[ 58.185580] audit: type=1800 audit(1541980521.229:27): pid=6309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 58.205392] audit: type=1800 audit(1541980521.239:28): pid=6309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.087958] audit: type=1800 audit(1541980523.139:29): pid=6309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 60.107567] audit: type=1800 audit(1541980523.139:30): pid=6309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. 2018/11/11 23:55:33 fuzzer started 2018/11/11 23:55:37 dialing manager at 10.128.0.26:42475 2018/11/11 23:55:38 syscalls: 1 2018/11/11 23:55:38 code coverage: enabled 2018/11/11 23:55:38 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/11 23:55:38 setuid sandbox: enabled 2018/11/11 23:55:38 namespace sandbox: enabled 2018/11/11 23:55:38 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/11 23:55:38 fault injection: enabled 2018/11/11 23:55:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/11 23:55:38 net packed injection: enabled 2018/11/11 23:55:38 net device setup: enabled 23:57:58 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80000000006, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000080)={0x0, "12c5962ce91f80c28ac2ee1d789c05df073c1d65bba3a5346d0b625d67d584b6"}) syzkaller login: [ 216.591444] IPVS: ftp: loaded support on port[0] = 21 [ 218.751560] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.760105] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.769836] device bridge_slave_0 entered promiscuous mode [ 218.896770] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.903342] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.911824] device bridge_slave_1 entered promiscuous mode [ 219.033955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.160774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 219.550906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.680470] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:58:02 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 220.463042] IPVS: ftp: loaded support on port[0] = 21 [ 220.534552] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.542652] team0: Port device team_slave_0 added [ 220.700351] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.708416] team0: Port device team_slave_1 added [ 220.953444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.963811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.972702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.165714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.173055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.182050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.314139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.321914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.331007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.486269] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.493983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.503454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.545824] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.552392] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.560725] device bridge_slave_0 entered promiscuous mode [ 223.758579] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.765245] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.773760] device bridge_slave_1 entered promiscuous mode [ 224.020775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.037855] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.044430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.051330] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.057884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.066580] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.200322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.848702] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.902661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.130210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.302519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 225.309570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.543866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.550904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:58:08 executing program 2: r0 = inotify_init1(0x0) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000d00)) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000340)=""/34, 0x22}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) [ 226.383218] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.391050] team0: Port device team_slave_0 added [ 226.456619] IPVS: ftp: loaded support on port[0] = 21 [ 226.742628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.750620] team0: Port device team_slave_1 added [ 227.033327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.040384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.049295] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.254204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 227.261289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.270265] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.487254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.495015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.504064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.824043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.831774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.840474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.656246] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.662900] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.671276] device bridge_slave_0 entered promiscuous mode [ 230.789378] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.795943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.802950] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.809400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.817869] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.952390] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.958857] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.967368] device bridge_slave_1 entered promiscuous mode [ 231.259339] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.473675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.543662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.191283] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.413268] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.681385] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 232.688926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 23:58:15 executing program 3: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x5, 0xfff, 0x5, 0xfffffffffffffffb}) socket$inet6(0xa, 0x6, 0x4000) getgid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) [ 233.005069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 233.012383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.824263] IPVS: ftp: loaded support on port[0] = 21 [ 234.103424] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 234.111315] team0: Port device team_slave_0 added [ 234.421301] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 234.429409] team0: Port device team_slave_1 added [ 234.525390] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.741167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 234.748450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.757774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.101923] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 235.108966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.117710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.389312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 235.397078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.405972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.775113] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 235.782887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.791883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.819273] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.847096] ip (6909) used greatest stack depth: 53088 bytes left [ 237.051003] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.057478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.065818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.218144] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.162538] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.169023] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.177668] device bridge_slave_0 entered promiscuous mode [ 239.202585] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.209050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.216053] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.222589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.231011] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.508869] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.515481] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.524001] device bridge_slave_1 entered promiscuous mode [ 239.881332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 240.181876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.219521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 241.206793] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 241.596917] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 241.969171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 241.976372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.248291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 242.255575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:58:25 executing program 4: [ 243.189475] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 243.197617] team0: Port device team_slave_0 added [ 243.610518] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.618620] team0: Port device team_slave_1 added [ 243.763816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.984014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.991123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.000524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.066881] IPVS: ftp: loaded support on port[0] = 21 [ 244.270484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 244.279141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.288006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.603429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.611048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.619971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.021923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.029518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.038675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.246025] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 