[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.478024] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.075961] random: sshd: uninitialized urandom read (32 bytes read) [ 28.531299] random: sshd: uninitialized urandom read (32 bytes read) [ 29.277019] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.46' (ECDSA) to the list of known hosts. [ 34.999071] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/08 04:58:21 fuzzer started [ 36.345097] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/08 04:58:24 dialing manager at 10.128.0.26:46447 2018/09/08 04:58:24 syscalls: 1 2018/09/08 04:58:24 code coverage: enabled 2018/09/08 04:58:24 comparison tracing: enabled 2018/09/08 04:58:24 setuid sandbox: enabled 2018/09/08 04:58:24 namespace sandbox: enabled 2018/09/08 04:58:24 fault injection: enabled 2018/09/08 04:58:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/08 04:58:24 net packed injection: enabled 2018/09/08 04:58:24 net device setup: enabled [ 38.879303] random: crng init done 05:00:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)={0xfffffffffffffffd, 0x8000}) 05:00:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth0_to_bond\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x2fe, "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"}, &(0x7f0000000000)=0x306) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001680), 0x10) 05:00:03 executing program 7: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x0, 0x1}}, 0x14) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1800, 0x4004400}) 05:00:03 executing program 4: r0 = memfd_create(&(0x7f00000000c0)="b842d1740000000000000000", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000041f74)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000e50)=[{0x9, 0x0, 0x0, 0x0, @tick=0x5da36b38, {}, {}, @result}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x9a, @time={0x77359400}}) 05:00:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0x4000000000000000}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470080ffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 05:00:03 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r0 = memfd_create(&(0x7f0000000840)="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", 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") fcntl$setstatus(r1, 0x4, 0x4000) sendfile(r0, r1, &(0x7f0000000040), 0x1080000002) 05:00:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) [ 137.067675] IPVS: ftp: loaded support on port[0] = 21 [ 137.286383] IPVS: ftp: loaded support on port[0] = 21 [ 137.379421] IPVS: ftp: loaded support on port[0] = 21 [ 137.406360] IPVS: ftp: loaded support on port[0] = 21 [ 137.424348] IPVS: ftp: loaded support on port[0] = 21 [ 137.469221] IPVS: ftp: loaded support on port[0] = 21 [ 137.474490] IPVS: ftp: loaded support on port[0] = 21 [ 137.527353] IPVS: ftp: loaded support on port[0] = 21 [ 139.971972] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.994010] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.031241] device bridge_slave_0 entered promiscuous mode [ 140.170256] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.178646] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.186103] device bridge_slave_1 entered promiscuous mode [ 140.306720] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.343602] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.358254] device bridge_slave_0 entered promiscuous mode [ 140.389668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 140.400092] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.406469] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.430794] device bridge_slave_0 entered promiscuous mode [ 140.477220] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.498000] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.505542] device bridge_slave_0 entered promiscuous mode [ 140.537241] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.546386] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.560919] device bridge_slave_1 entered promiscuous mode [ 140.587272] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.599935] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.607414] device bridge_slave_0 entered promiscuous mode [ 140.631421] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.640258] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.647630] device bridge_slave_1 entered promiscuous mode [ 140.658809] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.665175] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.675235] device bridge_slave_0 entered promiscuous mode [ 140.683809] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 140.713873] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.734543] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.749029] device bridge_slave_0 entered promiscuous mode [ 140.768529] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.774916] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.800684] device bridge_slave_1 entered promiscuous mode [ 140.809478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 140.818357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 140.857394] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.868319] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.887871] device bridge_slave_1 entered promiscuous mode [ 140.914839] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.937838] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.945316] device bridge_slave_1 entered promiscuous mode [ 140.959955] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.966348] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.976148] device bridge_slave_1 entered promiscuous mode [ 140.985242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 141.000133] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.012226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.022224] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.043248] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.069095] device bridge_slave_0 entered promiscuous mode [ 141.096033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 141.108309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 141.126242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.210824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 141.236046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.257893] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.266674] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.298080] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.305513] device bridge_slave_1 entered promiscuous mode [ 141.387872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.420954] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.465044] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 141.520543] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.544304] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.619005] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.640573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.739310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.768420] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.783285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 141.800170] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.837515] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.871802] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.891813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.911102] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.934268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 141.950408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 141.959872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 141.968627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.976485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 