[ 74.511603][ T30] audit: type=1800 audit(1569195579.551:25): pid=11002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 74.534868][ T30] audit: type=1800 audit(1569195579.581:26): pid=11002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 74.583942][ T30] audit: type=1800 audit(1569195579.611:27): pid=11002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 74.719154][ T30] audit: type=1800 audit(1569195579.761:28): pid=11002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.27' (ECDSA) to the list of known hosts. 2019/09/22 23:39:55 fuzzer started 2019/09/22 23:39:59 dialing manager at 10.128.0.26:45485 2019/09/22 23:39:59 syscalls: 2382 2019/09/22 23:39:59 code coverage: enabled 2019/09/22 23:39:59 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/22 23:39:59 extra coverage: enabled 2019/09/22 23:39:59 setuid sandbox: enabled 2019/09/22 23:39:59 namespace sandbox: enabled 2019/09/22 23:39:59 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/22 23:39:59 fault injection: enabled 2019/09/22 23:39:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/22 23:39:59 net packet injection: enabled 2019/09/22 23:39:59 net device setup: enabled 23:42:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) syzkaller login: [ 248.289399][T11169] IPVS: ftp: loaded support on port[0] = 21 [ 248.422319][T11169] chnl_net:caif_netlink_parms(): no params data found [ 248.476645][T11169] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.484063][T11169] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.492648][T11169] device bridge_slave_0 entered promiscuous mode [ 248.502980][T11169] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.510225][T11169] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.518890][T11169] device bridge_slave_1 entered promiscuous mode [ 248.550937][T11169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.563223][T11169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.594714][T11169] team0: Port device team_slave_0 added [ 248.603778][T11169] team0: Port device team_slave_1 added [ 248.838137][T11169] device hsr_slave_0 entered promiscuous mode [ 249.074360][T11169] device hsr_slave_1 entered promiscuous mode [ 249.352929][T11169] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.360200][T11169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.367961][T11169] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.375161][T11169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.450363][T11169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.460039][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.470842][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.482366][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 249.512863][T11169] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.521790][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.530284][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.545917][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.555546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.564481][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.571728][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.618575][T11169] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 249.629199][T11169] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.646092][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.655765][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.664716][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.671874][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.680441][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.690079][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.699941][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.709722][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.719217][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.728882][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.738350][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.747446][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.756856][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.765886][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.779749][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.788455][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.821913][T11169] 8021q: adding VLAN 0 to HW filter on device batadv0 23:42:35 executing program 0: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x165a02) 23:42:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 23:42:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) 23:42:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffffff2b) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000bc0)=""/160, 0xa0}], 0x1}}], 0x1, 0x0, 0x0) 23:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) [ 251.938890][T11208] IPVS: ftp: loaded support on port[0] = 21 23:42:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) unshare(0x2a000400) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 252.102167][T11208] chnl_net:caif_netlink_parms(): no params data found 23:42:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) unshare(0x2a000400) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 252.181628][T11208] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.188951][T11208] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.197808][T11208] device bridge_slave_0 entered promiscuous mode [ 252.209140][T11208] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.216510][T11208] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.225183][T11208] device bridge_slave_1 entered promiscuous mode [ 252.274636][T11208] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.288080][T11208] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 252.320129][T11208] team0: Port device team_slave_0 added [ 252.329980][T11208] team0: Port device team_slave_1 added 23:42:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) unshare(0x2a000400) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 252.418291][T11208] device hsr_slave_0 entered promiscuous mode [ 252.454626][T11208] device hsr_slave_1 entered promiscuous mode [ 252.494686][T11208] debugfs: Directory 'hsr0' with parent '/' already present! [ 252.531241][T11208] bridge0: port 2(bridge_slave_1) entered blocking state 23:42:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) [ 252.538495][T11208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.546247][T11208] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.553466][T11208] bridge0: port 1(bridge_slave_0) entered forwarding state 23:42:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) [ 252.680799][T11208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.701976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.721717][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.746888][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.764401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) [ 252.796381][T11208] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.812169][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.821638][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.828935][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.877292][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.886381][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.893690][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.904277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.914104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.923613][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 23:42:38 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r0, 0x0, 0x0, 0x0) [ 252.957335][T11208] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.970064][T11208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.979179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.988239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.051595][T11208] 8021q: adding VLAN 0 to HW filter on device batadv0 23:42:38 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r0, 0x0, 0x0, 0x0) 23:42:38 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x1d, 0x0, &(0x7f0000000040)=0xf7) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000080)={{0x2, 0x2, 0x81, 0x5, 0x3f}, 0xffffffffffffff01, 0x7ff}) 23:42:38 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r0, 0x0, 0x0, 0x0) 23:42:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0xa4000960) open(&(0x7f0000000000)='./control\x00', 0x200000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f00000000c0)) 23:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'veth0_to_hsr\x00', 0x4}, 0x18) setsockopt$inet_opts(r0, 0x0, 0x80000000000c, &(0x7f00000000c0)="e5", 0x1) clock_settime(0x1, &(0x7f0000000000)) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0xe) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) 23:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) 23:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:38 executing program 1: r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) close(r0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)) epoll_pwait(r1, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) 23:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x2000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000001140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000001240)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0xa00001}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x5c, r2, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffff}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3b91}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000080}, 0x80) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x4000008000001, 0xfffffffffffffffc, @value}) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="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", 0x1000) getsockname$packet(r3, 0x0, &(0x7f00000000c0)) getsockopt(r3, 0x200000000114, 0x2716, 0x0, &(0x7f0000000080)=0xfffffffffffffdf6) 23:42:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:39 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='notify_on_release\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x120) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7fff, 0x2) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x14200, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) bind$tipc(r1, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x1, {{0x43}, 0x3}}, 0x10) sendfile(r0, r0, 0x0, 0x100080101) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockname$netlink(r2, &(0x7f0000000080), &(0x7f0000000200)=0xc) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x81, 0x2000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) socket$packet(0x11, 0x2, 0x300) 23:42:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x14}, 0x14}}, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x8, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r8, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r9 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xffffffa4) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2, 0x4e20, 0x0, 0x4e21, 0x1, 0xa, 0x80, 0x0, 0x32, r7, r10}, {0x0, 0x7, 0x97, 0x1, 0x800, 0xc800000000000000, 0x0, 0xffffffff7fffffff}, {0x0, 0x6, 0x0, 0x56}, 0x8, 0x0, 0x0, 0x1, 0x1, 0x2}, {{@in6=@loopback, 0x4d3}, 0x2, @in=@multicast2, 0x3502, 0x4, 0x2, 0x6, 0x2, 0x3f, 0x2}}, 0xe8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000480)) recvmsg$kcm(r1, &(0x7f0000003a40)={0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000002680)=""/126, 0x7e}], 0x1}, 0x0) r11 = syz_open_dev$media(&(0x7f0000000400)='/dev/media#\x00', 0x0, 0x400) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r11, 0x28, 0x1, &(0x7f0000000440), 0x8) 23:42:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) [ 254.739821][T11306] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 23:42:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x0) sendmmsg(r1, 0x0, 0x0, 0x0) [ 254.818035][T11306] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 23:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x1d, 0x4) r1 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x5, 0x4) sendmsg$NET_DM_CMD_START(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8040004}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) flistxattr(0xffffffffffffffff, &(0x7f0000000200)=""/238, 0xee) 23:42:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x396) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xa6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x1000001, 