23:58:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f0000000400)={&(0x7f0000000140)=@getpolicy={0x50, 0x15, 0x301, 0x0, 0x0, {{@in, @in6=@dev}}}, 0x50}}, 0x0) recvmmsg(r0, &(0x7f0000004440)=[{{&(0x7f0000002000)=@xdp, 0x80, &(0x7f0000002380), 0x0, &(0x7f0000002400)=""/102, 0x66}}], 0x1, 0x0, &(0x7f0000004600)={0x77359400}) [ 246.707257] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.713787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.721487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:58:29 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r3, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:58:30 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r3, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:58:31 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r3, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) [ 248.243996] 8021q: adding VLAN 0 to HW filter on device team0 23:58:31 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r3, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:58:32 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) [ 249.378689] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.385253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.392257] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.398699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.407743] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.532024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:58:32 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:58:33 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) [ 250.546539] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.553215] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.561570] device bridge_slave_0 entered promiscuous mode [ 250.996571] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.003344] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.011782] device bridge_slave_1 entered promiscuous mode [ 251.394279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.706256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.675902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.989391] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.302139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.309380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.583236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.590307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.670214] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.582282] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.590164] team0: Port device team_slave_0 added [ 254.946654] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.954693] team0: Port device team_slave_1 added [ 255.076374] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.265944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.273395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.282129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.532306] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.539367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.548073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.816671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.824421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.833394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 23:58:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f00000003c0)=ANY=[]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) poll(&(0x7f0000000440), 0x0, 0x0) munlockall() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380)=""/85, &(0x7f0000000240)=0x55) [ 256.023718] ptrace attach of "/root/syz-executor1"[7424] was attempted by "/root/syz-executor1"[7425] [ 256.078560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 256.086453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.095232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.157293] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.163865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.171441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.972242] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.141691] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.148175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.155223] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.161746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.170187] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.176919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.337318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.081428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.637299] ptrace attach of "/root/syz-executor2"[6656] was attempted by "/root/syz-executor2"[7612] [ 261.659421] ptrace attach of "/root/syz-executor2"[6656] was attempted by "/root/syz-executor2"[7612] 23:58:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x18000, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/2) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000000)=0xa24, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000280)={0x0, 0x100000001}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) getgid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) r2 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f00000007c0)={0x158, 0x0, 0x6, [{{0x0, 0x0, 0xea3, 0x5, 0x5, 0x4, {0x2, 0x0, 0x0, 0x0, 0x3, 0x2, 0x9, 0x7, 0x696, 0x200, 0x6, 0x0, r2, 0x4, 0x400}}, {0x3, 0x0, 0xc, 0x7fffffff, '/dev/rfkill\x00'}}, {{0x4, 0x0, 0x2, 0xee2, 0x3, 0x81, {0x0, 0x5c, 0x7, 0x800, 0x101, 0x0, 0x10000, 0x0, 0x5, 0x9, 0x8, r3, r4, 0x3f, 0xfffffffffffffff8}}, {0x6, 0xa7d6, 0x5, 0x400, 'wlan0'}}]}, 0x158) [ 261.746639] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 261.753578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.761350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.869435] hrtimer: interrupt took 33926 ns [ 262.513905] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.824556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.302862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 23:58:48 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f00000005c0)=""/163) munlockall() r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000180)=0x1c) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000380)=""/85, &(0x7f0000000240)=0x55) [ 265.782263] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.788556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.796396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.069196] 8021q: adding VLAN 0 to HW filter on device team0 23:58:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f00000003c0)=ANY=[]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x5) munlockall() write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) umount2(&(0x7f0000000580)='./file1\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) 23:58:50 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$pptp(0xffffffffffffffff, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:58:50 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xc002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x401) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000180)="0f08baf80c66b874cab18366efbafc0c66edba430066edba200066eddf2d66b9ad03000066b8786d000066ba000000000f3066b80d0000000f23c00f21f8663503000c000f23f80f212f0fe15c000f00920800", 0x53}], 0x1, 0x44, &(0x7f0000000240)=[@cstype0={0x4, 0xc}], 0x1) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f0000000280)="66baf80cb87c1ebb87ef66bafc0ced26666962ae06b6660f07b90c030000b89791efc9ba000000000f30f3e01d0f308fc9a89688000000000f01cb0f009f319f000066baf80cb8543cf589ef66bafc0ced", 0x51}], 0x1, 0x8, &(0x7f0000000340)=[@cr4={0x1, 0x140042}], 0x1) r3 = add_key(&(0x7f0000000380)='cifs.idmap\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="594d3eb915c09cdf5723", 0xa, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r3, &(0x7f0000000440)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', "", 0x20, 0x4, 0x20, [0x37, 0x62, 0x37]}, 0x30, r4) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000500)) r5 = fcntl$getown(r0, 0x9) write$cgroup_pid(r0, &(0x7f0000000540)=r5, 0x12) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000580)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000840)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x134, r6, 0x700, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffff14}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffb}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x25e}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1b}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x2400c014}, 0x20000000) keyctl$dh_compute(0x17, &(0x7f0000000880)={r3, r3, r3}, &(0x7f00000008c0)=""/134, 0x86, &(0x7f0000000a00)={&(0x7f0000000980)={'wp512-generic\x00'}, &(0x7f00000009c0)="0615999126b2b2d247c26ab426ed5041e8f07da8d48c99e3b08f76b13b627aa98764b65cb4717b6a935a3946f91c7a5576faef9e62af636a7a4d", 0x3a}) fchdir(r2) write$P9_RLOCK(r1, &(0x7f0000000a40)={0x8, 0x35, 0x1, 0x2}, 0x8) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000a80)=0x8) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000ac0)=0x7) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000b00)) write$cgroup_int(r1, &(0x7f0000000b40)=0x5, 0x12) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000b80)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000bc0)={r7, 0x80000, r0}) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000c00)={0x0, 0xffffffffffffff9f, 0x7, 0x49}, &(0x7f0000000c40)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000c80)={r8, 0xffff, 0x4}, &(0x7f0000000cc0)=0x8) ioctl$RTC_UIE_OFF(r1, 0x7004) 23:58:50 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f0000000540)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000680)}) 23:58:50 executing program 1: socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080), 0x10) syz_open_dev$ndb(&(0x7f0000000940)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40, 0x0) 23:58:50 executing program 3: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000100)='trusted\x00') lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) [ 268.053401] binder_alloc: binder_alloc_mmap_handler: 7816 20001000-20004000 already mapped failed -16 [ 268.092787] binder: BINDER_SET_CONTEXT_MGR already set [ 268.098364] binder: 7816:7821 ioctl 40046207 0 returned -16 [ 268.159915] binder: 7816:7827 Release 1 refcount change on invalid ref 1 ret -22 23:58:51 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$pptp(0xffffffffffffffff, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:58:51 executing program 