141.996030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.009030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.020518] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.070798] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.110724] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.191495] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.236422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 142.249827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 142.268615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.284849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.348822] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.372725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 142.380129] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 142.391600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 142.399291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.407189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.446746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.542282] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 142.569104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 142.586316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 142.594486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.619865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 142.645986] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.658833] team0: Port device team_slave_0 added [ 142.664448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.680385] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.692216] team0: Port device team_slave_0 added [ 142.748504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 142.777502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.807239] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.836885] team0: Port device team_slave_0 added [ 142.866780] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.898917] team0: Port device team_slave_1 added [ 142.905876] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.918517] team0: Port device team_slave_1 added [ 142.968029] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.978952] team0: Port device team_slave_0 added [ 142.986648] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.008530] team0: Port device team_slave_1 added [ 143.018053] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.028839] team0: Port device team_slave_0 added [ 143.036232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.053246] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.078625] team0: Port device team_slave_0 added [ 143.099281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.107448] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.141425] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.154964] team0: Port device team_slave_0 added [ 143.171815] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.193953] team0: Port device team_slave_1 added [ 143.204461] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.228698] team0: Port device team_slave_1 added [ 143.245568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.258778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.280571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.295972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.305389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.322906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.344692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.365413] team0: Port device team_slave_1 added [ 143.374738] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.388727] team0: Port device team_slave_1 added [ 143.394023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.408574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.428235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.436771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.445121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.453142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.464307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.474686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.484733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.501589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.508923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.516872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.548580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.556570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.573701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.586522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.594454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.602121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.612807] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.633173] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.644378] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.670561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.689590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 143.696447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.718799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.745060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.757418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.765614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.774358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.782058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.789813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.797563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.805449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.813440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.826623] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.840050] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.849876] team0: Port device team_slave_0 added [ 143.868298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.877621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 143.908105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.938570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.968128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.979561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.991814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.999577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.007240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.015102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.024961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 144.045064] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.064648] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.082340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.098797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.106374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.153918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.168248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.176190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.187018] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 144.194644] team0: Port device team_slave_1 added [ 144.218001] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.232188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.246860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.258958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.268982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.287240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.306860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.348409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.378416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.417604] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.453482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 