0x100132, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f0000000100)) 23:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:42:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x6a, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff8100000088486089bdf500300000ff01000000000000000000000000000100000000000000000000ffffe0000001020090789189a764000000006076913200000000000000000000000000000000000000010000000000000000000000000000000010ddca017fa31428d8cafd31fdabccfdfb08595cdba4e7daa1f3c3b60c645b950480b934617a815466ce384d77973133203de60165d1f1d162b5abad6b23a2498a"], 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 23:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:42:41 executing program 0 (fault-call:4 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4700c2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setgid(r3) 23:42:41 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80200000006, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000000c0)=r2) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000080)=r2) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000140)=""/87) r3 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4, 0x4}}, 0x10) bind$tipc(r3, &(0x7f0000000100)=@name, 0x10) sendmsg$tipc(r3, &(0x7f0000000700)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, 0x10, 0x0}, 0x0) 23:42:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x40, 0x180) r2 = gettid() ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000040)=r2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r4, 0x0, 0x0, 0x0) 23:42:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10000000000000, 0x40802) r4 = accept4(r3, 0x0, 0x0, 0x800) unshare(0x2a000400) sendmmsg(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r5, 0xc0105303, &(0x7f0000000080)={0x5, 0xfffffffeffffffff, 0x8}) 23:42:42 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101000) write$P9_RREAD(r0, &(0x7f0000000040)={0xe3, 0x75, 0x1, {0xd8, "646bb538497cae1c0ff00e0f44fc7c003afd13db930d776f4227c03edb04a4566d01ad6e6417d8f0e1ca29fdea61e2de522c00701e75497c3389546907c3ce0a63665c7a3bea614abd7150026a441ebd006dde07c513f44c15b85c6e14055a0b670709b87725ade3ff705d9542155a27fef0c1022c1bf9ab872f1a3e7a2d26b6eec08f3139605b0a8b4f082fc62dc2aa9e6f6f692b17734c035f2c01231197cd05b1d543599158a57178cecfe4a7582c25e75dd0adc29e4713a554a14277018376ba0f8228b9cca07a9e8c61e9a722158847abdd76bbdd7d"}}, 0xe3) ioctl$KVM_SMI(r0, 0xaeb7) r1 = openat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r1, 0x9, 0x0, 0x1ff, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x80, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x9, 0x4b06a2) write$ppp(r2, &(0x7f0000000280)="ab83e9b7b9c204973129c723bdeda66f9a057127b864eceb837e2c2993f85e21c99b228ed238f67c207cc9dc3f237a201d3e2e9d3a433ed0639ec5f5bb0eff6deafd97098bd90b7bdd2ce59b8449623c310c88ca62f85887120263e4a385e5cc2b2be604cb40b8b7c3ddb84740a55d47683bc0d8970ceb5c31ad882e64ab32af01a7edb0f2792db007f21037a1d86682d29400b4d153b3723cf3194566dad8ee4a4c94e94eb97442a42553a24316bbf0935021057c0a2f6af0fb7b28aa99ed31c2b464a9215431bb7650e9272c7294993cc22426838803910bf3d44e00d33ac4a2ee02808926eb4015ffe1b06ae9efbdbf4de328", 0xf4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x101000, 0x0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000003c0)={0x7fff, 0x8, 0x100000000, 0x6, 0xb6f, 0x3af, 0x2}) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x400000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x80000001, 0x40) write$ppp(r4, &(0x7f0000000480)="31ad5b3645be78448ca8fe05e8929f1f6f2a429df7f35d68963d738fd41a6f7e34f601d34138c8fa26", 0x29) r5 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f00000004c0)={0x4, 0x1, 0x8, 0x1fc}, 0x10) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snapshot\x00', 0x100000, 0x0) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000540)=0x2) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x1b9d, 0x10}, 0xc) fcntl$setstatus(r7, 0x4, 0x800) syz_open_dev$hidraw(&(0x7f00000005c0)='/dev/hidraw#\x00', 0x1, 0x100) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r4, 0xc10c5541, &(0x7f0000000600)={0x4, 0xdd6d, 0xfb3e, 0x0, 0x0, [], [], [], 0x7, 0x6e}) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000740)={0x43, 0x0, 0x1}, 0x10) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/net/pfkey\x00', 0x151004, 0x0) getsockopt$sock_buf(r8, 0x1, 0x13, &(0x7f00000007c0)=""/60, &(0x7f0000000800)=0x3c) alarm(0x6) r9 = gettid() rt_sigqueueinfo(r9, 0x2f, &(0x7f0000000840)={0x26, 0x0, 0x38a80000}) write$selinux_attr(r4, &(0x7f00000008c0)='system_u:object_r:null_device_t:s0\x00', 0x23) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000900)=0x1) r10 = open(&(0x7f0000000940)='./file0\x00', 0xa0000, 0x80) ioctl$VT_DISALLOCATE(r10, 0x5608) 23:42:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x0) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x980) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x27563419de587e59, 0x4) 23:42:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x40000) 23:42:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000000)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in=@rand_addr=0x3, 0x4e20, 0x80, 0x4e22, 0x3f, 0x3, 0x80, 0x0, 0x29, r3, r4}, {0x7, 0x100, 0x6, 0x0, 0x0, 0x6, 0x1, 0x9}, {0x3, 0x0, 0x9, 0x1}, 0x7, 0x6e6bb2, 0x1, 0x1, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d4, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1d}, 0x3500, 0x1, 0x0, 0xfffffffeffffffff, 0x800, 0x8d, 0xd54b}}, 0xe8) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) [ 257.660325][T11379] IPVS: ftp: loaded support on port[0] = 21 23:42:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)={0x1, 0x8, 0x3, 0x39, 0x1, [{0x7fff, 0xc6ac, 0x9, 0x0, 0x0, 0x802}]}) [ 257.930176][T11379] chnl_net:caif_netlink_parms(): no params data found [ 258.026910][T11379] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.034292][T11379] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.042909][T11379] device bridge_slave_0 entered promiscuous mode [ 258.096735][T11379] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.104089][T11379] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.114353][T11379] device bridge_slave_1 entered promiscuous mode 23:42:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0xfffffffffffffd1b) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) [ 258.150835][T11379] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 258.167661][T11379] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 258.235902][T11379] team0: Port device team_slave_0 added [ 258.266461][T11379] team0: Port device team_slave_1 added [ 258.357725][T11379] device hsr_slave_0 entered promiscuous mode 23:42:43 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000003c0)=0x1, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x7d, 0x8202) ioctl$HIDIOCGRDESCSIZE(r1, 0x80044801, &(0x7f0000000440)) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) bind$alg(r0, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x355) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r3 = accept4(r2, 0x0, 0x0, 0x80000) unshare(0x2a000400) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000080)='lp\x00\xec-\vlo\xdcdb\x15\xf1C\x066\x95\xc3\x89\xeb\x83{\xd4WA\no\xc0S\xe0\x82\x80eUq\x83\xc2\xcd\x9e\x9a@3\xcbKyJ\xf8|\xe6lk\x84Z~\xafY\x86#3\xdf\xedX.\xae\xa1\x1a&.\xbf\x12\xf4\x94O\x19Vaws<\x10v2\xda\xb0\"\xff\x96\xa4K&\xcf{(\xff/\xf0_\xe6\xc2\b\xaa\'\xc5W\x16\x94\x1f\xf1f\x17\xa2u\xfc\xc0gjl=:\xc5\xb5\xee\xc8\x80\xce5\xfc\xca7\xad@{x<\xac\x03\xcc\x12NH\xdbzq\x84\xa3\xab\x19{\xd5\xf9NscA\xa8f\x1d\x8d\x14\xcf\xbf\xce\x90\x8a7\xcb\xc2\xc6\xee\x85\xabZ\x97\xdd\xff\x03%\xcd\xb8\xf9\x12\xb5\xf7', 0xb7) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x141080, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40857) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r10, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$sock_inet_SIOCDARP(r10, 0x8953, &(0x7f0000000480)={{0x2, 0x4e21, @empty}, {0x1dc7dcddab4c6718, @remote}, 0x1, {0x2, 0x4e21, @multicast2}, 'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r11 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r11, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$SG_SCSI_RESET(r11, 0x2284, 0x0) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRES16=0x0], 0xfffffe6c) sendmmsg(r3, 0x0, 0x0, 0x0) [ 258.414205][T11379] device hsr_slave_1 entered promiscuous mode [ 258.463619][T11379] debugfs: Directory 'hsr0' with parent '/' already present! 23:42:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)=0x1) r2 = socket$caif_stream(0x25, 0x1, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000080)={r3, 0x0, 0x2, 0x1000}) r4 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r4, 0x0, 0x0, 0x0) [ 258.517030][T11379] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.524326][T11379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.532223][T11379] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.539536][T11379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.641804][T11397] Unknown ioctl 1074025694 [ 258.696184][T11379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.714864][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.725242][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.735415][ T17] bridge0: port 2(bridge_slave_1) entered disabled state 23:42:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r2 = accept4(r1, 0x0, 0x0, 0x800) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x20000010) [ 258.758232][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 258.791635][T11379] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.822098][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.831387][T11171] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.838662][T11171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.916720][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.925778][T11171] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.932944][T11171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.943629][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.953736][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.963153][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.981737][T11379] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 258.997023][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:42:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000200)={0x30, 0x5, 0x0, {0x0, 0x4, 0x0, 0x2}}, 0x30) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000002840)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000002880)={r2, 0x3}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000000)={r2, 0x1}) unshare(0x400) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/ddv/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, 0x0) [ 259.028424][T11379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.045632][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.054620][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.063800][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:42:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000040)={0x34}) 23:42:44 executing program 1: stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x8, 0x9}, {0x9cc8, 0x8000}], r0}, 0x18, 0x2) unshare(0x4060400) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x4) 23:42:44 executing program 2: r0 = socket$inet(0x2, 0x6, 0xfffffffffffffe00) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x46, "2ec50817f802ebac2d7b3dbbffd72a159832789e542cc16fb2ef5ee8005b6596c0bedac6e7bb843c42882f2482aed2dfa92ac9e740f7a7b6679b44b8b0e673d3f079f8c7bf25"}, &(0x7f00000000c0)=0x6a) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpeername(r1, 0x0, &(0x7f0000000100)) 23:42:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x80800) unshare(0x2a000400) sendmmsg(r3, 0x0, 0x0, 0x0) 23:42:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000080)={0x0, 0x10001, 0x1017}) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000076ed76c9ca8bd81d610016000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"], 0xb8}}, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x12, 0x0, 0x0) 23:42:44 executing program 2: link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0xa, 0x3, 0x2) 23:42:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000000)) 23:42:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000280)=0x0) socket$inet6(0xa, 0xa, 