3: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2b5b0dcadf8322b8d28c604a50676755c6ff162a40720ba95288cba23325f19478a6c6a5e7c88afc70e4c94a97c837d56c91bd364bfd762e91f0f1ace4895c77f9000000000000000000000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000100)='trusted\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) lstat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000680)={{{@in=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@local, @in=@broadcast}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000a00)=0xe8) getgroups(0x0, &(0x7f0000000a40)) stat(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) [ 268.222531] binder_alloc: 7816: binder_alloc_buf, no vma [ 268.228290] binder: 7816:7821 transaction failed 29189/-3, size 24-8 line 2970 [ 268.252102] binder: release 7816:7821 transaction 2 out, still active [ 268.258940] binder: undelivered TRANSACTION_COMPLETE [ 268.328980] binder: undelivered TRANSACTION_ERROR: 29189 [ 268.334935] binder: send failed reply for transaction 2, target dead 23:58:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000003ff8)=0x80) 23:58:51 executing program 1: socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080), 0x10) syz_open_dev$ndb(&(0x7f0000000940)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40, 0x0) 23:58:51 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f00000004c0)={{}, 'port1\x00', 0x19, 0x0, 0x0, 0x3, 0x80000000, 0xe0000, 0x5, 0x0, 0x1, 0x3f}) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f00000005c0)=""/163) poll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x2002}, {r0, 0x400}], 0x3, 0xd9) munlockall() getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000380)=""/85, &(0x7f0000000240)=0x55) 23:58:51 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$pptp(0xffffffffffffffff, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:58:51 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) select(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x2710}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000040), 0x1e8, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) 23:58:51 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r0, 0x402, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'team0\x00'}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000001c0), 0x0, 0x0) pipe2$9p(&(0x7f0000000380), 0x0) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x1, &(0x7f00000001c0)=0x800000009) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={r0, 0x0, 0x8, 0x8, 0x8}) getegid() openat$pfkey(0xffffffffffffff9c, &(0x7f0000001600)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 269.133000] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 269.269657] IPVS: ftp: loaded support on port[0] = 21 [ 272.174237] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.180704] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.189352] device bridge_slave_0 entered promiscuous mode [ 272.317387] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.324010] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.332707] device bridge_slave_1 entered promiscuous mode [ 272.461469] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 272.589176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 272.980501] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 273.112178] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 273.759982] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 273.768049] team0: Port device team_slave_0 added [ 273.896540] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 273.904744] team0: Port device team_slave_1 added [ 274.032128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 274.044570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.053398] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.182224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.315031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.322716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.331765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.464815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.472539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.481444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.723979] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.730385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.737327] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.743783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.751283] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 275.757993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.769732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.060210] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 279.342190] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 279.348461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.356231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.636643] 8021q: adding VLAN 0 to HW filter on device team0 23:59:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 23:59:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000000340)="0340", 0x2, 0x800000000008000, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000380)="9e5b", 0x2, 0x8000, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000140)="0c550c76d552e31cdd5d68cf5b846634802fa1b87ebb242a", 0x18, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) 23:59:04 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000000c0)) r2 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r2, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r2, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:04 executing program 2: mlockall(0x1) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x410000) 23:59:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x5) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f00000005c0)=""/163) munlockall() r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000180)=0x1c) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000380)=""/85, &(0x7f0000000240)=0x55) 23:59:04 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) 23:59:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)) r4 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000240)) dup2(r3, r4) 23:59:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x18000, 0x0) r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/2) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000280)={0x0, 0x100000001}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) getgid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f00000007c0)={0x160, 0x0, 0x6, [{{0x0, 0x0, 0xffffffffffffffff, 0x80000000, 0xfffffffffffffff7, 0x6, {0x6, 0x0, 0x1, 0x0, 0x3f, 0xffffffff, 0x10001, 0x6, 0x9, 0x2, 0x7ff, 0x0, r1, 0x3}}, {0x2, 0x0, 0xc, 0x7fff, '/dev/rfkill\x00'}}, {{0x1, 0x1, 0xea3, 0x5, 0x5, 0x4, {0x2, 0x1, 0x0, 0x0, 0x3, 0x2, 0x9, 0x7, 0x696, 0x200, 0x6, 0x0, r2, 0x4, 0x400}}, {0x3, 0x3714, 0xc, 0x7fffffff, '/dev/rfkill\x00'}}]}, 0x160) 23:59:05 executing program 4: 23:59:05 executing program 3: 23:59:05 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:05 executing program 5: 23:59:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000013c0), 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 23:59:05 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='tunl0\x00', 0x106) sendto$inet(r0, &(0x7f0000000000), 0xc7, 0x404c0c0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x5b0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 23:59:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000003ff8)=0x80) 23:59:05 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)) write(r0, &(0x7f00000001c0)="9ebe37439d75c192311dab89c33ba19f212913741660ee4cd4d0a815f0a2c43433c3df9c17b1d1d88a95e7b9b070aea3a83393a87728a46afd5dd0c4ba3cb78937be1d3129d3391591b9baf09502aaeb7467abdb00c766fcac32cc1a77f9519e70fe2144d9956cb3e723673dc2e6d7f58683be1df90cb5a33192ac9da6893a4313ae724f929daea50ddd61686fa930b867f965962a0735415b6cff96f35b05fdc390e39a34de4e07bed9413d4a13504efd57bcbdb395cb03df35aacfb6c1e3865c19da17ae348c8661ad", 0xca) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:05 executing program 5: 23:59:05 executing program 4: 23:59:06 executing program 1: 23:59:06 executing program 3: 23:59:06 executing program 2: 23:59:06 executing program 5: 23:59:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:06 executing program 4: 23:59:06 executing program 2: 23:59:06 executing program 3: 23:59:06 executing program 1: 23:59:06 executing program 5: 23:59:06 executing program 2: 23:59:06 executing program 4: 23:59:06 executing program 3: 23:59:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:06 executing program 1: 23:59:06 executing program 5: 23:59:07 executing program 2: 23:59:07 executing program 4: 23:59:07 executing program 5: 23:59:07 executing program 1: 23:59:07 executing program 3: 23:59:07 executing program 4: 23:59:07 executing program 2: 23:59:07 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:07 executing program 1: 23:59:07 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='timers\x00') sendfile(r0, r0, &(0x7f0000000000), 0x3) 23:59:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541d, &(0x7f0000000040)) ioctl$TIOCCONS(r1, 0x541d) 23:59:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0xffffffffffffff54}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x200000000008824}}, 0x20}, 0x1, 0x8100}, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 23:59:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fremovexattr(r0, &(0x7f00000000c0)=@known='user.syz\x00') fsync(r0) 23:59:07 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:08 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='timers\x00') sendfile(r0, r0, &(0x7f0000000000), 0x3) 23:59:08 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='projid_map\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fc"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) time(&(0x7f0000000180)) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000380)={{0x2, 0x4e21, @local}, {0x6, @remote}, 0x20, {0x2, 0x4e22}, 'ipddp0\x00'}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000200)) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getgroups(0x1, &(0x7f0000000240)=[0xee01]) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = gettid() ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) 23:59:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @remote}}}, 0x108) [ 285.308030] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 23:59:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000001c0)=0xfffffffffffffffe, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 23:59:08 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0), 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 23:59:08 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:08 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000034000200000000002000900400000000000bc0003000000030006000000000002000000e0000054d81458186fe8b90002000100060000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) 