144.476975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.496687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.528593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.551045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.561620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.601929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.628832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.660827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 144.669050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.676957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.828308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.835461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.848524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.988715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.995883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.008761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.641751] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.648290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.655212] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.661638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.696843] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 145.739419] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.745820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.752527] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.758926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.824814] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 145.851468] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.857901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.864582] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.871031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.902406] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 146.110618] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.117031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.123754] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.130161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.163749] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 146.258186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.269591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.304608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.334773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.348133] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.354502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.361201] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.367565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.376227] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 146.407420] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.413871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.420607] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.426984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.464264] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 146.475055] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.481482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.488184] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.494561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.506971] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 147.220809] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.227232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.233959] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.240366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.277578] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 147.295054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.312453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.328819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.348290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.480317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.685664] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.848975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.920648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.969087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.087451] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.169544] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.263428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.480985] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.500179] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.517171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.541126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.658415] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.685806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.761310] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.767585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.778942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.868691] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.874875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.899998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.138470] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 154.149277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.164882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.188857] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 154.202393] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 154.235661] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 154.268850] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 154.275121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.284048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.315827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.323596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.360905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 154.384178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.394292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.517175] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.542230] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.765859] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.803760] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 154.819838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.826934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.852262] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 154.865771] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.885971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.910800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.933974] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.113034] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.418383] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.430912] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.183005] hrtimer: interrupt took 28806 ns 05:00:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth0_to_bond\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x2fe, "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"}, &(0x7f0000000000)=0x306) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001680), 0x10) 05:00:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth0_to_bond\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x2fe, "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"}, &(0x7f0000000000)=0x306) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001680), 0x10) [ 158.689781] mmap: syz-executor7 (7367) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 05:00:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth0_to_bond\x00'}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x2fe, "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"}, &(0x7f0000000000)=0x306) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001680), 