0x1) close(r0) timerfd_create(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 23:42:44 executing program 1: socket$l2tp(0x18, 0x1, 0x1) socket$packet(0x11, 0x2, 0x300) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000000a3007f0000000000000000000000000000000020e7466f000b00"/43]}) 23:42:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value=0x1000000000}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000)=0x5, 0x4) 23:42:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='$\x00', 0x2) waitid(0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x40000009, 0x0) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0xc4000002) 23:42:45 executing program 2: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x1d1810, r0, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x38f, &(0x7f0000000080)}) 23:42:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x0, 0x8, [@local, @random="c71093e5b523", @remote, @empty, @empty, @empty, @random="5e781cf5f3f3", @link_local]}) 23:42:45 executing program 1: clock_gettime(0x1, &(0x7f0000000340)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101041, 0x0) write$ppp(r0, &(0x7f0000000040)="93a98bc57c56edf67dc517250b67a5cd573a7d59261212654f701b38bb32c84d822875ad79a3411841e049d46de3fa49bfabb5c4b3fb302a273060657469e6b36cad7b1377c029bb3f71a76d21a0771987544970e400a78118402df5c5448cd164556f1df820adde1be16ba73c8427d108370bb967f4a19344a2a641895df9a81379dbc70a652df34fa41897e049bf0040466d45be4e325109974957bb612afe73e0b0ddcf1117efa4bd86dae7a2cdb872a643180046f219752af9c37b4c4d7416ce32deec5fb50a01fd58bd82b830bff6827ed7d5a22da18bde0d62c5dd8ee5674a345e7184a69cc81eabb6ada39b", 0xef) 23:42:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x6, &(0x7f0000000400)=0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x80000000000, r0, 0x0, 0xffffffffffffff54, 0xb6a4}]) 23:42:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r1, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000002580)=0xffffffffffffac6e, 0x4) sendto$inet6(r1, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000000180)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r1, &(0x7f00000055c0)={&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005500), 0x0, &(0x7f0000005540)=""/81, 0x46}, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000080)={0x6, 0x1, 0x0, 'queue1\x00', 0x3}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140)={0x0, 0x9a0000000000000}, 0x8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xca228039192e5287, 0x0) recvfrom$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 23:42:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r1, r2/1000+10000}, {0x77359400}}) r3 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r3, 0x0, 0x0, 0x0) 23:42:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0x5e, 0x76f, 0x7ff, "fb758aa2f5bd4c6f4bf1dd45ed2181ee2198d1fd7ac068b594779ce3b7c48b98ad599d4c78de0cc16144ec943467f8a94a9c0446cc9eefbf01f93c17fad494ee8ef16652466ec67c7ec5a9e93a369295676f6b6a91eca8c17a130d931a3d"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4) ioctl$VIDIOC_G_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x0, 0x0, [], 0x0}) 23:42:45 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="a14444e9387210900000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:45 executing program 0: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x7, 0x3}]}, 0xc, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, r0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x76, "16f3339477420a86db2ad5dcc4fd2b9be623446cf3a87b2ae5c029df935dcca7c95953357304ac0462cf6bc23ceb4e9643ee998b21df415a49db5a5bc9a06f8e86492157c7dbc550b0c0f75dabc1018b1293c42ff97892379e7a919a7de02b360e13f21d2824b1114d5065c5c871ada7cc95a442abdd"}, &(0x7f00000001c0)=0x7e) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r5, 0x384}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={r3, 0xfff, 0xffffffffffffffff, 0x5, 0x10000, 0xfffffffffffffff9, 0x7, 0xff, {r6, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0x100}}, 0x1, 0x4, 0x100000001, 0x2}}, &(0x7f0000000280)=0xb0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000540)=0x195d, 0x4) bind$inet6(r7, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x200408d4, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000002c0)="b3", 0x1, 0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x1) sendto$inet6(r7, &(0x7f00000000c0)="e1", 0x1, 0x0, 0x0, 0x0) 23:42:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYRES32=r4, @ANYBLOB="2c0000004a551cbdd99d460d45f955d4f65124ff9f7beb1bd06ccdc5f1c430a56b4c10f1ac501e4303e0023f1c858d3e"], &(0x7f0000000040)=0x34) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000080)={r5, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000140)=0x84) 23:42:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000240)={0x2844bc33, 0x3, 0x3, "6e5cca0900349e9e4aa2e5a54cb8bc8e24fcc4a1ebb590d99b79cd5434689fe2", 0x584e4f53}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="14"]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000002840)={"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"}) r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r9, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) move_mount(r9, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x4) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000000c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffff, 0x0, [{0x0, 0x9}]}}) [ 261.185031][T11510] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 23:42:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001f4c), 0x209a6b90bb7b17, 0x0, 0x0) shutdown(r1, 0x1) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000000)={0x5, 0x899d}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000200)=""/141, 0x8d, 0x1, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000100)={0x1, 0xfa, 0x1, {0x2, @vbi={0xda, 0x101, 0xabb, 0x3447504d, [0x100, 0x8001], [0x2, 0x5], 0x1}}}) 23:42:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x40000) ioctl$TIOCSBRK(r1, 0x5427) r2 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000040)=0x1) 23:42:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) unshare(0x2a000400) sendmmsg(r3, 0x0, 0x0, 0x0) 23:42:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl(r2, 0xfffffffffffff399, &(0x7f0000000000)="f592ebccc3b364f86d9913d585c0d68db424d83670d5f2a1baedc90018dcf53467") unshare(0x2a040400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000000)={{0x1, 0x0, @identifier="cb9870cdb9dfebe60f437def35936b7b"}}) unshare(0x2a000400) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1ae, 0x20040) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:47 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/228}, 0xec, 0xe42821a6f81bd540, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) 23:42:47 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000540)='net/netlink\x00') r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000580)={r3, 0x99, "d5c996d40740d5c3892cfbe58b1b0cd976c576bbbd95b20e31abfbc5e2b78a412779bff90cd37290bc77bcd994d4320f7d3c4089067a5d9be7c4205a1a799e171b881c22b39822c406d26f26154ecc8d4906ea72dc10086f540404b4a59c8d1f486f8bd72816276c776ee1a9e65f36796769ca1e7024c7ad6c089906a1df746073903a73653a96a8241434cdd4ad1a3dfd2117cbe0755902a0"}, &(0x7f0000000640)=0xa1) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r5, 0x0, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r7 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r7, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @dev}, &(0x7f0000000040)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@loopback, @in6=@loopback, 0x4e23, 0x0, 0x4e22, 0x7ff, 0xa, 0x80, 0x80, 0xa9, r8}, {0x9, 0x8511, 0x0, 0xfff, 0x9, 0x2, 0x8, 0x80000001}, {0x0, 0x80000001, 0x3ff, 0x80}, 0x5, 0x6e6bbe, 0x0, 0x0, 0x2, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0xe}, 0x4d2, 0xe8f134e63ea6f99f}, 0x2, @in6=@rand_addr="d8436cab239e3acfd01913f2feb5e44a", 0x3502, 0x4, 0x0, 0x9, 0x82, 0x1ff, 0x9}}, 0xe8) 23:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) shmget$private(0x0, 0x1000, 0x27cf98b74a03bf6c, &(0x7f0000ffa000/0x1000)=nil) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2000, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000002c0)={r7, @in6={{0xa, 0x4e22, 0xffff, @mcast2, 0xffffffffffffffe1}}}, 0x84) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r8, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000080)=r8) r9 = fcntl$getown(r4, 0x9) r10 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r11 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r11, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r12 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000540)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x18) ioctl$VIDIOC_QUERYMENU(r10, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r13 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r13, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r14 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r14, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) kcmp$KCMP_EPOLL_TFD(r3, r9, 0x7, r10, &(0x7f0000000040)={r13, r14, 0x4}) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x10, 0x4) 23:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000380)={0x0, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x4d0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='team_slave_1\x00', 0xf6, 0x7, 0x2}) unshare(0x2a000400) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) accept4(r3, 0x0, &(0x7f0000000000), 0x80000) r4 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9, 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000180)=0x7) ustat(0x4, &(0x7f00000002c0)) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) sendfile(r0, r5, &(0x7f0000000040), 0x5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x20) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x22142, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r6, 0xc028ae92, &(0x7f0000000100)={0x7, 0x1}) socket$rds(0x15, 0x5, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') 23:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) capset(&(0x7f0000000000)={0x19980330, r2}, &(0x7f0000000040)={0x9, 0x81, 0x8, 0x4, 0xfffffffffffffff9, 0xfffffffffffffffe}) 23:42:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001f4c), 0x209a6b90bb7b17, 0x0, 0x0) shutdown(r1, 0x1) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000000)={0x5, 0x899d}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000200)=""/141, 0x8d, 0x1, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000100)={0x1, 0xfa, 0x1, {0x2, @vbi={0xda, 0x101, 0xabb, 0x3447504d, [0x100, 0x8001], [0x2, 0x5], 0x1}}}) 23:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000000)={0x0, 0x5, 0x8, 0x4}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000004800)={@mcast1, 0x0}, &(0x7f0000004840)=0x14) sendmsg$can_raw(r3, &(0x7f0000004940)={&(0x7f0000004880)={0x1d, r5}, 0x10, &(0x7f0000004900)={&(0x7f00000048c0)=@can={{0x2, 0x2, 0x7ff, 0x4}, 0x3, 0x2, 0x0, 0x0, "8ff38834b9a9c85f"}, 0x10}, 0x1, 0x0, 0x0, 0x4000020}, 0x4044) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) 23:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000200)=0xe6, 0x4) exit(0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x10002) r3 = syz_open_dev$vcsn(&(0x7f0000000180)='/d\x8b\xf3\xde\x8a}r\xb4\xec', 0x1000003, 0x80) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000140)={0x0, r4, 0xffffffff}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4000, 0x0) fchdir(r5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r7 = semget$private(0x0, 0x0, 0x4) semctl$SETVAL(r7, 0x1, 0x10, &(0x7f00000001c0)=0x8) ioctl$VIDIOC_QUERYMENU(r6, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) connect$vsock_dgram(r6, &(0x7f00000000c0)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000040)=""/61) 23:42:55 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000000)="c1edda9156e23b9d46e3e2de8c703338b576764e16dbc5c551d4de546958232fd2c5ac8d0058d858218175d856aab1a78b397e8b9c1405c252223efde481d32776a40a7d62274c4cefb97b899540708e67f1a192c0bcf6110835a1e496611a72acc268f5790467d741c977e29f824f310406deef95e90413208628b248e8b6d29f12e4e138d80cf680f21fcb5d62d900161606249a78a569f69aaf3cb3249cc09f6c7df040292d5b1d3634667f971a9d6071ffca774cf8fae1abf64f07ffe4a920156dae0b60100428993d", 0xcb, r0}, 0x68) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='erspan0\x00', 0x10) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x6ee7, 0x84800) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000200)={0x77359400}, 