23:59:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000006e40)=[{{&(0x7f00000009c0)=@pppol2tpv3, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000a40)=""/111, 0x6f}, {&(0x7f0000000b00)=""/18, 0x12}, {&(0x7f0000000c40)=""/228, 0xe4}, {&(0x7f0000000d40)=""/224, 0xe0}], 0x4}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000000400)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r1, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) 23:59:08 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:08 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f00000001c0)='./file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x24180) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000200)=""/30, 0xfffffe80) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x5, 0x9, 0xfffffffffffffe00, "77b56a2418b2"}}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r3}, 0x10) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r4, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) [ 285.990323] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:59:09 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='projid_map\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fc"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) time(&(0x7f0000000180)) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000380)={{0x2, 0x4e21, @local}, {0x6, @remote}, 0x20, {0x2, 0x4e22}, 'ipddp0\x00'}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000200)) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getgroups(0x1, &(0x7f0000000240)=[0xee01]) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = gettid() ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) 23:59:09 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:09 executing program 5: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x80000001, 0x4) 23:59:09 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f0000000540)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046304, 0x1}], 0x0, 0x0, &(0x7f0000000680)}) [ 286.659047] binder: 8417:8420 got transaction with invalid offset (0, min 0 max 0) or object. [ 286.668215] binder: 8417:8420 transaction failed 29201/-22, size 0-8 line 3033 [ 286.690833] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 23:59:09 executing program 2: socket$inet6(0xa, 0x0, 0x7f) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000140)) [ 286.754288] binder: 8417:8422 IncRefs 0 refcount change on invalid ref 1 ret -22 [ 286.786819] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 286.834038] binder_alloc: binder_alloc_mmap_handler: 8417 20001000-20004000 already mapped failed -16 23:59:09 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) [ 286.925600] binder: BINDER_SET_CONTEXT_MGR already set [ 286.931165] binder: 8417:8420 ioctl 40046207 0 returned -16 [ 286.992494] audit: type=1800 audit(1541980750.049:31): pid=8400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor4" name="bus" dev="ramfs" ino=23002 res=0 [ 287.041305] binder_alloc: 8417: binder_alloc_buf, no vma [ 287.047125] binder: 8417:8433 transaction failed 29189/-3, size 0-8 line 2970 23:59:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 23:59:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) fstatfs(r1, &(0x7f0000000040)=""/2) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000280)={0x0, 0x100000001}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f00000004c0)) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r1, &(0x7f00000007c0)={0x200, 0x0, 0x6, [{{0x6, 0x2, 0x0, 0x7, 0x7fffffff, 0x4, {0x0, 0x7fff, 0x6, 0xd01e, 0x42, 0xfff, 0x80000001, 0x6, 0x200000000000000, 0x960, 0x3, r2, r3}}, {0x3, 0x6, 0xc, 0xfffffffffffffffb, '/dev/rfkill\x00'}}, {{0x1, 0x2, 0xffffffffffffffff, 0x80000000, 0xfffffffffffffff7, 0x6, {0x6, 0x3, 0x1, 0x7, 0x3f, 0xffffffff, 0x10001, 0x6, 0x9, 0x2, 0x7ff, 0x0, 0x0, 0x3, 0x10000}}, {0x2, 0x7, 0xc, 0x7fff, '/dev/rfkill\x00'}}, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1ff, {0x6, 0x6bbd, 0x0, 0x0, 0xc9d, 0x0, 0x27c, 0x9, 0x0, 0xab, 0x80, 0x0, r4, 0x6, 0x9}}, {0x2, 0x7, 0x7, 0x0, '$eth1&^'}}]}, 0x200) [ 287.121289] binder: undelivered TRANSACTION_ERROR: 29189 [ 287.127281] binder: undelivered TRANSACTION_ERROR: 29201 23:59:10 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000006, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000140)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}}) 23:59:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000001400)={0x24, 0x1f, 0x0, 0x0, 0x0, {}, [@generic="d303199add05a4c6e1ea45d691"]}, 0x24}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 23:59:10 executing program 3: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pause() openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) 23:59:10 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:10 executing program 4: socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000080)={'bridge0\x00', @ifru_mtu=0x8}) 23:59:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0xffffffffffffff56, 0x0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @remote}, 0x1c) 23:59:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f00000004c0)={{}, 'port1\x00', 0x19, 0x0, 0x0, 0x3, 0x80000000, 0xe0000, 0x5, 0x0, 0x0, 0x3f}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f00000005c0)=""/163) poll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x400}, {}], 0x2, 0x0) munlockall() 23:59:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={"62726964676530000000008000", &(0x7f00000000c0)=@ethtool_cmd={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}}) 23:59:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0xfffffffffffffffd}, 0x20) 23:59:11 executing program 1: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fcca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000380)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {}, 'ipddp0\x00'}) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:59:11 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fcca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) time(&(0x7f0000000180)) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000380)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {}, 'ipddp0\x00'}) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:59:11 executing program 4: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) finit_module(r1, &(0x7f0000000040)="776c616e3124252a707070307b73656c696e7578402d657468307070703176626f786e65743173797374656d6d696d655f747970652365746831942800", 0x2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) [ 288.286765] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 23:59:11 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r0, 0x80000000005016, &(0x7f0000003ff8)) 23:59:11 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x141100, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000640)={r1}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000540)=""/246) getpid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000200)=0xc) gettid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getpgid(0xffffffffffffffff) getpgrp(0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000003c0)) r3 = gettid() r4 = getpgrp(r3) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffefffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x443a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r4, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a40)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x4e21}}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c460000000000000000005aced12135d7d66f0000000100000000000000400000000000000000000000000000000000000000003800eeff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x73) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$BLKBSZGET(r6, 0x80081270, &(0x7f0000000380)) r7 = memfd_create(&(0x7f0000000900)="73970ddb08df8c656c667b7070703070707031236d643573756d00", 0x0) pwritev(r7, &(0x7f0000f50f90)=[{&(0x7f0000000180)='&', 0x1}], 0x1, 0x81003) getsockopt(r6, 0x7, 0xad, &(0x7f0000000400)=""/101, &(0x7f0000000480)=0x65) sendfile(r2, r7, &(0x7f00000ddff8), 0x80000004) 23:59:11 executing program 5: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0xfffffffffffffffd, 0xfffffffffffffffe}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x80000001, 0x4) 23:59:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) sched_getaffinity(0x0, 0x8, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") lookup_dcookie(0x0, &(0x7f0000000300)=""/171, 0xab) fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fsync(r0) 23:59:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) [ 288.946713] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 288.982368] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 23:59:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file1/file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) rename(&(0x7f0000000180)='./file1/file0\x00', &(0x7f0000000200)='./file0\x00') rename(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000280)='./file1\x00') 23:59:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) sched_getaffinity(0x0, 0x8, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") lookup_dcookie(0x0, &(0x7f0000000300)=""/171, 0xab) fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fsync(r0) 23:59:12 executing program 1: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fcca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000380)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {}, 'ipddp0\x00'}) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:59:12 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x141100, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000640)={r1}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000540)=""/246) getpid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000200)=0xc) gettid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getpgid(0xffffffffffffffff) getpgrp(0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000003c0)) r3 = gettid() r4 = getpgrp(r3) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffefffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x443a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r4, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a40)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x4e21}}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c460000000000000000005aced12135d7d66f0000000100000000000000400000000000000000000000000000000000000000003800eeff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x73) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$BLKBSZGET(r6, 0x80081270, &(0x7f0000000380)) r7 = memfd_create(&(0x7f0000000900)="73970ddb08df8c656c667b7070703070707031236d643573756d00", 0x0) pwritev(r7, &(0x7f0000f50f90)=[{&(0x7f0000000180)='&', 0x1}], 0x1, 0x81003) getsockopt(r6, 0x7, 0xad, &(0x7f0000000400)=""/101, &(0x7f0000000480)=0x65) sendfile(r2, r7, &(0x7f00000ddff8), 0x80000004) 23:59:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:12 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fcca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006340)) time(&(0x7f0000000180)) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000380)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {}, 'ipddp0\x00'}) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:59:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)}}], 0x1, 0x0) 23:59:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f00000004c0)={{0x5}, 'port1\x00', 0x0, 0x0, 0x4, 0x3, 0x80000000, 0xe0000, 0x5, 0x0, 0x0, 0x3f}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f00000005c0)=""/163) poll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x2002}, {r1, 0x400}], 0x2, 0xd9) munlockall() write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) umount2(&(0x7f0000000580)='./file1\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000180)=0x1c) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000380)=""/85, &(0x7f0000000240)=0x55) fcntl$setown(0xffffffffffffffff, 0x8, r2) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000680)={'ah\x00'}, &(0x7f00000006c0)=0x1e) memfd_create(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0) 23:59:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:13 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup2(r1, r0) sendmsg$nl_route(r2, &(0x7f0000001c00)={&(0x7f0000000080), 0xc, &(0x7f0000001bc0)={&(0x7f00000000c0)=ANY=[]}}, 0x0) 23:59:13 executing program 1: 23:59:13 executing program 3: 23:59:13 executing program 4: 23:59:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:13 executing program 5: 23:59:13 executing program 3: 23:59:13 executing program 4: 23:59:13 executing program 0: 23:59:13 executing program 1: 23:59:13 executing program 5: 23:59:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:14 executing program 4: 23:59:14 executing program 3: 23:59:14 executing program 1: 23:59:14 executing program 4: 23:59:14 executing program 5: 23:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:14 executing program 1: 23:59:14 executing program 0: 23:59:14 executing program 3: 23:59:14 executing program 4: 23:59:14 executing program 0: 23:59:14 executing program 5: 23:59:14 executing program 1: 23:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:15 executing program 0: 23:59:15 executing program 3: 23:59:15 executing program 4: 23:59:15 executing program 1: 23:59:15 executing program 5: 23:59:15 executing program 4: 23:59:15 executing program 0: 23:59:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:15 executing program 3: 23:59:15 executing program 5: 23:59:15 executing program 4: 23:59:15 executing program 1: 23:59:15 executing program 5: 23:59:15 executing program 0: 23:59:16 executing program 3: 23:59:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:16 executing program 1: 23:59:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xe, 0x0, 0x10001}}) 23:59:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000006, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0x0, 0x10001}}) 23:59:16 executing program 5: readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)=""/201, 0xc9) mknod(&(0x7f0000000180)='./file1\x00', 0x803, 0x0) clone(0x1ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_ima(&(0x7f0000000100)='\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0xe, "db58917a52cb8e61250d57"}, 0xd, 0x2) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000200), &(0x7f00000002c0)=0x4) 23:59:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendmsg(r0, &(0x7f0000014fc8)={&(0x7f0000006ff0)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f000001ef80)}, 0x0) 23:59:16 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000006, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000100)) 23:59:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:16 executing program 4: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bdev\x00', 0x0, 0x0) chdir(&(0x7f0000000640)='./file0\x00') 23:59:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}}, 0x0) 23:59:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) sched_setaffinity(r1, 0x2, &(0x7f00000000c0)=0xfffffffffffffffa) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r2, 0x406, r0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000080)={0x0, 0x800}) r4 = dup3(r2, r0, 0x80000) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ioprio_get$pid(0x1, r5) rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000100)) ptrace(0x10, r5) waitid(0x1, r5, &(0x7f0000000080), 0x2, &(0x7f0000000240)) ioctl$BLKROGET(r4, 0x125e, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000240)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965f2e23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") 23:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:17 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) 23:59:17 executing program 5: readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)=""/201, 0xc9) mknod(&(0x7f0000000180)='./file1\x00', 0x803, 0x0) clone(0x1ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_ima(&(0x7f0000000100)='\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0xe, "db58917a52cb8e61250d57"}, 0xd, 0x2) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000200), &(0x7f00000002c0)=0x4) 23:59:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) 23:59:17 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000006, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000000)) 23:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:17 executing program 0: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000ff0ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f0000003600)}, 0x0) 23:59:17 executing program 5: readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)=""/201, 0xc9) mknod(&(0x7f0000000180)='./file1\x00', 0x803, 0x0) clone(0x1ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_ima(&(0x7f0000000100)='\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0xe, "db58917a52cb8e61250d57"}, 0xd, 0x2) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000200), &(0x7f00000002c0)=0x4) 23:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:17 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000280), 0x1}, 0x20) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 294.919765] ptrace attach of "/root/syz-executor1"[8694] was attempted by "/root/syz-executor1"[8738] 23:59:18 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0xfffffffffffffffd}}) 23:59:18 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) 23:59:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:18 executing program 3: add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000200)="d1c378ee1e206241a5870178cde6a7f580925d7d4e90d1450eb376c42790d310942e856d919381989fb8c31cd7c2a0908bbe95324d16ae5c56210e16a8f6b074ffe4d16ac4b59f8cb6b0a917816c6a38dadab243426b28b28f0dbb3efcefbacb519f98bb3c891338d6182293a577725eb38acccbefad00e7a06de8db7603befa7161a7eb3e2507c2a174a37c98f63168511b6791b36d7590d9", 0x99, 0xfffffffffffffffd) [ 295.373293] encrypted_key: master key parameter 'bA¥‡xÍæ§õ€’]}NÑE³vÄ'Ó”.…m‘“˜Ÿ¸Ã× ‹¾•2M®\V!¨ö°tÿäÑjĵŸŒ¶°©lj8ÚÚ²CBk(² »>üïºËQŸ˜»<‰8Ö"“¥wr^³ŠÌËï­' is invalid 23:59:18 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) 23:59:18 executing program 0: 23:59:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1b, &(0x7f0000000100), 0x4) [ 295.449951] encrypted_key: master key parameter 'bA¥‡xÍæ§õ€’]}NÑE³vÄ'Ó”.…m‘“˜Ÿ¸Ã× ‹¾•2M®\V!¨ö°tÿäÑjĵŸŒ¶°©lj8ÚÚ²CBk(² »>üïºËQŸ˜»<‰8Ö"“¥wr^³ŠÌËï­' is invalid 23:59:18 executing program 1: 23:59:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:18 executing program 0: 23:59:18 executing program 3: clone(0x2102001fbc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=[{0x4}, {}, {}]}, 0x108) 23:59:19 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='projid_map\x00') clone(0x13102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fcca"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) time(&(0x7f0000000180)) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000380)={{0x2, 0x4e21, @local}, {0x6, @remote}, 0x20, {0x2, 0x4e22}, 'ipddp0\x00'}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000200)) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getgroups(0x3, &(0x7f0000000240)=[0xee01, 0x0, 0xee01]) setresgid(r4, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000600)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty=0x500000000000000}, 0x6) r5 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r5, 0x0, 0x0) [ 295.929233] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 23:59:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:19 executing program 5: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bdev\x00', 0x0, 0x0) [ 296.005762] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 23:59:19 executing program 3: 23:59:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:19 executing program 0: 23:59:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:19 executing program 3: 23:59:19 executing program 0: 23:59:19 executing program 5: 23:59:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:21 executing program 1: 23:59:21 executing program 0: 23:59:21 executing program 3: 23:59:21 executing program 5: 23:59:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:21 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:21 executing program 5: 23:59:21 executing program 1: 23:59:21 executing program 3: 23:59:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:21 executing program 0: 23:59:21 executing program 5: 23:59:21 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:21 executing program 3: 23:59:22 executing program 5: 23:59:22 executing program 1: 23:59:22 executing program 3: 23:59:22 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:22 executing program 5: 23:59:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:22 executing program 3: 23:59:22 executing program 0: 23:59:22 executing program 1: 23:59:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:22 executing program 5: 23:59:22 executing program 0: 23:59:22 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:22 executing program 3: 23:59:23 executing program 5: 23:59:23 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:23 executing program 1: 23:59:23 executing program 0: 23:59:23 executing program 3: 23:59:23 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:23 executing program 1: 23:59:23 executing program 5: 