0x10) 05:00:25 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000180)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) 05:00:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x2e8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) 05:00:25 executing program 7: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:25 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 159.197880] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 05:00:25 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:26 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:26 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000140)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x16, &(0x7f0000000000)=""/22}, &(0x7f0000000040)="65d6cbeba893", &(0x7f0000000080)=""/17, 0x0, 0x0, 0x0, &(0x7f0000000100)}) 05:00:26 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000500)) read(r0, &(0x7f0000000680)=""/143, 0x43) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) tkill(r1, 0x1000000000013) 05:00:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) 05:00:26 executing program 7: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:26 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:26 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r0 = memfd_create(&(0x7f0000000840)="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", 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") fcntl$setstatus(r1, 0x4, 0x4000) sendfile(r0, r1, &(0x7f0000000040), 0x1080000002) 05:00:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0x10, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0x3a0, 0x2, &(0x7f0000000240)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) 05:00:26 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x0, 0x1}}, 0x14) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1800, 0x4004400}) 05:00:26 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:26 executing program 7: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x0, 0x1}}, 0x14) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1800, 0x4004400}) 05:00:26 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 160.386208] syz-executor6 (7484) used greatest stack depth: 14200 bytes left 05:00:27 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0x10, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0x3a0, 0x2, &(0x7f0000000240)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) 05:00:27 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:27 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x3}}, 0x18) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@in6={0xa, 0x4e24, 0x1f, @local, 0x3}, 0x80) keyctl$set_reqkey_keyring(0xe, 0x5) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000280)=""/76}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="0024ade3c90400000054db5f9a1e744acf9bd1aa35bb6818218e5a9202fc664de312ad084000000000"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000280)={@loopback, 0x64, r4}) setsockopt$inet6_int(r3, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a0, &(0x7f00000000c0)={@local={0xfe, 0x80, [0xfeff, 0x3ef, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3d0]}, 0x75, r5}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x500, 0x100000000, 0x1c0270, r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) removexattr(&(0x7f0000000300)='./file0//ile0\x00', &(0x7f0000000340)=@known='security.capability\x00') syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) set_robust_list(&(0x7f0000000540)={&(0x7f0000000480), 0x5, &(0x7f0000000500)={&(0x7f00000004c0)}}, 0xc) mount(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 05:00:27 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0x10, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0x3a0, 0x2, &(0x7f0000000240)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) 05:00:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000004e001f002bf9f407046ba5520000000000000000000000000000000000000000", 0x24) [ 161.094083] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 05:00:27 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0x10, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0x3a0, 0x2, &(0x7f0000000240)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) 05:00:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="71e67a11cdf8311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000880)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e9b", 0x2}], 0x1, &(0x7f0000000040)=[@assoc={0x10, 0x117, 0x4, 0x1}, @op={0x10, 0x117, 0x3, 0x1}], 0x20}], 0x1, 0x0) recvmmsg(r1, &(0x7f000000bb40)=[{{&(0x7f0000007a00)=@hci, 0x80, &(0x7f0000007bc0)=[{&(0x7f0000007ac0)=""/222, 0xde}], 0x1, &(0x7f0000007c00)=""/214, 0xd6}}], 0x1, 0x0, &(0x7f0000000000)) 05:00:27 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0x10, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0x3a0, 0x2, &(0x7f0000000240)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) [ 161.597149] syz-executor6 (7538) used greatest stack depth: 13040 bytes left 05:00:28 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r0 = memfd_create(&(0x7f0000000840)="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", 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") fcntl$setstatus(r1, 0x4, 0x4000) sendfile(r0, r1, &(0x7f0000000040), 0x1080000002) 05:00:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="8a07581ef836", 0x6, r0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="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", 0x110, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) 05:00:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x0, 0x1}}, 0x14) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1800, 0x4004400}) 05:00:28 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/180, 0xffffffffffffffa8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) mlock2(&(0x7f0000a44000/0x3000)=nil, 0x3000, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x5040, 0x0, 0x0, 0x11}}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/if_inet6\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fchmod(0xffffffffffffffff, 0x119) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f00000000c0)=[@rights={0x10, 0x1, 0x1, [r1]}], 0x10}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x62, 0x0) madvise(&(0x7f0000b40000/0x1000)=nil, 0x1000, 0x10200000008) 05:00:28 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0x10, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0x3a0, 0x2, &(0x7f0000000240)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) 05:00:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x18002}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x8, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}]}) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x3, 0x2004) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000003080)=ANY=[@ANYBLOB="140000001a"], 0x1}}, 0x0) keyctl$session_to_parent(0x12) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000600)={0x2, [0x0, 0x0]}, &(0x7f0000000640)=0xc) sendmsg$nl_generic(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)=ANY=[@ANYBLOB="64000000410000429617b16c12fb8c251a000000100303000c008c000500000000000000400030002f65016500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000dc6cbee44d010473b9526db58bf92a4029e3d7"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) 05:00:28 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080), 0x10, &(0x7f0000000380)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f00000002c0), 0x3a0, 0x2, &(0x7f0000000240)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981aeb150d176"}}, 0x48}}, 0x0) 05:00:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x0, 0x1}}, 0x14) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1800, 0x4004400}) 05:00:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="8a07581ef836", 