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) r2 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000740)='trusted.overlay.upper\x00', &(0x7f0000000780)={0x0, 0xfb, 0x37, 0x2, 0x7f, "8d30c82d774c2287189a227a4b73f58b", "a9ceb2ac86cc95a5ef7f5759cad38631236f90d3b95635ca72134bd58c3c9059d745"}, 0x37, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f00000007c0)) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000800)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/net/pfkey\x00', 0x292001, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000880)={0x3, 0x0, [{0x3f9, 0x0, 0x6}, {0x31e, 0x0, 0xcd01}, {0xba1, 0x0, 0x8}]}) r4 = accept(0xffffffffffffffff, &(0x7f00000008c0)=@sco, &(0x7f0000000940)=0x80) r5 = getpid() fcntl$setown(r4, 0x8, r5) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vga_arbiter\x00', 0x10d101, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x1c, r7, 0x1, 0x70bd26, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/snapshot\x00', 0x602020, 0x0) ioctl$KVM_CREATE_PIT2(r8, 0x4040ae77, &(0x7f0000000b40)={0x5}) r9 = syz_open_dev$vbi(&(0x7f0000000b80)='/dev/vbi#\x00', 0x3, 0x2) write$P9_RMKDIR(r9, &(0x7f0000000bc0)={0x14, 0x49, 0x1, {0x20, 0x4, 0x4}}, 0x14) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/btrfs-control\x00', 0x2400, 0x0) bind$vsock_dgram(r10, &(0x7f0000000c40)={0x28, 0x0, 0xffffffff, @host}, 0x10) r11 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/dlm-monitor\x00', 0x42, 0x0) write$selinux_attr(r11, &(0x7f0000000cc0)='system_u:object_r:hald_sonypic_exec_t:s0\x00', 0x29) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000d40)={'syzkaller1\x00', @remote}) fremovexattr(r9, &(0x7f0000000d80)=@known='com.apple.system.Security\x00') r13 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000dc0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r13, 0x40086602, &(0x7f0000000e00)=0x3628) 23:42:55 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x83d7453c1c59e2db) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x101, @local, 0x6df}}, 0x9, 0x7}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r1, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x101, 0x200, 0x800, 0x0, 0xcc7}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x42080, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000280)={0x2, [0x8, 0x0]}, 0x8) r3 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x7, 0x2080) connect$netlink(r3, &(0x7f0000000300)=@unspec, 0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x10000000, 0x2, 0x80000001, 0x6, 0x6}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000440)=r4, 0x4) rt_sigreturn() socket$inet6(0xa, 0xa, 0x8001) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4c101, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r5, 0x4040ae70, &(0x7f00000004c0)={0x8, 0x3, 0xffffffffffffffd2, 0x600}) r6 = syz_open_dev$vbi(&(0x7f0000000500)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000540)={r4, 0x1}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000005c0)={r7, 0x10000, 0x20}, &(0x7f0000000600)=0xc) ioctl$KDDISABIO(r2, 0x4b37) r9 = syz_open_dev$sndpcmp(&(0x7f0000000640)='/dev/snd/pcmC#D#p\x00', 0x6, 0x80) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000680)={r8, 0x3}, &(0x7f00000006c0)=0x8) r10 = syz_open_dev$media(&(0x7f0000000700)='/dev/media#\x00', 0x4, 0x101000) ioctl$VIDIOC_S_SELECTION(r10, 0xc040565f, &(0x7f0000000740)={0x3, 0x0, 0x1, {0x9, 0x8000000000, 0x4}}) r11 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7fffffff) pread64(r11, &(0x7f0000000780)=""/211, 0xd3, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000008c0)={@initdev, 0x0}, &(0x7f0000000900)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x3100}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=@ipv4_getaddr={0x20, 0x16, 0xf3586572a5c3069a, 0x70bd2c, 0x25dfdbfe, {0x2, 0x20, 0x31, 0xfd, r12}, [@IFA_BROADCAST={0x8, 0x4, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x10000}, 0x10000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000a00)={0x0, 0x800}, &(0x7f0000000a40)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000a80)={r13, 0x100000001}, &(0x7f0000000ac0)=0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r5, 0xc0045540, &(0x7f0000000b00)=0x5) r14 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000b40)='cgroup.type\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r14, 0xc0096616, &(0x7f0000000b80)={0x2, [0x0, 0x0]}) 23:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xcea, 0x82) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000040)="c42c3c17c3df3510c43cb71ab1dec7a6ebd97c0cce4c40227f9060ee324a24bf3509ceb0c8a082f65ff6b0a8ee483d902e05fa768f819553b690829a8acf3950db73ff2c1e72155f6e34743c2441681e506cdd8ca2e8345b52898602df94a742f8bd5e0e7695939bc387f22c5cff4af26c9a2bfbac9d5dfee68d0ff4f1668ad5a740e5f5be8281735887341536e69266a2dd5609fafffc6701c012dc41683854fbc385bf5188f97bf80a79b18e755e10d986be7d3e02b32e441911d21d8faedf8c473f96306fa45ef1f554e9a29280961de6df2fa1271c01b2c1193c280058185f05193942", 0xe5}], 0x1) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) 23:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000000)={0xa, 0x4, 0x0, 0x3ff}, 0xa) r2 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$IMGETVERSION(r3, 0x80044942, &(0x7f0000000040)) 23:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) [ 270.911884][T11601] IPVS: ftp: loaded support on port[0] = 21 23:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) pipe2$9p(&(0x7f0000000000), 0x80000) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) [ 270.998564][T11603] IPVS: ftp: loaded support on port[0] = 21 23:42:56 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1a1) ioctl$KDADDIO(r0, 0x4b34, 0x7) r1 = socket(0x10, 0x3, 0x0) write(r1, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x184000) ioctl$HIDIOCGRDESC(r2, 0x90044802, &(0x7f0000000340)={0x32d, "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"}) sendmsg$nl_generic(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000028}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x14, 0x2e, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 23:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) 23:42:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800f8ff10003b0e00"/19, @ANYRES32=0x0, @ANYBLOB="00000000000000001100030073797a6b616c6c65723100000000000004001400000014000800210000001000"], 0x48}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) [ 271.392754][T11601] chnl_net:caif_netlink_parms(): no params data found [ 271.477538][T11603] chnl_net:caif_netlink_parms(): no params data found [ 271.584887][T11603] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.592181][T11603] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.600767][T11603] device bridge_slave_0 entered promiscuous mode [ 271.634306][T11601] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.641517][T11601] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.650255][T11601] device bridge_slave_0 entered promiscuous mode [ 271.675450][T11603] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.682659][T11603] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.691612][T11603] device bridge_slave_1 entered promiscuous mode [ 271.702391][T11601] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.709696][T11601] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.718536][T11601] device bridge_slave_1 entered promiscuous mode [ 271.785442][T11603] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.798410][T11601] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.813476][T11603] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.828513][T11601] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.874554][T11603] team0: Port device team_slave_0 added [ 271.883793][T11603] team0: Port device team_slave_1 added [ 271.926658][T11601] team0: Port device team_slave_0 added [ 271.946553][T11601] team0: Port device team_slave_1 added [ 272.008244][T11603] device hsr_slave_0 entered promiscuous mode [ 272.044220][T11603] device hsr_slave_1 entered promiscuous mode [ 272.203368][T11603] debugfs: Directory 'hsr0' with parent '/' already present! [ 272.489398][T11601] device hsr_slave_0 entered promiscuous mode [ 272.654654][T11601] device hsr_slave_1 entered promiscuous mode [ 272.764288][T11601] debugfs: Directory 'hsr0' with parent '/' already present! [ 273.000071][T11603] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.029832][T11601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.054823][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.063105][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.079040][T11603] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.096182][T11601] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.104507][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.113042][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.155207][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.165160][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.174502][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.181703][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.190012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.199525][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.208560][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.215758][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.224175][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.234180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 273.244100][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.253463][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.262608][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.269843][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.278318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.287853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.296871][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.304078][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.317310][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.325876][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.335458][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.345561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.366384][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 273.383148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.407588][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.417480][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.426976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 273.436133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.460629][T11603] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 273.473149][T11603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.493879][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 273.504583][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.514546][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.524095][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.533342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.586197][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 273.595314][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.604998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.614986][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 273.624203][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.641300][T11601] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 273.654305][T11601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.688949][T11603] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.699444][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.708565][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.734600][T11601] 8021q: adding VLAN 0 to HW filter on device batadv0 23:43:01 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x20040, 0x0) unshare(0x4000400) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc0205647, &(0x7f0000000100)={0x2020f010000, 0x0, @value=0x19}) 23:43:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) fcntl$setflags(r1, 0x2, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) fremovexattr(r3, &(0x7f0000000140)=@known='trusted.overlay.origin\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe}, &(0x7f0000000040)=0x10) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000080)={r4, 0x6}, &(0x7f00000001c0)=0x2e7) 