+0xce/0x110 [ 250.013014] CPU: 0 PID: 11382 Comm: syz-executor.5 Not tainted 5.0.0+ #11 [ 250.019957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.029631] Call Trace: [ 250.032246] dump_stack+0x173/0x1d0 [ 250.035897] kmsan_report+0x12e/0x2a0 [ 250.039719] __msan_warning+0x82/0xf0 [ 250.043549] memchr+0xce/0x110 [ 250.046770] tipc_nl_compat_link_set+0x121/0x1550 [ 250.051629] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.057036] ? tipc_nl_compat_link_dump+0x5f0/0x5f0 [ 250.062070] tipc_nl_compat_doit+0x3aa/0xaf0 [ 250.066496] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.071725] tipc_nl_compat_recv+0x1ae7/0x2750 [ 250.076345] ? tipc_nl_node_dump+0x1300/0x1300 [ 250.080955] ? tipc_nl_compat_link_dump+0x5f0/0x5f0 [ 250.086014] ? tipc_netlink_compat_stop+0x40/0x40 [ 250.090874] genl_rcv_msg+0x185f/0x1a60 [ 250.094898] netlink_rcv_skb+0x431/0x620 [ 250.098975] ? genl_unbind+0x390/0x390 [ 250.102907] genl_rcv+0x63/0x80 [ 250.106210] netlink_unicast+0xf3e/0x1020 [ 250.110400] netlink_sendmsg+0x127f/0x1300 [ 250.114687] ___sys_sendmsg+0xdb9/0x11b0 [ 250.118776] ? netlink_getsockopt+0x1460/0x1460 [ 250.123475] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.128684] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 250.134060] ? __fget_light+0x6e1/0x750 [ 250.138060] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.143291] __se_sys_sendmsg+0x305/0x460 [ 250.147480] __x64_sys_sendmsg+0x4a/0x70 [ 250.151558] do_syscall_64+0xbc/0xf0 [ 250.155309] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 250.160507] RIP: 0033:0x457f29 [ 250.163715] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.182626] RSP: 002b:00007f02fbd32c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 250.190346] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 250.197634] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 250.204925] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 250.212192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02fbd336d4 [ 250.219458] R13: 00000000004c5561 R14: 00000000004d9408 R15: 00000000ffffffff [ 250.226736] [ 250.228356] Uninit was created at: [ 250.231900] kmsan_internal_poison_shadow+0x92/0x150 [ 250.237018] kmsan_kmalloc+0xa6/0x130 [ 250.241994] kmsan_slab_alloc+0xe/0x10 [ 250.247360] __kmalloc_node_track_caller+0xe9e/0xff0 [ 250.252474] __alloc_skb+0x309/0xa20 [ 250.256192] netlink_sendmsg+0xb82/0x1300 [ 250.260336] ___sys_sendmsg+0xdb9/0x11b0 [ 250.264395] __se_sys_sendmsg+0x305/0x460 [ 250.268541] __x64_sys_sendmsg+0x4a/0x70 [ 250.272603] do_syscall_64+0xbc/0xf0 [ 250.276323] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 250.281501] ================================================================== [ 250.288852] Disabling lock debugging due to kernel taint [ 250.294300] Kernel panic - not syncing: panic_on_warn set ... [ 250.300183] CPU: 0 PID: 11382 Comm: syz-executor.5 Tainted: G B 5.0.0+ #11 [ 250.308489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.317838] Call Trace: [ 250.320433] dump_stack+0x173/0x1d0 [ 250.324070] panic+0x3d1/0xb01 [ 250.327291] kmsan_report+0x293/0x2a0 [ 250.331099] __msan_warning+0x82/0xf0 [ 250.334902] memchr+0xce/0x110 [ 250.338101] tipc_nl_compat_link_set+0x121/0x1550 [ 250.342943] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.348146] ? tipc_nl_compat_link_dump+0x5f0/0x5f0 [ 250.353163] tipc_nl_compat_doit+0x3aa/0xaf0 [ 250.357570] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.362777] tipc_nl_compat_recv+0x1ae7/0x2750 [ 250.367373] ? tipc_nl_node_dump+0x1300/0x1300 [ 250.371957] ? tipc_nl_compat_link_dump+0x5f0/0x5f0 [ 250.377009] ? tipc_netlink_compat_stop+0x40/0x40 [ 250.381849] genl_rcv_msg+0x185f/0x1a60 [ 250.385848] netlink_rcv_skb+0x431/0x620 [ 250.389906] ? genl_unbind+0x390/0x390 [ 250.394181] genl_rcv+0x63/0x80 [ 250.397465] netlink_unicast+0xf3e/0x1020 [ 250.401629] netlink_sendmsg+0x127f/0x1300 [ 250.405883] ___sys_sendmsg+0xdb9/0x11b0 [ 250.409951] ? netlink_getsockopt+0x1460/0x1460 [ 250.414643] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.419838] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 250.425201] ? __fget_light+0x6e1/0x750 [ 250.429181] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 250.434378] __se_sys_sendmsg+0x305/0x460 [ 250.438542] __x64_sys_sendmsg+0x4a/0x70 [ 250.442602] do_syscall_64+0xbc/0xf0 [ 250.446319] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 250.451509] RIP: 0033:0x457f29 [ 250.454707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.473604] RSP: 002b:00007f02fbd32c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 250.481312] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 250.488579] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 250.495843] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 250.503108] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02fbd336d4 [ 250.510378] R13: 00000000004c5561 R14: 00000000004d9408 R15: 00000000ffffffff [ 250.518845] Kernel Offset: disabled [ 250.522501] Rebooting in 86400 seconds..