0x6, r0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="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", 0x110, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) 05:00:28 executing program 7: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="8a07581ef836", 0x6, r0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000100000044c249b544230b9387fb8bd6ed266ccf59ee70995bf2e8e2ecd3fff32853747eda22d29be9b36119ec53dc60e2c80b3e9ffa1b81a808ca27e0ec82a1256a8e9a4febf85f2d925493f62113e3575f8c7eba67fc19a9497f5b07e5849d2e875b0687d6401d36616fe0f3c3002801b4621de1632a89525e8e81f750a86eb580fb46c1523b8a25e71690ea52246bd3d32b1a91f944edb74b1f50ae08c5387ed8fd0598b600579f3af3f864e1c324f6928f6672f98f7e149bd61bd78b506e8bd71824cec9a8db26823cdd5259e688752d5491bd542b2ca7d08bdb777695db99f0401294aca81ab60da1a3ba871c128146ac85f3ea40b4ee11", 0x110, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) 05:00:28 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000640)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff84, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 05:00:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x18002}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x8, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}]}) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x3, 0x2004) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000003080)=ANY=[@ANYBLOB="140000001a"], 0x1}}, 0x0) keyctl$session_to_parent(0x12) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000600)={0x2, [0x0, 0x0]}, &(0x7f0000000640)=0xc) sendmsg$nl_generic(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)=ANY=[@ANYBLOB="64000000410000429617b16c12fb8c251a000000100303000c008c000500000000000000400030002f65016500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000dc6cbee44d010473b9526db58bf92a4029e3d7"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) 05:00:28 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f0000000080), &(0x7f00000000c0)=0x10) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 05:00:28 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/180, 0xffffffffffffffa8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) mlock2(&(0x7f0000a44000/0x3000)=nil, 0x3000, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x5040, 0x0, 0x0, 0x11}}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/if_inet6\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fchmod(0xffffffffffffffff, 0x119) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f00000000c0)=[@rights={0x10, 0x1, 0x1, [r1]}], 0x10}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x62, 0x0) madvise(&(0x7f0000b40000/0x1000)=nil, 0x1000, 0x10200000008) 05:00:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="8a07581ef836", 0x6, r0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="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", 0x110, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) 05:00:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x18002}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x8, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}]}) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x3, 0x2004) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000003080)=ANY=[@ANYBLOB="140000001a"], 0x1}}, 0x0) keyctl$session_to_parent(0x12) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000600)={0x2, [0x0, 0x0]}, &(0x7f0000000640)=0xc) sendmsg$nl_generic(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)=ANY=[@ANYBLOB="64000000410000429617b16c12fb8c251a000000100303000c008c000500000000000000400030002f65016500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000dc6cbee44d010473b9526db58bf92a4029e3d7"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) 05:00:29 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r0 = memfd_create(&(0x7f0000000840)="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", 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") fcntl$setstatus(r1, 0x4, 0x4000) sendfile(r0, r1, &(0x7f0000000040), 0x1080000002) 05:00:29 executing program 7: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="8a07581ef836", 0x6, r0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="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", 0x110, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) [ 162.876525] syz-executor6 (7599) used greatest stack depth: 12976 bytes left 05:00:29 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/180, 0xffffffffffffffa8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) mlock2(&(0x7f0000a44000/0x3000)=nil, 0x3000, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x5040, 0x0, 0x0, 0x11}}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/if_inet6\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fchmod(0xffffffffffffffff, 0x119) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f00000000c0)=[@rights={0x10, 0x1, 0x1, [r1]}], 0x10}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x62, 0x0) madvise(&(0x7f0000b40000/0x1000)=nil, 0x1000, 0x10200000008) 05:00:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="8a07581ef836", 0x6, r0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000100000044c249b544230b9387fb8bd6ed266ccf59ee70995bf2e8e2ecd3fff32853747eda22d29be9b36119ec53dc60e2c80b3e9ffa1b81a808ca27e0ec82a1256a8e9a4febf85f2d925493f62113e3575f8c7eba67fc19a9497f5b07e5849d2e875b0687d6401d36616fe0f3c3002801b4621de1632a89525e8e81f750a86eb580fb46c1523b8a25e71690ea52246bd3d32b1a91f944edb74b1f50ae08c5387ed8fd0598b600579f3af3f864e1c324f6928f6672f98f7e149bd61bd78b506e8bd71824cec9a8db26823cdd5259e688752d5491bd542b2ca7d08bdb777695db99f0401294aca81ab60da1a3ba871c128146ac85f3ea40b4ee11", 0x110, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) 05:00:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x18002}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x8, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}]}) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x3, 0x2004) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000003080)=ANY=[@ANYBLOB="140000001a"], 0x1}}, 0x0) keyctl$session_to_parent(0x12) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000600)={0x2, [0x0, 0x0]}, &(0x7f0000000640)=0xc) sendmsg$nl_generic(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)=ANY=[@ANYBLOB="64000000410000429617b16c12fb8c251a000000100303000c008c000500000000000000400030002f65016500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000dc6cbee44d010473b9526db58bf92a4029e3d7"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) 05:00:29 executing program 7: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="8a07581ef836", 0x6, r0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300)='u', 0x1, r1) r4 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="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", 0x110, r2) r5 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r3, r4, r5}, &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) 05:00:29 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/180, 0xffffffffffffffa8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) mlock2(&(0x7f0000a44000/0x3000)=nil, 0x3000, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x5040, 0x0, 0x0, 0x11}}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/if_inet6\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fchmod(0xffffffffffffffff, 0x119) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f00000000c0)=[@rights={0x10, 0x1, 0x1, [r1]}], 0x10}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x62, 0x0) madvise(&(0x7f0000b40000/0x1000)=nil, 0x1000, 0x10200000008) 05:00:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x0, 0x1}}, 0x14) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1800, 0x4004400}) 05:00:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x0, 