23:43:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) sendmmsg(r1, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="c8b2d335dfcca4d3758acc3c646cd3e21d9bd8609ef1445059e1d96ff1d3eee130a12df34a91e143281bd8cf5989502a5a6eda0ac3d1f4d50cd76d7cb8c8fae21b52c210889a77cfb232e173d798854bcad8e551220105538765d72e75a7958281b9072f1343ace2d87b0723997227b0561ef5216274ef9505411a9a5e341d9deadea0eef119871062dd16560e815331e8dd6968f78c24b273fd9cfbea099da09e573394af8d4d0ff4a1c2997799931029e11ad12901a0622cd3f68c1cb7bcfbac8924362d6cacec8da36400a994ab3e7ca8bbab5ae6775bf75ced9cf3d80d857b81bef60d8a80b81f7a", 0xea}, {&(0x7f00000002c0)="65a9bc165b8cb9a73c32877d93ed68c8ff04cc12f58bc22c77a47d1c8aecab63e362c44da06d059ef5ba1220e6c78a2b296c6f85c3f059d05dcfc987bb3c24c2b35673428aa8ffed4b53158a259e230f52b2e2cd4203f9177d5e301edd4b84d43c74944e8ec5b8d333dcd7b104eed7fd8f3721e8469d0a0c38a66a76944e0b53a983221186de93d8043cee5341b4acd2a60c5c989726aee2856dcccecbdfb26b71314e88a03ae6efcdbe9d151a49a5a05ce945cacd106cc62407b15d6e6f5a77527c5be1b6ae2df3a827541cd489a2e9aadf033b7d9e24647f8b912b8d72718a5347235a5645dd662828b191acd7a21747377054accf72d5", 0xf8}, {&(0x7f0000000040)="90a9e0726cf9b375a5dd29030c17f4dbb45efb90da6229ead13cab3a2db1777bcbd82c3b00a4b77921956c1c55072fa94b57f70bbf6aba476e9f9f8a7b57", 0x3e}, {&(0x7f00000003c0)="f59c164565b1f7f1355f45403a571c45880f947a3c912ab279729c374b44dc0e697fce57258c789f705cfe4098f2d8b986d9cb361e273c4621c4a484780652627d405344d17155bcc0a63bfb5089004c4f0440de428bb3c43f792824b947650a2c110e3622d166cb73a1e97fd75b7aa33b48977a66534ca14bb1c381669d70cff78d203e26a7b31daf1e336ecb788e16349ce5020dd4fe15e9e5c1709f8affcf23f82315115b3621319e0199541590d24628d1a5a7f13202fa4437f6ee398a8fa702e6236a79204e", 0xc8}, {&(0x7f00000004c0)="fff90f5e3b2da5ca7b0a9952ccd971d9905a27e87c76f872296e7252cceb0dd53ccd14a34ec26448f2bc9f630245cc9a8902f3bc4caf58a1a06aa837ef2a4afa71f3b2be3bb69290ef52ea2d79af2b6cd0c0f3769722d008fa23f9a8863e3319d86ad2c170fbd247cd5bf29f6d2b328875e5160e62a6323cae98e274ddb427639a3e8b273829076c7db041f618ac1a7798cb1910bb8874c6f335b5cd3d6c3e677478cfd28aa8502061e8049ea9ce6cb967de087a57efc01cd4effaa2da660384f65d3e4e75bece", 0xc7}], 0x5, &(0x7f0000000640)}}, {{0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001a80)="256da9ec60ba360c43115055817ac5c514633403aab51749b0420197cc64aa7712fd685fce66925061355db41a5b3c33b5666c5ce56cae869bb39d6ce272a0f51adb086016f042d475bd2395660247afc10641e81349ffb1ade2b8a0a28d31e4414554c9d3c516c23309c07d5c33f1a5469a740cb2943a3f", 0x78}, {&(0x7f0000000080)="d7a9be3292e36a33", 0x8}, {&(0x7f0000001b00)="55925e9e01a453dcd1c56aa4fe57128b2f86bb9741310f36441fc7428c13cda760164bde02111e0ada071924c0f592934e1ad8b411f6ebc97491866d24f2aaeb454f26acf1d141a15301a5f57b4f4a8ceedfffa2a6221b3b1ad2b1db0c2d4518c09e2f7ea44e0e116752e494b2ba86", 0x6f}, {&(0x7f0000001b80)="d3cff05e515592ee41390bd62a072feacfef6b1eded15216f196fd3aac614666b5b62f55a4333c7461451d2bd6acc0b448f3b6f9515f4cf846c4f8b0432724a3405cb4216382594192b04f1d8e2ab6a7c40ecfea8b1009e4ac906f4b0bb36b146a9dae6df6eee1a5325e53ce3fa4df7e86cafeee724b5b6fb87dfd6672ca5ff0c2438a60979672bb5d217ba1cfaa755b8246e36a9dc731cd4c6bc1e0a837900da07f2cbab7daceeb771f640bd989b80d3b48b91d144e116d89a613cba836e90d4e7b67", 0xc3}, {&(0x7f0000000200)="30cf2aba97fe", 0x6}, {&(0x7f0000001c80)="f5f6c051ec7b0a6fbe4f694024221250f58faed014595c3fd7acd23137246afacabe13818f08b5f083d9a25462debad7ab4062173fb7095629e60008679f94b1158394a87999f836bbba42d7f39bcf3a82cb17bd6634c99f9c5e942cfe698870e279785b5660b65b5e9e1efccbdcfae772882f40e89f0e812ec0fa209442574cf260a49e7cfc1715522c044333a961e6d0573b72662283882f51567cd00542bfae26baf230e8bbb3f5086662fd8356ee8fc18761ca521cc36d6c20ddcbcc051bc12620f8a4bcd4ca27", 0xc9}, {&(0x7f0000001d80)="610d7e30110f20b3c6dc3dbd4ca954ccd7d1eb0c06cac31493bcfe898ff2b9087855d93a65eff4e85cab453353b2de6fe691bef81c160ef9c463c6ac77699fc74992237b3f26fe98fbabae9d5229823fe09477a4af94905323f02a22aa7caa2943c353f0b662004491c64cd4b7c665b5220a3fd1228a4273354a91106f4d", 0x7e}, {&(0x7f0000001e00)="faedaf89c9958a93430d89bd28de3582dfe01e602ebce8fe0887cb4491dae4768b57686f841f9b77917a890d3aab4c42e39d9917f02c7e4ff9066165c372b5a6105c1b20c15002efd18e05578c38db6d3bd84cb5c0c3595137759a79c54e9029314ca87564561097632430153b269138aa430b36827780b32a9f14093265d021f2f0a95b1dda415b2715155cd871e70d8cc425f51fdf0a3ed6e6", 0x9a}, {&(0x7f0000001ec0)="199fd78a3c0076a379310b829da4bcee4587471c3458c030ede25ba806b5ebd0af44e1b1f0afbb5fa06f905bd6820998e54097f3087ffe85096935c2dd7be9beea63e8172584442ec14b0afebf169ac9e0b603cc7b612bfe1c1d58e0d7b95d5dd9315e58f34c209ef173493c7a613b2ae4a5ded7c3e3a54a1a81069eb2ccd9266903579530d6ad0fffd1415b475f7817c21208e08521278206aea32c82fe62af8f0d2bfcba48d979086c35584f2f4765cbd9543ac1719eb46ac99be70849bf9a642c763c755a17cd7d2a8d1ad711f80ef14df9b2a12f21eec0ac704dbf", 0xdd}, {&(0x7f0000001fc0)="37f16e3391b59365c25f20c2abced50452fa13783ee309ffbb573d733d6842611ba5906f72957d3192452dc25f1572bf5ae9a5", 0x33}], 0xa, &(0x7f00000020c0)=[{0x58, 0x112, 0x400, "0a9d0bc3194891b835786b74220bae7a10e7cdb1d6db58452b6525fea5d317464e1524198e1e39d04572802a243e8ac235d4232c4f0843550709884e0853d2580bdc07"}], 0x58}}, {{&(0x7f0000002140)=@can, 0x80, &(0x7f00000022c0)=[{&(0x7f00000021c0)="3bcdc0c21d5110622f97b6d710e9f1cadbf12d3801530309a4e2162db43c04f65b664997cf39e06a3d6222c26c7df1dc224006d55cd03b8327c69874f0003ac4c865b1176acdddd21ced3db7c769bf7def5b66d442e94b3b333ffe0da971c5729ecfe60b565ad689d4b67c32", 0x6c}, {&(0x7f0000002240)="a2d3f368d9511a10b44089373eebd6ccbd798079d50ccda9a6c0e311", 0x1c}, {&(0x7f0000002280)="109148b9f90b6f945ea55902ab28cb7894f47a3c89e169bb2855408ae37ca25cd9dbc1", 0x23}], 0x3, &(0x7f0000002300)=ANY=[@ANYBLOB="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"], 0x108}}], 0x3, 0x4008040) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) r3 = accept(r0, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000000)) recvfrom$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 23:43:01 executing program 4: r0 = socket$inet(0x2, 0x4000000003, 0x20400000087) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'nat\x00', 0x0, 0x3, 0xfffffe92, [], 0x1000031f, &(0x7f0000000040), &(0x7f0000000200)=""/4096}, &(0x7f0000000000)=0x108) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400000, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000080)=0x2) 23:43:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x3, 0x0, 0xf16, 0xfffffffffffffffb}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000400)={0x8000}) r3 = dup(r0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000380)={{0x2, 0x4e21, @multicast2}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x50, {0x2, 0x4e22, @remote}, 'team_slave_1\x00'}) r4 = syz_open_procfs(r1, &(0x7f0000000000)='sessionid\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x1d8, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x65d4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xbf0}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x2044410}, 0x40001) 23:43:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, 0x14) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000200)={0x5d, @local, 0x4e23, 0x4, 'nq\x00', 0x8, 0x0, 0x38}, 0x2c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)=""/38, &(0x7f00000000c0)=0x26) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/d\x03\x00\x00\x00\x00\x00\x00\x00di#\x00', 0x4ffffffffffffff, 0x600842) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10004, 0x2, 0x2000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 23:43:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x32, 0x0) 23:43:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="03000000", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={r3, 0x2}, 0xc) setsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x1c) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f0000000040)=0x80000) 23:43:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000100)={0x0, 0x1, 0x2, &(0x7f00000000c0)=0x80}) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1020002}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x64, 0x0, 0xe521962a9994a83f, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4542}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffff80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffff2f5e}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x18}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0xd15}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}]}, 0x64}, 0x1, 0x0, 0x0, 0xf33d40aaaaf196ad}, 0x4000800) 23:43:01 executing program 4: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000100)="0480", 0x2, r0) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="297a1c310cc7bfa28b8dbc21a8981337c41a8cf5e65239b382c4bb76e22ab51678a892fd303227dd7803a3da033d48067ecbd0a3712df8efe56aacdad56db9192fb02c43b6948f09f54b50963d89c88167cade611e2ddb68236b4d6004b411413a5de4a65c894b411a4655f192f42942b7ed3d89f0893c951d3d64fa503ea4d0a2c9950a52f26d30d877f320e4c3574dfd5c008b7590219a07d86073060d1fdab6eec7c1060a0f2c50c2edd257e0d1330424bb510478cc203630914f081e2879d59e8ae0dad369ac6bb0eb8b630824f3349b417399e6b45bd4d16056103b425637c0074cf712381ba61f23c44fe9d2fcac18", 0xf2, r0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000100)="0480", 0xffffffffffffff87, r2) keyctl$search(0xa, r1, 0xfffffffffffffffe, 0x0, r2) 23:43:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000000)={0x20, 0x54, &(0x7f00000000c0)="b876ae1c6d58d5e9641737a75cf7049d3e1039bb1e29d824dba174881af925f7bc98eaa13df1a80d40e8e8dcb584a9504aedda24934a3f77cee4e0d0bd6bfcaa2957041e37807897baa17e5d2e5aa999d6400ff3bf115d835a604fd7cf2540958b3bc58f32407c5e34158d6eb607e8d114b1b804478e72fe28d32a0ea785f434e9512821e8de857ce6ad20fba38c788d413652da46393bdbbb2d7caf3f8f61330028625975", {0xf7, 0x7f, 0x30314142, 0x0, 0x1f, 0xfffffffffffffff9, 0xb, 0x4}}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="4efb7ba3c0460000002f006c00000000e7ffffff014408050307000000000209000400c3ed8ba7000800"/56], 0x38) 23:43:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000080)="94eacdd27180f6b70950500ab64768edccef19e4ae735cfa203d6114a29a4c6e706a3aa62a762c0a34e3c419106780a6658ea7e6ed66936b336b703b17a69d54124c6a0129000317818af8734ef6c900f204806e05d681e0912d555d76dc2ecde1d7e58f534b7e86f6a5e32f2b74c1cb648d76580c1a3f2657596f842b0e429b8d7387c3adc004ae8a36796d04178564694c4b0c0e350297d137363b86dbb5ec2e7ea7a972e5d15f9ae191e6d3a4e19dab3817b06caa37ebae744888f7c542ee77ed43aba414250d6dc188e9d600461e8e8d957f5dc32b3ce1323bf3bfbd34c9", 0xe0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @loopback}, 0xc) setsockopt$sock_linger(r2, 0x1, 0x3d, &(0x7f0000000000)={0x0, 0x100001}, 0x8) 23:43:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r4 = fcntl$getown(r3, 0x9) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x34c, 0x1, 0x1, 0x200, 0x70bd26, 0x25dfdbfb, {0xc, 0x0, 0x5}, [@generic="bdb82df60754c9f57a146498c60ac8f975e4be15", @generic="a23574d58f5a03bbeadc2bf63b5ec8bf49e6791cb4f5a519b1428a1779a8792f2e5a5bbfc5aea945e646568b3216abe3be9a1b34a2b2c263b4cd96855a2ff26d73351a076938f0a2fd4e91078616a3250d73443da6d709070d4063ed72fa68159f9417875dca1afab95f1e73cfbb0aecb1d08c26e79757d811eeac8891b0f1cad2882f135674b1f90bd534fd4d8e03be54fcf77ca3784762ce5daf37fcdc5080203ec59bad76589d8a8d5ad3366c8f25d688", @nested={0x7c, 0xa, [@generic="0c4e2327b5ef55df2c427000f430a07169e44ddeee5d18a43045fb2519435932d216588c083fec0a188af140e1ae92d1282ff9573b9c9633c063040828f3cd19a9f5d78fa65437d777d399f418edb8ea9a2ca54b2bdd1259ffad2a94172e037edbcd10", @typed={0x14, 0x7c, @ipv6=@loopback}]}, @nested={0x18, 0x63, [@typed={0x14, 0x38, @ipv6=@mcast2}]}, @typed={0x8, 0x2e, @pid=r4}, @nested={0x1d4, 0x15, [@typed={0xd0, 0x2d, @binary="036fc8641f01fb0b6f1ca153ce6a0bb205955ad0dbe84d9bd13012b4522a4f4afbcb155e594d9c6b4bd5445b7890aac305a3cba535d7ecd271acbfb4ff08b5c076dc26be12235e7da166ac96dc0423377b24805dc0d31be610af9671f505b1f70dbd28b8b6b4eee9136ecc3cf97008f1c9c989a23e70ae61950a5ef6fd639d76679b020d5e01dfca69a47abbeb0730b9f5cf39f665b24f64552817cf3632c7d256942ba21113dc17d00b816f7bd078706544aca2de635d9f93e6b9397133697b73c6af5b29880e89fd4535b2"}, @typed={0x8, 0x72, @pid=0xffffffffffffffff}, @generic="023106af7f7a5cc238cb27847d4d9e1d7994ea20401a29f9bdca227481cb3d9c2f1baf53aed7b8ea6e71d3c1f1fea5f9e7f4d0f44c76211c5369301abfbe911832c3c0844aca7643dcd0fb716c214088e449b522cfc50e18af1d048fa2a9ca69fa908de891055a0ac0a01dbb17fe9ec4b1f1876b2693d0384612136a207726dfe31b58d1a8c3f6729a96cb3073e6aaea64b749b12888c400b9e667b062da22f174ed0021dd5707776a78cc633cf535d55a0463b8975dff09911721ea84ebe8617be70c6482514451562ae17cc209026da4d6", @typed={0x14, 0x1e, @ipv6=@remote}, @typed={0x10, 0x63, @str='/dev/vbi#\x00'}]}]}, 0x34c}, 0x1, 0x0, 0x0, 0x10}, 0x10) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) 