23:59:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:23 executing program 0: 23:59:23 executing program 3: 23:59:23 executing program 5: 23:59:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:23 executing program 1: 23:59:24 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:24 executing program 0: 23:59:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="92a0a7a6c98c0100000400000000000000000065750ede825e45a90f3d09876e700cd4de91a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf620900edbb78b7559414d055deb4357df02d2eed24a7c27189c3003b2cbdae69c72000000000000000710e13"], 0x7e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000180)={0x2}) 23:59:24 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000002}) write$input_event(r0, &(0x7f0000000080)={{}, 0x15}, 0x18) fallocate(r0, 0x20, 0x0, 0x100000000) 23:59:24 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 23:59:24 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:24 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80000000006, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0285628, &(0x7f00000000c0)={0x0, @reserved}) 23:59:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:24 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) creat(&(0x7f00000000c0)='./file1\x00', 0x0) fsync(0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 23:59:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @random="1d5a57644a20"}, 0x0, {}, 'syz_tun\x00'}) 23:59:24 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0xfffffffffffffffd}}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) 23:59:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x4}, 0x8, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000001bff4)) r4 = gettid() rt_sigprocmask(0x0, &(0x7f0000057ff8)={0xfffffffffffffffe}, 0x0, 0x8) r5 = socket$inet(0x2, 0x1, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f0000000280), 0xfffffffffffffc29, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$sock_int(r5, 0x1, 0x7, &(0x7f00000001c0)=0x3, 0x3) r6 = memfd_create(&(0x7f0000000640)='\x00', 0x1) ioctl$BLKROGET(r6, 0x125e, &(0x7f0000000600)) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4, 0x0) mq_timedreceive(r7, &(0x7f0000000780)=""/134, 0x86, 0x400, &(0x7f0000000040)) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f0000000680)={0x7, 0x8}) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280), &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000840)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000008c0), &(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(r4, 0x6, &(0x7f00000002c0)=0x20) getitimer(0x0, &(0x7f0000000480)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=""/8, &(0x7f0000000340)=0x8) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f0000000440)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20002000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) getsockopt$inet6_udp_int(r7, 0x11, 0x67, &(0x7f00000000c0), &(0x7f00000005c0)=0x4) r8 = syz_open_procfs(r4, &(0x7f0000000740)='net/tcp\x00') sendfile(r5, r8, &(0x7f0000000580), 0x80000003) 23:59:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x18000, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0xa24, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000280)={0x0, 0x100000001}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) r4 = getegid() getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f00000007c0)={0x340, 0x0, 0x6, [{{0x6, 0x2, 0x0, 0x7, 0x7fffffff, 0x4, {0x0, 0x7fff, 0x6, 0xd01e, 0x42, 0xfff, 0x80000001, 0x6, 0x200000000000000, 0x960, 0x3, r2, r3}}, {0x3, 0x6, 0xc, 0xfffffffffffffffb, '/dev/rfkill\x00'}}, {{0x1, 0x1, 0xea3, 0x0, 0x5, 0x0, {0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0x9, 0x0, 0x696, 0x200, 0x6, 0x0, r4, 0x4, 0x400}}, {0x0, 0x3714, 0xc, 0x7fffffff, '/dev/rfkill\x00'}}, {{0x0, 0x2, 0x5699dad3, 0x3c, 0x1, 0x1ff, {0x6, 0x6bbd, 0x7, 0x6, 0xc9d, 0x9, 0x27c, 0x9, 0x4, 0xab, 0x0, r5, 0x0, 0x6, 0x9}}, {0x2, 0x7, 0x7, 0x0, '$eth1&^'}}, {{0x3, 0x1, 0xffffffffffffffff, 0x9, 0x5, 0x7fffffff, {0x6, 0x9, 0x6, 0x6, 0x0, 0x6, 0x3, 0x5, 0x6, 0x5, 0x9, 0x0, r6, 0x8, 0x5}}, {0x3, 0x6, 0x1, 0x1ff, "a9"}}, {{0x0, 0x1, 0x2, 0xee2, 0x3, 0x81, {0x1, 0x5c, 0x7, 0x800, 0x101, 0x0, 0x10000, 0x5, 0x5, 0x9, 0x8, r7, r8, 0x3f, 0xfffffffffffffff8}}, {0x6, 0xa7d6, 0x5, 0x400, 'wlan0'}}]}, 0x340) 23:59:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x12, 0x0, 0x706000, 0x0, 0x2}}) 23:59:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:25 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:25 executing program 5: clone(0x13102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000006080), 0x0, 0x0, &(0x7f0000006340)) creat(&(0x7f0000000280)='./file0\x00', 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) 23:59:25 executing program 3: mlockall(0x5) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f00000005c0)=""/163) munlockall() accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000180)=0x1c) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000380)=""/85, &(0x7f0000000240)=0x55) 23:59:25 executing program 0: 23:59:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:26 executing program 1: 23:59:26 executing program 5: 23:59:26 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:26 executing program 3: 23:59:26 executing program 0: 23:59:26 executing program 5: 23:59:26 executing program 1: 23:59:26 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:26 executing program 3: 23:59:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:26 executing program 0: 23:59:26 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:26 executing program 5: 23:59:27 executing program 3: 23:59:27 executing program 1: 23:59:27 executing program 0: 23:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:27 executing program 5: 23:59:27 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:27 executing program 3: 23:59:27 executing program 1: 23:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:27 executing program 0: 23:59:27 executing program 5: 23:59:27 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:27 executing program 1: 23:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:28 executing program 0: 23:59:28 executing program 3: 23:59:28 executing program 5: 23:59:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:28 executing program 1: 23:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:28 executing program 3: 23:59:28 executing program 0: 23:59:28 executing program 4: 23:59:28 executing program 5: 23:59:28 executing program 1: 23:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:28 executing program 3: 23:59:29 executing program 4: 23:59:29 executing program 0: setxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000500)) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000800)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 23:59:29 executing program 5: setxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 23:59:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x0, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:29 executing program 3: setxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 23:59:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 306.250571] ptrace attach of "/root/syz-executor0"[6474] was attempted by "/root/syz-executor0"[9113] [ 306.325130] ptrace attach of "/root/syz-executor5"[7869] was attempted by "/root/syz-executor5"[9115] [ 306.339288] ptrace attach of "/root/syz-executor0"[6474] was attempted by "/root/syz-executor0"[9120] 23:59:29 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x8000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) [ 306.405276] ptrace attach of "/root/syz-executor5"[7869] was attempted by "/root/syz-executor5"[9127] [ 306.414518] ptrace attach of "/root/syz-executor3"[6832] was attempted by "/root/syz-executor3"[9124] [ 306.486193] ptrace attach of "/root/syz-executor3"[6832] was attempted by "/root/syz-executor3"[9131] 23:59:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) pwrite64(r0, &(0x7f0000000280)="80", 0x1, 0x0) 23:59:29 executing program 5: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x4000000003, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1802000016ea14d400ec6461820000", @ANYRES32=0x0], 0x2}}, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)="24000000220007031dfffd946f610500020000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 306.587632] ptrace attach of "/root/syz-executor4"[7096] was attempted by "/root/syz-executor4"[9135] [ 306.663372] ptrace attach of "/root/syz-executor4"[7096] was attempted by "/root/syz-executor4"[9135] 23:59:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) 23:59:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x0, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) [ 306.767398] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 23:59:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xec, 0x0, {"ce2a822bfcbe1f19ef61d2f5002d79a742db579fcd83bf3ceb2bf665fc80d4d48123fbbf472affbe53497314abfc247349591f3de7962a93309ae6c20827e86746904e970b8d8ae8887af54c49f180ff884e9a10620f29d82c88248a9819122e0332d7cf22fea8c0f73fc96b08bd96279316c842a3126f4c9a82da63cfa0633599446269bbb67953b75d2cc7c178d1bcb46df32b0c32aa561d727e526b2141a7d33f02d488ba620b150ef044f9dfd470e73d43507d3bcf75c29b344c6af33334f8046244b6f1503b7e9f718aee60cc3fe4257b2a"}}, {0x0, "1e49a7fd4bb6f1d9e175968e23b39bba9a5d810329a57e7b6f1310e8e7ba691750339778cd4679ea4cfc615d42987f5f12044287f34399909c31e33cf29226fe2ae3f3d29396e2833c2ec0ed13762291d94aeae3232417f1b8e2d944517ea4180d6512687ca2f1b8318fc36eacbe64206513f035b6f618c2e454ebf8cc43c0d3d857ecd700a67a7ca2b3b59cd6b9ab987e68fc3ee34c18ad88ff00654f4401793a6873aaeef8cc00ed9b114cf1bd9354637c1da3eb507c0338a3314b400c84bb8c0c94959c9b72e675b4548dd91e6418886c145b9a73ae60c50984f6551ec1b17bd8b5"}}, 0x0, 0x1d1, 0x0, 0x1}, 0x20) 23:59:30 executing program 4: socketpair$inet(0x2, 0xf, 0x100000001, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000740)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getpid() gettid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioprio_get$pid(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xfffffffffffffffc, &(0x7f0000000180)) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000680)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x5, 0x9, &(0x7f0000003f00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003f80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000004080)={&(0x7f0000003f40)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000004040)={&(0x7f0000003fc0)={0x48, r3, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x40000) prctl$intptr(0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x3f}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000840)) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffc) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2dd) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000880)=ANY=[]) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000006c0), &(0x7f0000000700)=0x4) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 