0x1}}, 0x14) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x1800, 0x4004400}) 05:00:30 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/180, 0xffffffffffffffa8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) mlock2(&(0x7f0000a44000/0x3000)=nil, 0x3000, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x5040, 0x0, 0x0, 0x11}}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/if_inet6\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fchmod(0xffffffffffffffff, 0x119) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f00000000c0)=[@rights={0x10, 0x1, 0x1, [r1]}], 0x10}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x62, 0x0) madvise(&(0x7f0000b40000/0x1000)=nil, 0x1000, 0x10200000008) 05:00:30 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/180, 0xffffffffffffffa8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) mlock2(&(0x7f0000a44000/0x3000)=nil, 0x3000, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x5040, 0x0, 0x0, 0x11}}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/if_inet6\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fchmod(0xffffffffffffffff, 0x119) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f00000000c0)=[@rights={0x10, 0x1, 0x1, [r1]}], 0x10}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x62, 0x0) madvise(&(0x7f0000b40000/0x1000)=nil, 0x1000, 0x10200000008) 05:00:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:00:30 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x1f) 05:00:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:00:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f00000003c0)={0x1, {&(0x7f00000002c0)=""/207, 0xcf, &(0x7f0000000600)=""/50, 0x0, 0x402}}, 0x305) write$vnet(r0, &(0x7f0000a8d000)={0x1, {&(0x7f0000000000)=""/24, 0xffffffc7, &(0x7f0000b4cf9b)=""/101, 0x0, 0x2}}, 0x68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000380)={0x373, &(0x7f0000004fe8)}) write$vnet(r0, &(0x7f000046df98)={0x1, {&(0x7f0000000080)=""/28, 0x34d, &(0x7f0000e9afb7)=""/73, 0x0, 0x3}}, 0x68) 05:00:30 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000001580)='./file0/file0\x00') 05:00:30 executing program 3: prctl$setname(0xf, &(0x7f0000000080)='\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x0, 0x0) 05:00:31 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x1f) 05:00:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000300)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000480)=""/112, 0x70}, {&(0x7f0000000500)=""/126, 0x7e}], 0x2, &(0x7f0000000700)=""/97, 0x61, 0x5}, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) mq_notify(r0, &(0x7f0000000180)={0x0, 0x1d, 0x0, @tid=r1}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000240)={0x0, 0x100000000, 0x39f, 0x3, 0x9, 0x7510, 0x3f, 0x0, 0xfffffffffffffff7, 0x0, 0x7ff, 0x1}) times(&(0x7f0000000000)) accept4(r0, &(0x7f00000000c0)=@ipx, &(0x7f0000000040)=0x80, 0x800) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) 05:00:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 05:00:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:00:31 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000001580)='./file0/file0\x00') 05:00:31 executing program 7: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000440)={0x0, 0x7, 0x101}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e20, 0xbb9, @loopback, 0x891a}}}, &(0x7f0000000580)=0x84) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}, [0x0, 0x8, 0x3, 0x4, 0x0, 0x7, 0xb1, 0x0, 0x0, 0x7, 0x0, 0x4, 0xffffffffffffff01, 0x0, 0x4]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x5}, 0x8) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000005c0), &(0x7f0000000600)=0x4) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x3}, 0x10) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400080, 0x0) 05:00:31 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/180, 0xffffffffffffffa8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) mlock2(&(0x7f0000a44000/0x3000)=nil, 0x3000, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x5040, 0x0, 0x0, 0x11}}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/if_inet6\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fchmod(0xffffffffffffffff, 0x119) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f00000000c0)=[@rights={0x10, 0x1, 0x1, [r1]}], 0x10}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x62, 0x0) madvise(&(0x7f0000b40000/0x1000)=nil, 0x1000, 0x10200000008) 05:00:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000004200)=@ethtool_wolinfo={0x7, 0x0, 0x0, "f80f31bd056f"}}) 05:00:31 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x1f) 05:00:31 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000001580)='./file0/file0\x00') 05:00:31 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x1f) 05:00:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:00:31 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000017c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) 05:00:31 executing program 3: ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000280)=""/105) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = socket(0x11, 0xa, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpeername(r0, &(0x7f0000000080)=@xdp, &(0x7f0000000000)=0x27a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x17, &(0x7f0000000200), &(0x7f0000000300)=0x4) [ 165.053636] input: syz0 as /devices/virtual/input/input5 05:00:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 05:00:31 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) rename(&(0x7f0000000380)='./file0\x00', &(0x7f0000001580)='./file0/file0\x00') 05:00:31 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000017c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) 05:00:31 executing program 7: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000440)={0x0, 0x7, 0x101}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e20, 0xbb9, @loopback, 0x891a}}}, &(0x7f0000000580)=0x84) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}, [0x0, 0x8, 0x3, 0x4, 0x0, 0x7, 0xb1, 0x0, 0x0, 0x7, 0x0, 0x4, 0xffffffffffffff01, 0x0, 0x4]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x5}, 0x8) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000005c0), &(0x7f0000000600)=0x4) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x3}, 0x10) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400080, 0x0) 05:00:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000017c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) [ 165.314128] input: syz0 as /devices/virtual/input/input7 [ 165.395290] input: syz0 as /devices/virtual/input/input8 05:00:32 executing program 6: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, &(0x7f0000003900)={0x77359400}) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)}}, 0x20) preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00'}) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000300)={0x14}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 05:00:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x8) 05:00:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0xb253) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback}, 0x1c) 05:00:32 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xa4}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xa9}, {&(0x7f0000000200)=""/77, 0x5c8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 05:00:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 05:00:32 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000017c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) [ 165.659879] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 05:00:32 executing program 4: socketpair(0x0, 0xb, 0x3b, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x374, 0x7f, 0x48, 0x6, 0x3}, 0x14) r1 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x7fff, 