23:43:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffffffffffffff080045000030000000000001e4b4f3e54c0f450c78909078ac7014bbac141411050290780000020042000000000000000001"], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r1, &(0x7f0000000100)=&(0x7f00000000c0)={&(0x7f0000000040), 0x0, &(0x7f0000000080)}, &(0x7f0000000180)=0x18) r2 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x5a3, 0x2080) read$hidraw(r2, &(0x7f0000000240)=""/254, 0xfe) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x1) 23:43:01 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\x8b\xaa\xffIb\x9e\xc1\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000180)="06", 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x8000000003, 0x82) setsockopt$inet_mreqn(r1, 0x0, 0x15, &(0x7f0000000400)={@multicast2, @multicast1}, 0xc) 23:43:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/Hev/uinput\x00', 0x200000000801, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x200, 0x80}, 0xc) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x8, 0x4) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x6], [0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) accept4$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x0) write$uinput_user_dev(r0, &(0x7f0000000540)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x2000]}, 0x45c) 23:43:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0x20000000fd], 0x1f004}) r3 = msgget$private(0x0, 0x544) msgctl$IPC_RMID(r3, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x1}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:43:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x400000000, 0x22f060) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000140)={0x1, 0x1ff}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) unshare(0xea020c00) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x11000) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:43:01 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\x8b\xaa\xffIb\x9e\xc1\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/\x00\xec\xff\xff\xff', 0x0, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000100)) write(r0, &(0x7f0000000040)="06", 0x1) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) sync_file_range(r3, 0x2, 0x2, 0x4) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000003, 0x4144010, r3, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x3) getsockopt$inet_int(r4, 0x10d, 0xe2, 0x0, &(0x7f0000000000)) 23:43:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000280)='cmC#D#c@\x00\x00\x00\x00\x00\x00\x00\x009\x00', 0xff, 0x180a0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000200)=0x4) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000040)="00c0080101f191c41bb9a964ae557b0daae2cf32d421cac1799b5cd01502000000870fb8790000000000", 0x2a, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000b5870c31914d9611c9ecf97756360adb634a120a4d812ca6986dd2ddba042f4e54049d881ce9334a266ab31851a6cdbb89a32ae17451ffd8f9785e0dd4b0ad8bfbfe2ac89c99e15b49ac7433b0cf65cdea940c9b71a1d0619263a4eb52962b064a", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r4, 0x6, 0x6}, 0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 276.916953][T11699] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 23:43:02 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000040)={0x400000000000, 0xff, 0x5d, 'queue0\x00', 0x9}) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x2001) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&\x00', 0x2, 0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x100, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000240), 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x66, 0x20a000) ioctl$KDSETLED(r2, 0x4b32, 0x8) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x1ff, 0x100) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000340)=""/198) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x404183, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x8, 0x101002) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000004c0)={0x10001, 0x9, 0x3}) r5 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x9, 0x80) r6 = getuid() r7 = getegid() write$P9_RGETATTR(r5, &(0x7f0000000540)={0xa0, 0x19, 0x2, {0x601, {0xc0, 0x1, 0x1}, 0x0, r6, r7, 0x1, 0x1, 0x1, 0x4, 0x0, 0x7, 0x6, 0x3, 0x2, 0x7fffffff, 0xffff, 0x4, 0x5a9a64fc, 0x4, 0x200}}, 0xa0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000600)) r8 = syz_open_dev$media(&(0x7f0000000640)='/dev/media#\x00', 0x2, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, &(0x7f0000000680)={0x401, 0x1}, 0x2) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x486480, 0x0) ioctl$GIO_FONT(r9, 0x4b60, &(0x7f0000000700)=""/36) r10 = syz_open_procfs(0x0, &(0x7f0000000740)='oom_adj\x00') ioctl$KVM_INTERRUPT(r10, 0x4004ae86, &(0x7f0000000780)=0xbf9) r11 = syz_open_dev$media(&(0x7f00000007c0)='/dev/media#\x00', 0x900000000000, 0x40) ioctl$KVM_REINJECT_CONTROL(r11, 0xae71, &(0x7f0000000800)={0xb4f3}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000840)={0xf8, 0x8aa, 0x8}) r12 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x40800, 0x0) getpeername$packet(r12, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) 23:43:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.s\x01@\x00\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x44) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs, 0x4d, 0x0}, 0x0) 23:43:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r1, 0x0, 0xfffffe7d, 0x800) 23:43:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="71e602001fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000005c0)="7cc700008635745aed", 0x9}, {&(0x7f0000000100)="873b70bf1705e4b1", 0x8}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000004700)=[{{0x0, 0xfffffffffffffe6f, &(0x7f0000001640)=[{&(0x7f0000000200)=""/149, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 23:43:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30fc7fd66b822000f00d866ba6100ec8143ef0000000066ba4200b807000000ef64660fc7b7080000000f01df0f01dfc4e2650cf4b9a10900000f32"}], 0x1555555555555696, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 277.126978][T11720] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 23:43:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f00000009c0)=0xfffffe3a) 23:43:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r2, 0x0, 0x0, 0x0) 23:43:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000400e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002bc0)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="d62d9bdfe9cfa39f04e543346237a73cc3ae99c4a53e664bb607c775bda20078093b2be9c9b8de4e51765df5657dc50a4ec7a95e43f221b2edda", 0x3a}, {&(0x7f0000000100)="df7bbac4815f3ca405603dde12f69717eaae2cc78ee606ef7938ae43ae4363627ca9a75acfaf", 0x26}], 0x2}], 0x1, 0x0) recvmsg(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000280)=""/95, 0x5f}], 0x1}, 0x0) 23:43:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x5) fallocate(r1, 0x8, 0x0, 0x8000) 23:43:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30fc7fd66b822000f00d866ba6100ec8143ef0000000066ba4200b807000000ef64660fc7b7080000000f01df0f01dfc4e2650cf4b9a10900000f32"}], 0x1555555555555696, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:43:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2e020000) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) accept$unix(r3, 0x0, &(0x7f0000000040)) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x13}}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) 23:43:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x6cefff7f) [ 277.980065][T11783] IPVS: ftp: loaded support on port[0] = 21 [ 278.130647][T11783] chnl_net:caif_netlink_parms(): no params data found [ 278.164864][T11783] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.172044][T11783] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.180408][T11783] device bridge_slave_0 entered promiscuous mode [ 278.188816][T11783] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.196086][T11783] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.204801][T11783] device bridge_slave_1 entered promiscuous mode [ 278.226772][T11783] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.238257][T11783] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 278.261172][T11783] team0: Port device team_slave_0 added [ 278.268965][T11783] team0: Port device team_slave_1 added [ 278.326843][T11783] device hsr_slave_0 entered promiscuous mode [ 278.363981][T11783] device hsr_slave_1 entered promiscuous mode [ 278.403487][T11783] debugfs: Directory 'hsr0' with parent '/' already present! [ 278.423735][T11783] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.430905][T11783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.438613][T11783] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.445818][T11783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.496619][T11783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.511845][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.521340][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.529714][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.538844][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 278.554700][T11783] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.566712][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.575657][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.582792][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.598897][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.608131][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.615335][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.639664][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.658594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.668305][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.685961][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.700848][T11783] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 278.713399][T11783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.722492][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.749888][T11783] 8021q: adding VLAN 0 to HW filter on device batadv0 23:43:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x2fc, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000630b00000000feffffff0100000019000000000000000000726f7365300000000000000000040000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726bc95e810400000000000000000000000000000000000000000000000010000000000000000000000000000000ddff9049d228ffff0000000072636469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffff000000000000000000000000000000000000000000000000000000000040000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f75700000000000000000000000000000000000000000000000000000080000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e617400"]}, 0x374) wait4(0x0, 0x0, 0x0, 0x0) 23:43:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000540)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000980)=ANY=[@ANYBLOB="7400000024000907e6f18e29b05600000000024c", @ANYRES32=r1, @ANYBLOB="00000000e139ffffffffffff080001007366710006000500fffff0000010e104deccbbbde735b9a0000000000000000000856f000033cc3598c9aa8178bdf1000000000000000000000000de7f46000000a25e6dbe016939a309000000007f0000000000009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d84553f8e485cea3b49c5ceed6fffcfeaab4260fca524afef20c0034fbd36262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6680000000000000008863af06767a426b3dbe25f3d317796e5f914a292528d7d2bef3b8444b64c875270850633abeb7d7a89d0f3cf2074bb2e180772593cd728026dfe7b7bc2cbc705ed8982846a95700983ea22eefa47c53252758e28ba5302e15a86aff40a0cb6088e18f3326f430793b951cdec961a60ae11cee5afa3a5dcd32cb951da688b87961591b4e95cb90b9aba2ff8edd4c9fe9bbf94b7fd39bf4cd8585a84d95825836a521be8ff0be4f678f6f57a42669c46857b1fc820f268acc2bf76ffac8609e5e9c368f982d3a82203c8eb309e9ca71bd4ec4b4faee514d2a96b4106f0906f7005208011532e846630a2faf58a8f239f76122219597833eec0284757d55f2c26eb7e3dc23411164107a55fcfb6dacb76566d9952417164bf32bfe67d5beab8ded44f2377c8901f5be9d03c94e4a955d878a537d10d6d9e104bf19db4eebd14e4bbfae2a047064aa47bc4fff5a920130c75e1b4fbd938b3f618181278e7c8543e561f65d48df666df8449f77b2058661c989f35c0c68b15357957b2f548ce811348fbcaf31387f6f5a542385d189a9788d09bc7235494dc42000b10f724605ca8def273fef4e8be6b562890f03e7a13c2c28e702541150f4959fcabd3f0ae50bce5e1f7583404e397a9a204b26a2ac6a513564e9eb5453551fe5df4467536f5b42545cb31ad190640a42395f826f23df7ce1a740428b83f09dcb4b04f4d18402b50b7e89f5a2ffac85eca1232aece16642f0412921833649dd4e307651a4b45f9c41420cd19464ba39db6111081ef77bc114e01b2d83002cd8dd7ef8ffc470c9f799efd951ef9ee49c9e5cde58bc9a92b9ccfb0cb683083e25081c9c9f94bce1f27e8a655ec4f29f1aea76a9365a6b8f0415427051af7f8a23bcb012a0b63bf00000000000000000000002742a07e4d51a1a507734ce02b01ac049e16fdc6f54f7abefcbe4d3f62d5867d9b44f1e99df87556d863b99f59e34c46a036df55392c46dac1dd743a0b0c5cde4d8e143205746e2a8c1cf9714f900e26dbe0932305a60a427a6e9a"], 