23:59:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000001140)='/dev/video#\x00', 0x5, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x4048}], 0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 23:59:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000300)="0a5c2d0240316285717070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0xeb, &(0x7f0000000040)="2104f2afb3b155d16e77f677b9e4", &(0x7f0000000140)=""/235, 0xeffe}, 0x28) 23:59:30 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000880)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000440)) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) [ 307.404397] relay: one or more items not logged [item size (56) > sub-buffer size (9)] [ 307.418137] ptrace attach of "/root/syz-executor3"[6832] was attempted by "/root/syz-executor3"[9175] [ 307.437514] ptrace attach of "/root/syz-executor3"[6832] was attempted by "/root/syz-executor3"[9177] 23:59:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)) 23:59:30 executing program 3: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/16, &(0x7f0000000200)=0x10) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x3) open(&(0x7f00000002c0)='./bus/file0\x00', 0x80, 0x8) lstat(&(0x7f0000000380)='./bus/file0\x00', &(0x7f0000000300)) renameat2(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cdd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) [ 307.662861] relay: one or more items not logged [item size (56) > sub-buffer size (9)] [ 307.740270] audit: type=1326 audit(1541980770.789:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9182 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 23:59:31 executing program 4: socketpair$inet(0x2, 0xf, 0x100000001, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000740)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getpid() gettid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioprio_get$pid(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xfffffffffffffffc, &(0x7f0000000180)) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000680)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x5, 0x9, &(0x7f0000003f00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003f80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000004080)={&(0x7f0000003f40)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000004040)={&(0x7f0000003fc0)={0x48, r3, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x40000) prctl$intptr(0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x3f}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000840)) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffc) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2dd) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000880)=ANY=[]) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000006c0), &(0x7f0000000700)=0x4) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 23:59:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl(r0, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="24000000220007031dfffd946f610500000000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 308.260233] relay: one or more items not logged [item size (56) > sub-buffer size (9)] 23:59:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0d00000000000000000000000000100002"]}) [ 308.418532] audit: type=1326 audit(1541980771.469:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9182 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 308.740659] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 308.795493] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 23:59:32 executing program 1: 23:59:32 executing program 5: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x0, 0xfff, 0x5}) socket$inet6(0xa, 0x0, 0x0) getgid() fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ftruncate(0xffffffffffffffff, 0x208200) lstat(&(0x7f0000000380)='./bus/file0\x00', &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cdd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 23:59:32 executing program 0: 23:59:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x0, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:32 executing program 3: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="95"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) 23:59:32 executing program 4: r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x46) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 23:59:32 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) clock_gettime(0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000880)={r7, @in6={{0xa, 0x4e22, 0xfffffffffffffff7, @mcast1, 0x3f}}}, &(0x7f0000000640)=0x84) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) socket$netlink(0x10, 0x3, 0x7) 23:59:32 executing program 1: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x0, 0xfff, 0x5}) socket$inet6(0xa, 0x6, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000140)=""/16, &(0x7f0000000200)=0x10) getgid() r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r1 = open(&(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x8) lstat(&(0x7f0000000380)='./bus/file0\x00', &(0x7f0000000300)) renameat2(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cdd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000500)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x1, 0x0, 0x10000101) 23:59:32 executing program 4: 23:59:32 executing program 3: 23:59:33 executing program 5: 23:59:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:33 executing program 3: 23:59:33 executing program 4: 23:59:33 executing program 5: 23:59:33 executing program 4: 23:59:33 executing program 3: 23:59:34 executing program 5: 23:59:34 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) clock_gettime(0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000880)={r7, @in6={{0xa, 0x4e22, 0xfffffffffffffff7, @mcast1, 0x3f}}}, &(0x7f0000000640)=0x84) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) socket$netlink(0x10, 0x3, 0x7) 23:59:34 executing program 4: 23:59:34 executing program 1: 23:59:34 executing program 3: 23:59:34 executing program 5: 23:59:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:34 executing program 3: 23:59:34 executing program 4: 23:59:34 executing program 1: 23:59:35 executing program 5: 23:59:35 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) clock_gettime(0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000880)={r7, @in6={{0xa, 0x4e22, 0xfffffffffffffff7, @mcast1, 0x3f}}}, &(0x7f0000000640)=0x84) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) socket$netlink(0x10, 0x3, 0x7) 23:59:35 executing program 3: 23:59:35 executing program 1: 23:59:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:35 executing program 4: 23:59:35 executing program 5: 23:59:35 executing program 1: 23:59:35 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) clock_gettime(0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000880)={r7, @in6={{0xa, 0x4e22, 0xfffffffffffffff7, @mcast1, 0x3f}}}, &(0x7f0000000640)=0x84) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) socket$netlink(0x10, 0x3, 0x7) 23:59:35 executing program 3: 23:59:36 executing program 5: 23:59:36 executing program 4: 23:59:36 executing program 1: 23:59:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:36 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) clock_gettime(0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000880)={r7, @in6={{0xa, 0x4e22, 0xfffffffffffffff7, @mcast1, 0x3f}}}, &(0x7f0000000640)=0x84) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) 23:59:36 executing program 5: 23:59:36 executing program 3: 23:59:36 executing program 4: 23:59:36 executing program 1: 23:59:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:36 executing program 5: setxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000a00)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x1, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 23:59:36 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) clock_gettime(0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000880)={r7, @in6={{0xa, 0x4e22, 0xfffffffffffffff7, @mcast1, 0x3f}}}, &(0x7f0000000640)=0x84) 23:59:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0xa24, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000280)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f00000007c0)={0xb0, 0x0, 0x0, [{{0x0, 0x1, 0xffffffffffffffff, 0x0, 0x5, 0x0, {0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x5, 0x9}}, {0x0, 0x0, 0x1, 0x0, "a9"}}]}, 0xb0) 23:59:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f0000004900)=@v2={0x7, 0x1, 0x2, 0x8000, 0xffe, "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"}, 0x1008, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000080)=""/34, 0x22}, {&(0x7f0000000580)=""/157, 0x9d}, {&(0x7f00000001c0)=""/91, 0x5b}], 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x1010022, &(0x7f0000000d80)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r2 = socket(0x1e, 0x1, 0x0) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f0000003600)=[{0xb0, 0x0, 0x4, "b2f0110c6330b3dcd60521c4745aee1cae39a6eed1904c028ef8682e6ed618d8c27d05c3814c6660cf6c093696b76ebe3a1a5a2be65b6a964bb2464adbba18210e40ab1c26b38e91818b4618e42fe5ab36a2053d9982efa837df3a89fcba71e2da0e9088fa4e1b72a4b9eb2fdc500e2fab5fed2dffe31a29b611dc56130dd3881ae0b841c5f7751ff7bf4cb8e4cd9b53380f062bda7bdbde35b59e9bb5a5"}], 0xb0}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000000a80)=""/143, 0x8f}, {&(0x7f0000002600)=""/4096, 0x1000}], 0x5, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000240)="e3", &(0x7f00000006c0)=""/163}, 0x18) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 23:59:36 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000006, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x2000000}) [ 314.181464] ptrace attach of "/root/syz-executor5"[7869] was attempted by "/root/syz-executor5"[9359] 23:59:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) [ 314.385555] ptrace attach of "/root/syz-executor5"[7869] was attempted by "/root/syz-executor5"[9366] 23:59:37 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xfffffffffffffffd}}) 23:59:37 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xc002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x401) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000180)="0f08baf80c66b874cab18366efbafc0c66edba430066edba200066eddf2d66b9ad03000066b8786d000066ba000000000f3066b80d0000000f23c00f21f8663503000c000f23f80f212f0fe15c000f00920800", 