0x0, 0x9, 0x35, 0x0, 0x4, 0xde321f6, 0x6, 0x2, 0x4, 0x1}, 0xb) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000001c0)={0x9, 0x0, 0x10000, 'queue0\x00', 0x39ba}) sendmsg$rds(r1, &(0x7f0000000a40)={&(0x7f0000000300)={0x2, 0xe803000000000900, @dev={0xac, 0x14, 0x14, 0x1a}, [0x0, 0xe00000000000000]}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x34000}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a80)={'filter\x00', 0x7, 0x4, 0x420, 0x228, 0x114, 0x0, 0x33c, 0x33c, 0x33c, 0x4, &(0x7f0000000040), {[{{@arp={@multicast2, @multicast2, 0xffffff00, 0xffffffff, @mac=@dev, {[0x0, 0x0, 0x0, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, 0xffffffff80000001, 0x1, 0x0, 0x10001, 0x20, 0x5, 'ip6tnl0\x00', 'lo\x00', {0xff}, {}, 0x0, 0x80}, 0xf0, 0x114}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0x114}}, {{@arp={@remote, @dev={0xac, 0x14, 0x14, 0x16}, 0xffffffff, 0xffffffff, @mac=@link_local, {[0x0, 0xff, 0x0, 0x0, 0xff, 0x4274b2b02d1a60fb]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x7, 0x9, 0x1, 0x800, 0x1, 0xa8ff, 'veth0_to_bridge\x00', 'tunl0\x00', {}, {0xff}, 0x0, 0x280}, 0xf0, 0x114}, @unspec=@NFQUEUE1={0x24, 'NFQUEUE\x00', 0x1, {0x7fffffff, 0x2}}}, {{@uncond, 0xf0, 0x114}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00', 0x0, {0x1f}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x46c) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x1f, @ipv4={[], [], @broadcast}, 0xfffffffffffffffd}, 0x1c) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000080)={0xdf, 0x0, 0x3, {0x1}}, 0x18) 05:00:32 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000001c0)=@req3={0xe1f, 0x0, 0x3}, 0x9ed27b770768daeb) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 05:00:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000017c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) [ 165.832422] input: syz0 as /devices/virtual/input/input9 05:00:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 166.030502] input: syz0 as /devices/virtual/input/input10 [ 166.070018] ================================================================== [ 166.077567] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 166.083657] Read of size 8 at addr ffff8801ca4c51b0 by task syz-executor2/7828 [ 166.091032] [ 166.092688] CPU: 1 PID: 7828 Comm: syz-executor2 Not tainted 4.19.0-rc2+ #130 [ 166.100130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.109740] Call Trace: [ 166.112359] dump_stack+0x1c4/0x2b4 [ 166.116179] ? dump_stack_print_info.cold.2+0x52/0x52 [ 166.121547] ? printk+0xa7/0xcf [ 166.124855] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 166.129648] print_address_description.cold.8+0x9/0x1ff [ 166.135046] kasan_report.cold.9+0x242/0x309 [ 166.139481] ? sock_i_ino+0x94/0xa0 [ 166.143276] __asan_report_load8_noabort+0x14/0x20 [ 166.148237] sock_i_ino+0x94/0xa0 [ 166.151731] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 166.156424] ? tipc_diag_dump+0x30/0x30 [ 166.160428] ? tipc_getname+0x7f0/0x7f0 [ 166.164530] ? graph_lock+0x170/0x170 [ 166.168359] ? __lock_sock+0x203/0x350 [ 166.172283] ? find_held_lock+0x36/0x1c0 [ 166.176378] ? mark_held_locks+0xc7/0x130 [ 166.180559] ? __local_bh_enable_ip+0x160/0x260 [ 166.185491] ? __local_bh_enable_ip+0x160/0x260 [ 166.190372] ? lockdep_hardirqs_on+0x421/0x5c0 [ 166.195012] ? trace_hardirqs_on+0xbd/0x310 [ 166.199366] ? lock_release+0x970/0x970 [ 166.203468] ? lock_sock_nested+0xe2/0x120 [ 166.207817] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 166.212860] ? skb_put+0x17b/0x1e0 [ 166.216425] ? memset+0x31/0x40 [ 166.219742] ? __nlmsg_put+0x14c/0x1b0 [ 166.223665] __tipc_add_sock_diag+0x233/0x360 [ 166.228286] tipc_nl_sk_walk+0x122/0x1d0 [ 166.232546] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 166.237848] tipc_diag_dump+0x24/0x30 [ 166.241676] netlink_dump+0x519/0xd50 [ 166.245519] ? netlink_broadcast+0x50/0x50 [ 166.250001] __netlink_dump_start+0x4f1/0x6f0 [ 166.254523] ? tipc_data_ready+0x3e0/0x3e0 [ 166.258996] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 166.264349] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 166.269043] ? tipc_data_ready+0x3e0/0x3e0 [ 166.269061] ? tipc_unregister_sysctl+0x20/0x20 [ 166.269074] ? tipc_ioctl+0x3a0/0x3a0 [ 166.269092] ? netlink_deliver_tap+0x355/0xf80 [ 166.269114] sock_diag_rcv_msg+0x31d/0x410 [ 166.269134] netlink_rcv_skb+0x172/0x440 [ 166.269152] ? sock_diag_bind+0x80/0x80 [ 166.269170] ? netlink_ack+0xb80/0xb80 [ 166.269198] sock_diag_rcv+0x2a/0x40 [ 166.290999] netlink_unicast+0x5a5/0x760 [ 166.291024] ? netlink_attachskb+0x9a0/0x9a0 [ 166.291048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.291063] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 166.307174] netlink_sendmsg+0xa18/0xfc0 [ 166.307193] ? move_addr_to_kernel.part.18+0xc6/0x100 [ 166.307218] ? netlink_unicast+0x760/0x760 [ 166.307241] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 166.326740] ? apparmor_socket_sendmsg+0x29/0x30 [ 166.326759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.326774] ? security_socket_sendmsg+0x94/0xc0 [ 166.326790] ? netlink_unicast+0x760/0x760 [ 166.326815] sock_sendmsg+0xd5/0x120 [ 166.360898] ___sys_sendmsg+0x7fd/0x930 [ 166.360918] ? __local_bh_enable_ip+0x160/0x260 [ 166.360940] ? copy_msghdr_from_user+0x580/0x580 [ 166.360991] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 166.361009] ? release_sock+0x1ec/0x2c0 [ 166.361029] ? __fget_light+0x2e9/0x430 [ 166.361043] ? fget_raw+0x20/0x20 [ 166.361062] ? __release_sock+0x3a0/0x3a0 [ 166.361079] ? tipc_nametbl_build_group+0x273/0x360 [ 166.361103] ? tipc_setsockopt+0x726/0xd70 [ 166.361128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.361147] ? sockfd_lookup_light+0xc5/0x160 [ 166.392441] __sys_sendmsg+0x11d/0x280 [ 166.392461] ? __ia32_sys_shutdown+0x80/0x80 [ 166.392490] ? do_fast_syscall_32+0x150/0xfb2 [ 166.392509] ? do_fast_syscall_32+0x150/0xfb2 [ 166.410315] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 166.448388] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 166.448411] do_fast_syscall_32+0x34d/0xfb2 [ 166.448431] ? do_int80_syscall_32+0x890/0x890 [ 166.448450] ? entry_SYSENTER_compat+0x68/0x7f [ 166.448468] ? trace_hardirqs_off_caller+0xbb/0x310 [ 166.448485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 166.448504] ? trace_hardirqs_on_caller+0x310/0x310 [ 166.482391] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 166.487431] ? recalc_sigpending_tsk+0x180/0x180 [ 166.492528] ? kasan_check_write+0x14/0x20 [ 166.496888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 166.501916] entry_SYSENTER_compat+0x70/0x7f [ 166.506373] RIP: 0023:0xf7f0bca9 [ 166.509766] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 166.528871] RSP: 002b:00000000f5f070cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 166.536628] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000020000040 [ 166.543918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 166.551322] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 166.558876] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 166.566254] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 166.573560] [ 166.575210] Allocated by task 7828: [ 166.578863] save_stack+0x43/0xd0 [ 166.582338] kasan_kmalloc+0xc7/0xe0 [ 166.586163] kasan_slab_alloc+0x12/0x20 [ 166.590167] kmem_cache_alloc+0x12e/0x730 [ 166.594429] sock_alloc_inode+0x1d/0x260 [ 166.598513] alloc_inode+0x63/0x190 [ 166.602163] new_inode_pseudo+0x71/0x1a0 [ 166.606421] sock_alloc+0x41/0x270 [ 166.610266] __sock_create+0x175/0x930 [ 166.614178] __sys_socket+0x106/0x260 [ 166.618024] __ia32_sys_socket+0x73/0xb0 [ 166.622254] do_fast_syscall_32+0x34d/0xfb2 [ 166.626731] entry_SYSENTER_compat+0x70/0x7f [ 166.631246] [ 166.632904] Freed by task 7827: [ 166.636290] save_stack+0x43/0xd0 [ 