0x74}}, 0x0) sendmmsg(r0, &(0x7f00000001c0), 0x11e, 0x0) 23:43:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30fc7fd66b822000f00d866ba6100ec8143ef0000000066ba4200b807000000ef64660fc7b7080000000f01df0f01dfc4e2650cf4b9a10900000f32"}], 0x1555555555555696, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:43:04 executing program 3: seccomp(0x1, 0x0, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xffffffffffffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 23:43:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) accept4$tipc(r1, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x80800) accept4$unix(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x1c0000) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) r3 = accept4(r0, 0x0, 0x0, 0x140800) unshare(0x2a000400) sendmmsg(r3, 0x0, 0x0, 0x0) 23:43:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)) [ 279.062094][T11798] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 23:43:04 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000000080040, 0x0) dup2(r1, r0) 23:43:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x2a000400) sendmmsg(r1, 0x0, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0x10f, {0x0, r3}}, 0x18) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000100)=""/243) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000000)={0x8000001, 0x0, @value}) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000000)=0x1) 23:43:04 executing program 2: io_setup(0x8, &(0x7f0000000280)=0x0) r1 = socket$inet6(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 23:43:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x120) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 23:43:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30fc7fd66b822000f00d866ba6100ec8143ef0000000066ba4200b807000000ef64660fc7b7080000000f01df0f01dfc4e2650cf4b9a10900000f32"}], 0x1555555555555696, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 279.411746][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.419879][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.427547][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.435237][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.442785][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.450407][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.460032][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.467688][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.475306][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.482841][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.490451][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.498055][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.505646][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.513161][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.520751][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.528315][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.535916][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.543489][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.545519][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 279.545556][ T30] audit: type=1326 audit(1569195784.591:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11796 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0xffff0000 [ 279.551002][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.587087][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.594689][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.602249][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.609879][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.617530][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.625149][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.632705][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.640343][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.647969][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.655603][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.663368][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.670972][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.678598][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.686228][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.693828][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.701481][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 23:43:04 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4c400, 0x0) [ 279.709215][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.717047][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.724677][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.732243][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.739891][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.747519][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.755151][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 23:43:04 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x922f358ed6f687ba) [ 279.762708][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.770374][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.777994][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.785657][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.793216][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.800856][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 23:43:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30fc7fd66b822000f00d866ba6100ec8143ef0000000066ba4200b807000000ef64660fc7b7080000000f01df0f01dfc4e2650cf4b9a10900000f32"}], 0x1555555555555696, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 279.808607][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.816226][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.823853][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.831415][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.839047][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.846692][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.854302][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.861897][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.869532][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.877180][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.884848][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.892404][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.900055][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.907666][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.915283][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.922822][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.930458][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.938078][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.945678][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.953335][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.960925][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.968680][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.976322][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.983953][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.991492][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 279.999157][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.006781][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.014450][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.022160][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.029774][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.037407][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.045040][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.052622][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.060258][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.067894][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.075488][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.083063][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.090693][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.098344][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.105956][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.113578][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.121159][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.128801][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.136447][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.144035][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.151627][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.159266][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.166981][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.174636][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.182217][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.190088][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.197748][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.205394][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.213026][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.220650][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.228378][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.235979][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.243604][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.251200][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.258895][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.266533][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.274165][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.283115][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.290776][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.298404][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.306047][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.313672][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.321220][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.328875][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.336517][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.344144][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.351699][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.359367][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.366987][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.374590][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.382144][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.390024][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.397685][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.405324][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.412884][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.420511][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.428147][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.436121][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.443705][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.451250][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.458869][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.466498][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.474087][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.481647][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.489268][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.496891][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.504503][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.512231][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.519839][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.527432][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.535025][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.542569][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.550201][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.557837][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.565754][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.573377][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.580943][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.588597][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.596219][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.604035][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.611685][