0x53}], 0x1, 0x44, &(0x7f0000000240)=[@cstype0={0x4, 0xc}], 0x1) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f0000000280)="66baf80cb87c1ebb87ef66bafc0ced26666962ae06b6660f07b90c030000b89791efc9ba000000000f30f3e01d0f308fc9a89688000000000f01cb0f009f319f000066baf80cb8543cf589ef66bafc0ced", 0x51}], 0x1, 0x8, &(0x7f0000000340)=[@cr4={0x1, 0x140042}], 0x1) r3 = add_key(&(0x7f0000000380)='cifs.idmap\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="594d3eb915c09cdf5723", 0xa, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r3, &(0x7f0000000440)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', "", 0x20, 0x4, 0x20, [0x37, 0x62, 0x37]}, 0x30, r4) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000500)) r5 = fcntl$getown(r0, 0x9) write$cgroup_pid(r0, &(0x7f0000000540)=r5, 0x12) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000580)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000840)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x134, r6, 0x700, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffff14}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffb}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x25e}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1b}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x2400c014}, 0x20000000) keyctl$dh_compute(0x17, &(0x7f0000000880)={r3, r3, r3}, &(0x7f00000008c0)=""/134, 0x86, &(0x7f0000000a00)={&(0x7f0000000980)={'wp512-generic\x00'}, &(0x7f00000009c0)="0615999126b2b2d247c26ab426ed5041e8f07da8d48c99e3b08f76b13b627aa98764b65cb4717b6a935a3946f91c7a5576faef9e62af636a7a4d", 0x3a}) fchdir(r2) write$P9_RLOCK(r1, &(0x7f0000000a40)={0x8, 0x35, 0x1, 0x2}, 0x8) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000a80)=0x8) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000ac0)=0x7) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000b00)) write$cgroup_int(r1, &(0x7f0000000b40)=0x5, 0x12) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000b80)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000bc0)={r7, 0x80000, r0}) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000c00)={0x0, 0xffffffffffffff9f, 0x7, 0x49}, &(0x7f0000000c40)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000c80)={r8, 0xffff, 0x4}, &(0x7f0000000cc0)=0x8) ioctl$RTC_UIE_OFF(r1, 0x7004) 23:59:37 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) clock_gettime(0x0, &(0x7f0000000200)) 23:59:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:38 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000680)={'bridge_slave_1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000f9ffffff0000000011f8ffff090000000000000005c0ba9d2ab0b7e529a72ad727000000000000cb66abbe0000003c00"]}) 23:59:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000000100), 0x4) 23:59:38 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) 23:59:38 executing program 4 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000140)='dns_resolver\x00', 0x0) 23:59:38 executing program 3: r0 = socket(0x18, 0x0, 0x1) io_setup(0x6, &(0x7f00000001c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080), 0x121}]) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x260100) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x8000, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x800) io_submit(r1, 0x4, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0xf, 0x1, r0, &(0x7f0000000100)="795d4ade3e71c1cf192bcbae1df1d09ec7c582096ccd826bf3a3c9de5ac3b977573ad30a6feb1cc4ed7c9adec1b25eb46e9bfef2e27a1d91a079d4a59c4a73fc1ef8be32c1b9933d1a13df68ee43297c7a04011669126e541d9b8b32b04f9588fce666025cf1e0eed9acbf701ab5854a5475ff897586826763d9df1fc8518387f609", 0x82, 0x100000001, 0x0, 0x2, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0xf7c9, r3, &(0x7f0000000240)="dee57c8c43228c205f6ed6461a3138cc16776d52ff65461bbb0671bf03e242d3326626175753574993aa71363dfa5dc0075ce0d9ab", 0x35, 0xfffffffffffff801, 0x0, 0x2, r4}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xf, 0x9, r0, &(0x7f0000000300)="efa283a53394e17812537027905d7159af6402b5971b8a57e2b3db55f0fcde398f5c4202aa595dad95c814242a7e98b40c1103bd74aa5828d2e2fa3f4eab9dd502c01aaef9", 0x45, 0x6, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f00000003c0)="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", 0xfa, 0x0, 0x0, 0x0, r5}]) [ 315.788725] FAULT_INJECTION: forcing a failure. [ 315.788725] name failslab, interval 1, probability 0, space 0, times 1 [ 315.800337] CPU: 1 PID: 9400 Comm: syz-executor4 Not tainted 4.19.0+ #82 [ 315.807229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.816636] Call Trace: [ 315.819253] ================================================================== [ 315.826637] BUG: KMSAN: uninit-value in show_trace_log_lvl+0x53f/0x11e0 [ 315.833404] CPU: 1 PID: 9400 Comm: syz-executor4 Not tainted 4.19.0+ #82 [ 315.840253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.849613] Call Trace: [ 315.852228] dump_stack+0x419/0x480 [ 315.855875] ? show_trace_log_lvl+0x53f/0x11e0 [ 315.860482] kmsan_report+0x19f/0x300 [ 315.864309] __msan_warning+0x76/0xd0 [ 315.868143] ? stack_type_name+0x14/0xe0 [ 315.872225] show_trace_log_lvl+0x53f/0x11e0 [ 315.876675] ? dump_stack+0x32d/0x480 [ 315.880499] show_stack+0x12e/0x170 [ 315.884149] dump_stack+0x32d/0x480 23:59:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f0000004900)=@v2={0x7, 0x1, 0x2, 0x8000, 0xffe, "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"}, 0x1008, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000080)=""/34, 0x22}, {&(0x7f0000000580)=""/157, 0x9d}, {&(0x7f00000001c0)=""/91, 0x5b}], 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x1010022, &(0x7f0000000d80)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r2 = socket(0x1e, 0x1, 0x0) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f0000003600)=[{0xb0, 0x0, 0x4, "b2f0110c6330b3dcd60521c4745aee1cae39a6eed1904c028ef8682e6ed618d8c27d05c3814c6660cf6c093696b76ebe3a1a5a2be65b6a964bb2464adbba18210e40ab1c26b38e91818b4618e42fe5ab36a2053d9982efa837df3a89fcba71e2da0e9088fa4e1b72a4b9eb2fdc500e2fab5fed2dffe31a29b611dc56130dd3881ae0b841c5f7751ff7bf4cb8e4cd9b53380f062bda7bdbde35b59e9bb5a5"}], 0xb0}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000000a80)=""/143, 0x8f}, {&(0x7f0000002600)=""/4096, 0x1000}], 0x5, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000240)="e3", &(0x7f00000006c0)=""/163}, 0x18) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 315.887801] should_fail+0x11e5/0x13c0 [ 315.891720] __should_failslab+0x278/0x2a0 [ 315.895982] should_failslab+0x29/0x70 [ 315.899894] __kmalloc_track_caller+0x209/0xf30 [ 315.904582] ? __se_sys_request_key+0x21f/0x7c0 [ 315.909270] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 315.914670] strndup_user+0x154/0x350 [ 315.918492] __se_sys_request_key+0x21f/0x7c0 [ 315.923982] ? __msan_get_context_state+0x9/0x30 [ 315.928756] __x64_sys_request_key+0x56/0x70 [ 315.933182] do_syscall_64+0xcf/0x110 23:59:39 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x1d, r1}, 0x10, &(0x7f0000000e00)={&(0x7f0000000d80)={0x6, 0x8, 0x200, {0x0, 0x7530}, {0x0, 0x2710}, {0x3, 0x10000, 0x3ff, 0x100000001}, 0x1, @canfd={{0x0, 0x7, 0x2, 0x59b}, 0x18, 0x2, 0x0, 0x0, "c9767677f2d29ee95785e72da6782c91447d4a8408194e13551faa48110d459671ccbf8aa82abcc69b9fe102ac3a26bd278263c6ad10d93e7fd064bca7eadfd4"}}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0xb667, 0x9, 0xffffffffffff069c]}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) bind$inet(r3, &(0x7f0000000980)={0x2, 0x1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) sendmmsg(r4, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000500)=@abs={0x1}, 0x6e) r6 = accept(r4, 0x0, &(0x7f00000003c0)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000700)={r7, 0x40}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) [ 315.937003] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.942205] RIP: 0033:0x457569 [ 315.945409] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.964322] RSP: 002b:00007ff338a69c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 315.972052] RAX: ffffffffffffffda RBX: 00007ff338a69c90 RCX: 0000000000457569 [ 315.979331] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 0000000020000100 23:59:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1b, &(0x7f0000000100), 0x4) [ 315.986616] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 315.993907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff338a6a6d4 [ 316.001186] R13: 00000000004c3597 R14: 00000000004d5580 R15: 0000000000000005 [ 316.008473] [ 316.010116] Local variable description: ----state@show_trace_log_lvl [ 316.016606] Variable was created at: [ 316.020338] show_trace_log_lvl+0xb3/0x11e0 [ 316.024672] show_stack+0x12e/0x170 [ 316.028301] ================================================================== [ 316.035665] Disabling lock debugging due to kernel taint [ 316.041128] Kernel panic - not syncing: panic_on_warn set ... [ 316.041128] [ 316.048516] CPU: 1 PID: 9400 Comm: syz-executor4 Tainted: G B 4.19.0+ #82 [ 316.056753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.066125] Call Trace: [ 316.068729] dump_stack+0x419/0x480 [ 316.072378] panic+0x57e/0xb28 [ 316.075617] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 316.081098] kmsan_report+0x300/0x300 [ 316.084937] __msan_warning+0x76/0xd0 [ 316.088772] ? stack_type_name+0x14/0xe0 [ 316.092878] show_trace_log_lvl+0x53f/0x11e0 [ 316.097331] ? dump_stack+0x32d/0x480 [ 316.101158] show_stack+0x12e/0x170 [ 316.104803] dump_stack+0x32d/0x480 [ 316.108463] should_fail+0x11e5/0x13c0 [ 316.112384] __should_failslab+0x278/0x2a0 [ 316.116667] should_failslab+0x29/0x70 [ 316.120601] __kmalloc_track_caller+0x209/0xf30 [ 316.125302] ? __se_sys_request_key+0x21f/0x7c0 [ 316.129992] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 316.135388] strndup_user+0x154/0x350 [ 316.139215] __se_sys_request_key+0x21f/0x7c0 [ 316.143745] ? __msan_get_context_state+0x9/0x30 [ 316.148520] __x64_sys_request_key+0x56/0x70 [ 316.152948] do_syscall_64+0xcf/0x110 [ 316.156770] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.161969] RIP: 0033:0x457569 [ 316.165169] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.187911] RSP: 002b:00007ff338a69c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 316.195634] RAX: ffffffffffffffda RBX: 00007ff338a69c90 RCX: 0000000000457569 [ 316.202911] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 0000000020000100 [ 316.210184] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 316.217456] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff338a6a6d4 [ 316.224735] R13: 00000000004c3597 R14: 00000000004d5580 R15: 0000000000000005 [ 316.233223] Kernel Offset: disabled [ 316.236848] Rebooting in 86400 seconds..