166.639763] __kasan_slab_free+0x102/0x150 [ 166.644034] kasan_slab_free+0xe/0x10 [ 166.648036] kmem_cache_free+0x83/0x290 [ 166.652035] sock_destroy_inode+0x51/0x60 [ 166.656363] destroy_inode+0x159/0x200 [ 166.660271] evict+0x5e0/0x980 [ 166.663487] iput+0x679/0xa90 [ 166.666619] dentry_unlink_inode+0x461/0x5e0 [ 166.671051] __dentry_kill+0x44c/0x7a0 [ 166.675006] dentry_kill+0xc9/0x5a0 [ 166.678951] dput.part.26+0x660/0x790 [ 166.682810] dput+0x15/0x20 [ 166.685945] __fput+0x4cf/0xa30 [ 166.689286] ____fput+0x15/0x20 [ 166.692590] task_work_run+0x1e8/0x2a0 [ 166.696601] exit_to_usermode_loop+0x318/0x380 [ 166.701385] do_fast_syscall_32+0xcd5/0xfb2 [ 166.705734] entry_SYSENTER_compat+0x70/0x7f [ 166.710157] [ 166.711804] The buggy address belongs to the object at ffff8801ca4c5140 [ 166.711804] which belongs to the cache sock_inode_cache(17:syz2) of size 984 [ 166.725721] The buggy address is located 112 bytes inside of [ 166.725721] 984-byte region [ffff8801ca4c5140, ffff8801ca4c5518) [ 166.737700] The buggy address belongs to the page: [ 166.742658] page:ffffea0007293140 count:1 mapcount:0 mapping:ffff8801cb1d9680 index:0xffff8801ca4c5ffd [ 166.752293] flags: 0x2fffc0000000100(slab) [ 166.756554] raw: 02fffc0000000100 ffffea0007293008 ffffea0006dc2648 ffff8801cb1d9680 [ 166.764822] raw: ffff8801ca4c5ffd ffff8801ca4c5140 0000000100000003 ffff8801c56b6ac0 [ 166.772844] page dumped because: kasan: bad access detected [ 166.778730] page->mem_cgroup:ffff8801c56b6ac0 [ 166.783237] [ 166.784876] Memory state around the buggy address: [ 166.789846] ffff8801ca4c5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 166.797435] ffff8801ca4c5100: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 166.804814] >ffff8801ca4c5180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 166.812197] ^ [ 166.817145] ffff8801ca4c5200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 166.824525] ffff8801ca4c5280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 05:00:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0xb253) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback}, 0x1c) 05:00:33 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 166.831898] ================================================================== [ 166.839270] Disabling lock debugging due to kernel taint [ 166.844857] Kernel panic - not syncing: panic_on_warn set ... [ 166.844857] [ 166.852399] CPU: 1 PID: 7828 Comm: syz-executor2 Tainted: G B 4.19.0-rc2+ #130 [ 166.861284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.870656] Call Trace: [ 166.873445] dump_stack+0x1c4/0x2b4 [ 166.877225] ? dump_stack_print_info.cold.2+0x52/0x52 [ 166.882533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 166.887322] panic+0x238/0x4e7 [ 166.890866] ? add_taint.cold.5+0x16/0x16 [ 166.895144] ? trace_hardirqs_on+0xb4/0x310 [ 166.899574] ? trace_hardirqs_on+0xb4/0x310 [ 166.903929] kasan_end_report+0x47/0x4f [ 166.908297] kasan_report.cold.9+0x76/0x309 [ 166.912644] ? sock_i_ino+0x94/0xa0 [ 166.913591] kobject: 'loop7' (000000004a79453d): kobject_uevent_env [ 166.916299] __asan_report_load8_noabort+0x14/0x20 [ 166.916315] sock_i_ino+0x94/0xa0 [ 166.916337] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 166.916355] ? tipc_diag_dump+0x30/0x30 [ 166.937628] kobject: 'loop7' (000000004a79453d): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 166.940420] ? tipc_getname+0x7f0/0x7f0 [ 166.940447] ? graph_lock+0x170/0x170 [ 166.940465] ? __lock_sock+0x203/0x350 [ 166.940489] ? find_held_lock+0x36/0x1c0 [ 166.940515] ? mark_held_locks+0xc7/0x130 [ 166.970483] ? __local_bh_enable_ip+0x160/0x260 [ 166.975259] ? __local_bh_enable_ip+0x160/0x260 [ 166.979993] ? lockdep_hardirqs_on+0x421/0x5c0 [ 166.984605] ? trace_hardirqs_on+0xbd/0x310 [ 166.989216] ? lock_release+0x970/0x970 [ 166.989260] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 166.993218] ? lock_sock_nested+0xe2/0x120 [ 166.993236] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 166.993250] ? skb_put+0x17b/0x1e0 [ 166.993265] ? memset+0x31/0x40 [ 166.993284] ? __nlmsg_put+0x14c/0x1b0 [ 166.993305] __tipc_add_sock_diag+0x233/0x360 [ 167.028190] tipc_nl_sk_walk+0x122/0x1d0 [ 167.032276] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 167.037572] tipc_diag_dump+0x24/0x30 [ 167.041395] netlink_dump+0x519/0xd50 [ 167.045220] ? netlink_broadcast+0x50/0x50 [ 167.049489] __netlink_dump_start+0x4f1/0x6f0 [ 167.054023] ? tipc_data_ready+0x3e0/0x3e0 [ 167.058283] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 167.063705] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 167.068724] ? tipc_data_ready+0x3e0/0x3e0 [ 167.073005] ? tipc_unregister_sysctl+0x20/0x20 [ 167.077781] ? tipc_ioctl+0x3a0/0x3a0 [ 167.081678] ? netlink_deliver_tap+0x355/0xf80 [ 167.086372] sock_diag_rcv_msg+0x31d/0x410 [ 167.090636] netlink_rcv_skb+0x172/0x440 [ 167.094720] ? sock_diag_bind+0x80/0x80 [ 167.098724] ? netlink_ack+0xb80/0xb80 [ 167.102645] sock_diag_rcv+0x2a/0x40 [ 167.106535] netlink_unicast+0x5a5/0x760 [ 167.110625] ? netlink_attachskb+0x9a0/0x9a0 [ 167.115145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 167.121023] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 167.126067] netlink_sendmsg+0xa18/0xfc0 [ 167.130147] ? move_addr_to_kernel.part.18+0xc6/0x100 [ 167.135368] ? netlink_unicast+0x760/0x760 [ 167.139623] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 167.144591] ? apparmor_socket_sendmsg+0x29/0x30 [ 167.149454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 167.155033] ? security_socket_sendmsg+0x94/0xc0 [ 167.160035] ? netlink_unicast+0x760/0x760 [ 167.164291] sock_sendmsg+0xd5/0x120 [ 167.168035] ___sys_sendmsg+0x7fd/0x930 [ 167.172032] ? __local_bh_enable_ip+0x160/0x260 [ 167.176732] ? copy_msghdr_from_user+0x580/0x580 [ 167.181510] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 167.187115] ? release_sock+0x1ec/0x2c0 [ 167.191133] ? __fget_light+0x2e9/0x430 [ 167.195565] ? fget_raw+0x20/0x20 [ 167.199043] ? __release_sock+0x3a0/0x3a0 [ 167.203217] ? tipc_nametbl_build_group+0x273/0x360 [ 167.208498] ? tipc_setsockopt+0x726/0xd70 [ 167.212783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 167.218508] ? sockfd_lookup_light+0xc5/0x160 [ 167.223026] __sys_sendmsg+0x11d/0x280 [ 167.226933] ? __ia32_sys_shutdown+0x80/0x80 [ 167.231486] ? do_fast_syscall_32+0x150/0xfb2 [ 167.236168] ? do_fast_syscall_32+0x150/0xfb2 [ 167.240854] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 167.246421] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 167.251447] do_fast_syscall_32+0x34d/0xfb2 [ 167.255979] ? do_int80_syscall_32+0x890/0x890 [ 167.260683] ? entry_SYSENTER_compat+0x68/0x7f [ 167.265380] ? trace_hardirqs_off_caller+0xbb/0x310 [ 167.270419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 167.275283] ? trace_hardirqs_on_caller+0x310/0x310 [ 167.280513] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 167.285551] ? recalc_sigpending_tsk+0x180/0x180 [ 167.290467] ? kasan_check_write+0x14/0x20 [ 167.294734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 167.299694] entry_SYSENTER_compat+0x70/0x7f [ 167.304130] RIP: 0023:0xf7f0bca9 [ 167.307516] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 0c 24 c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 167.327212] RSP: 002b:00000000f5f070cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 167.335292] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000020000040 [ 167.342771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 167.350056] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 167.357475] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 167.364846] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 167.373109] Dumping ftrace buffer: [ 167.377217] (ftrace buffer empty) [ 167.381782] Kernel Offset: disabled [ 167.385429] Rebooting in 86400 seconds..