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.619350][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.627130][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.634753][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.642350][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.649980][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.657645][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.665299][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.672852][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.680540][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.688190][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.696464][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.704083][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.711646][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.719396][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.727118][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.734776][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.742327][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.749966][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.757781][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.765413][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.773368][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.780936][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.788579][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.796235][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.803837][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.811418][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.819033][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.826671][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.834270][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.841813][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.849421][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.857045][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.864661][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.872216][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.879855][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.887477][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.895097][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.902736][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.910348][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 23:43:05 executing program 3: ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) 23:43:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30fc7fd66b822000f00d866ba6100ec8143ef0000000066ba4200b807000000ef64660fc7b7080000000f01df0f01dfc4e2650cf4b9a10900000f32"}], 0x1555555555555696, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:43:05 executing program 3: socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.s\x01@\x00\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x44) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x0, 0x0, 0xffffff7f}, 0x4d, 0x0}, 0x0) 23:43:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30fc7fd66b822000f00d866ba6100ec8143ef0000000066ba4200b807000000ef64660fc7b7080000000f01df0f01dfc4e2650cf4b9a10900000f32"}], 0x1555555555555696, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 280.917973][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.925523][T11601] ================================================================== [ 280.925598][ T34] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.933604][T11601] BUG: KMSAN: kernel-infoleak in _copy_to_user+0x16b/0x1f0 [ 280.933621][T11601] CPU: 0 PID: 11601 Comm: syz-executor.3 Not tainted 5.3.0-rc7+ #0 [ 280.933628][T11601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.933654][T11601] Call Trace: [ 280.969702][T11601] dump_stack+0x191/0x1f0 [ 280.974049][T11601] kmsan_report+0x162/0x2d0 [ 280.978549][T11601] kmsan_internal_check_memory+0x189/0x4e0 [ 280.984345][T11601] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 280.990287][T11601] kmsan_copy_to_user+0xa9/0xb0 [ 280.995140][T11601] _copy_to_user+0x16b/0x1f0 [ 280.999799][T11601] do_ipt_get_ctl+0x9ca/0x1010 [ 281.004582][T11601] ? compat_do_ipt_set_ctl+0x3c20/0x3c20 [ 281.010244][T11601] nf_getsockopt+0x481/0x4e0 [ 281.014873][T11601] ip_getsockopt+0x29a/0x460 [ 281.019461][T11601] ? compat_ip_setsockopt+0x380/0x380 [ 281.024820][T11601] tcp_getsockopt+0x1c6/0x1f0 [ 281.029488][T11601] ? tcp_get_timestamping_opt_stats+0x1850/0x1850 [ 281.035942][T11601] sock_common_getsockopt+0x13f/0x180 [ 281.041311][T11601] ? sock_recv_errqueue+0x8f0/0x8f0 [ 281.046499][T11601] __sys_getsockopt+0x533/0x7b0 [ 281.051349][T11601] __se_sys_getsockopt+0xe1/0x100 [ 281.056385][T11601] __x64_sys_getsockopt+0x62/0x80 [ 281.061405][T11601] do_syscall_64+0xbc/0xf0 [ 281.065838][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.071720][T11601] RIP: 0033:0x45c51a [ 281.075617][T11601] Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 281.095220][T11601] RSP: 002b:0000000000a6f618 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 [ 281.103616][T11601] RAX: ffffffffffffffda RBX: 0000000000a6f640 RCX: 000000000045c51a [ 281.111694][T11601] RDX: 0000000000000041 RSI: 0000000000000000 RDI: 0000000000000003 [ 281.119663][T11601] RBP: 0000000000714e80 R08: 0000000000a6f63c R09: 0000000000004000 [ 281.130061][T11601] R10: 0000000000a6f740 R11: 0000000000000212 R12: 0000000000000003 [ 281.138022][T11601] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000713a40 [ 281.146104][T11601] [ 281.148416][T11601] Uninit was stored to memory at: [ 281.153429][T11601] kmsan_internal_chain_origin+0xcc/0x150 [ 281.159134][T11601] __msan_chain_origin+0x6b/0xe0 [ 281.164056][T11601] alloc_counters+0x69d/0x8c0 [ 281.168716][T11601] do_ipt_get_ctl+0x7da/0x1010 [ 281.173465][T11601] nf_getsockopt+0x481/0x4e0 [ 281.178043][T11601] ip_getsockopt+0x29a/0x460 [ 281.182617][T11601] tcp_getsockopt+0x1c6/0x1f0 [ 281.187408][T11601] sock_common_getsockopt+0x13f/0x180 [ 281.192784][T11601] __sys_getsockopt+0x533/0x7b0 [ 281.197632][T11601] __se_sys_getsockopt+0xe1/0x100 [ 281.202643][T11601] __x64_sys_getsockopt+0x62/0x80 [ 281.207656][T11601] do_syscall_64+0xbc/0xf0 [ 281.212060][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.217929][T11601] [ 281.220266][T11601] Uninit was stored to memory at: [ 281.225277][T11601] kmsan_internal_chain_origin+0xcc/0x150 [ 281.230981][T11601] __msan_chain_origin+0x6b/0xe0 [ 281.235905][T11601] alloc_counters+0x69d/0x8c0 [ 281.240740][T11601] do_ipt_get_ctl+0x7da/0x1010 [ 281.245495][T11601] nf_getsockopt+0x481/0x4e0 [ 281.250069][T11601] ip_getsockopt+0x29a/0x460 [ 281.254645][T11601] tcp_getsockopt+0x1c6/0x1f0 [ 281.259919][T11601] sock_common_getsockopt+0x13f/0x180 [ 281.265277][T11601] __sys_getsockopt+0x533/0x7b0 [ 281.270293][T11601] __se_sys_getsockopt+0xe1/0x100 [ 281.275308][T11601] __x64_sys_getsockopt+0x62/0x80 [ 281.280312][T11601] do_syscall_64+0xbc/0xf0 [ 281.284718][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.290585][T11601] [ 281.292897][T11601] Uninit was stored to memory at: [ 281.297915][T11601] kmsan_internal_chain_origin+0xcc/0x150 [ 281.303706][T11601] __msan_chain_origin+0x6b/0xe0 [ 281.309147][T11601] ipt_do_table+0x133d/0x28e0 [ 281.313807][T11601] iptable_mangle_hook+0x460/0x700 [ 281.318901][T11601] nf_hook_slow+0x18b/0x3f0 [ 281.323399][T11601] ip_rcv+0x259/0x740 [ 281.327405][T11601] netif_receive_skb_internal+0x8f4/0xc20 [ 281.333110][T11601] napi_gro_receive+0x682/0xb90 [ 281.337990][T11601] gro_cell_poll+0x25c/0x3f0 [ 281.342589][T11601] net_rx_action+0x74b/0x1950 [ 281.347274][T11601] __do_softirq+0x4a1/0x83a [ 281.351767][T11601] run_ksoftirqd+0x25/0x40 [ 281.356171][T11601] smpboot_thread_fn+0x4a3/0x990 [ 281.361093][T11601] kthread+0x4b5/0x4f0 [ 281.365149][T11601] ret_from_fork+0x35/0x40 [ 281.369543][T11601] [ 281.371853][T11601] Uninit was stored to memory at: [ 281.376865][T11601] kmsan_internal_chain_origin+0xcc/0x150 [ 281.382567][T11601] __msan_chain_origin+0x6b/0xe0 [ 281.387567][T11601] eth_type_trans+0x683/0xa90 [ 281.392246][T11601] ip_tunnel_rcv+0xf47/0x1be0 [ 281.396919][T11601] gre_rcv+0x1526/0x1900 [ 281.401152][T11601] gre_rcv+0x2dd/0x3c0 [ 281.405294][T11601] ip_protocol_deliver_rcu+0x722/0xbc0 [ 281.410744][T11601] ip_local_deliver+0x62a/0x7c0 [ 281.415579][T11601] ip_rcv+0x6c5/0x740 [ 281.419556][T11601] process_backlog+0xef5/0x1410 [ 281.424391][T11601] net_rx_action+0x74b/0x1950 [ 281.429062][T11601] __do_softirq+0x4a1/0x83a [ 281.433651][T11601] do_softirq_own_stack+0x49/0x80 [ 281.438659][T11601] __local_bh_enable_ip+0x184/0x1d0 [ 281.443842][T11601] local_bh_enable+0x36/0x40 [ 281.448416][T11601] ip_finish_output2+0x20dc/0x25d0 [ 281.453512][T11601] __ip_finish_output+0xaf8/0xda0 [ 281.458518][T11601] ip_finish_output+0x2db/0x420 [ 281.463450][T11601] ip_output+0x541/0x610 [ 281.467690][T11601] ip_push_pending_frames+0x243/0x460 [ 281.473098][T11601] raw_sendmsg+0x2df8/0x46d0 [ 281.477679][T11601] inet_sendmsg+0x2d8/0x2e0 [ 281.482164][T11601] ___sys_sendmsg+0x12c4/0x1590 [ 281.487008][T11601] __se_sys_sendmsg+0x305/0x460 [ 281.491843][T11601] __x64_sys_sendmsg+0x4a/0x70 [ 281.496596][T11601] do_syscall_64+0xbc/0xf0 [ 281.501011][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.506893][T11601] [ 281.509204][T11601] Uninit was stored to memory at: [ 281.514243][T11601] kmsan_internal_chain_origin+0xcc/0x150 [ 281.519951][T11601] __msan_chain_origin+0x6b/0xe0 [ 281.524873][T11601] skb_pull_rcsum+0x2d4/0x500 [ 281.529537][T11601] __iptunnel_pull_header+0x14d/0xbc0 [ 281.534978][T11601] gre_rcv+0x6d9/0x1900 [ 281.539116][T11601] gre_rcv+0x2dd/0x3c0 [ 281.543170][T11601] ip_protocol_deliver_rcu+0x722/0xbc0 [ 281.548615][T11601] ip_local_deliver+0x62a/0x7c0 [ 281.553452][T11601] ip_rcv+0x6c5/0x740 [ 281.557419][T11601] process_backlog+0xef5/0x1410 [ 281.562254][T11601] net_rx_action+0x74b/0x1950 [ 281.566916][T11601] __do_softirq+0x4a1/0x83a [ 281.571406][T11601] do_softirq_own_stack+0x49/0x80 [ 281.576416][T11601] __local_bh_enable_ip+0x184/0x1d0 [ 281.581601][T11601] local_bh_enable+0x36/0x40 [ 281.586186][T11601] ip_finish_output2+0x20dc/0x25d0 [ 281.591282][T11601] __ip_finish_output+0xaf8/0xda0 [ 281.596377][T11601] ip_finish_output+0x2db/0x420 [ 281.601301][T11601] ip_output+0x541/0x610 [ 281.605532][T11601] ip_push_pending_frames+0x243/0x460 [ 281.610890][T11601] raw_sendmsg+0x2df8/0x46d0 [ 281.615469][T11601] inet_sendmsg+0x2d8/0x2e0 [ 281.619959][T11601] ___sys_sendmsg+0x12c4/0x1590 [ 281.624792][T11601] __se_sys_sendmsg+0x305/0x460 [ 281.629626][T11601] __x64_sys_sendmsg+0x4a/0x70 [ 281.634381][T11601] do_syscall_64+0xbc/0xf0 [ 281.638784][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.644655][T11601] [ 281.646966][T11601] Uninit was stored to memory at: [ 281.651973][T11601] kmsan_internal_chain_origin+0xcc/0x150 [ 281.657677][T11601] kmsan_memcpy_memmove_metadata+0x25b/0x2d0 [ 281.663640][T11601] kmsan_memcpy_metadata+0xb/0x10 [ 281.668748][T11601] __msan_memcpy+0x56/0x70 [ 281.673148][T11601] pskb_expand_head+0x38a/0x19f0 [ 281.678082][T11601] ip_tunnel_xmit+0x2971/0x3320 [ 281.682921][T11601] erspan_xmit+0x1ef8/0x35c0 [ 281.689412][T11601] dev_hard_start_xmit+0x51a/0xab0 [ 281.694510][T11601] sch_direct_xmit+0x56c/0x18c0 [ 281.699347][T11601] __dev_queue_xmit+0x1e53/0x4270 [ 281.704356][T11601] dev_queue_xmit+0x4b/0x60 [ 281.708843][T11601] neigh_resolve_output+0xab7/0xb50 [ 281.714030][T11601] ip_finish_output2+0x1a8e/0x25d0 [ 281.719126][T11601] __ip_finish_output+0xaf8/0xda0 [ 281.724134][T11601] ip_finish_output+0x2db/0x420 [ 281.728983][T11601] ip_output+0x541/0x610 [ 281.733213][T11601] ip_push_pending_frames+0x243/0x460 [ 281.738762][T11601] raw_sendmsg+0x2df8/0x46d0 [ 281.743337][T11601] inet_sendmsg+0x2d8/0x2e0 [ 281.747823][T11601] ___sys_sendmsg+0x12c4/0x1590 [ 281.752758][T11601] __se_sys_sendmsg+0x305/0x460 [ 281.757602][T11601] __x64_sys_sendmsg+0x4a/0x70 [ 281.762353][T11601] do_syscall_64+0xbc/0xf0 [ 281.766755][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.772623][T11601] [ 281.774937][T11601] Uninit was created at: [ 281.779170][T11601] kmsan_internal_poison_shadow+0x58/0xb0 [ 281.784891][T11601] kmsan_slab_alloc+0xaa/0x120 [ 281.789640][T11601] __kmalloc_node_track_caller+0xb55/0x1320 [ 281.795525][T11601] __alloc_skb+0x306/0xa10 [ 281.799926][T11601] __ip_append_data+0x3901/0x52f0 [ 281.804952][T11601] ip_append_data+0x324/0x480 [ 281.809624][T11601] raw_sendmsg+0x2d02/0x46d0 [ 281.814202][T11601] inet_sendmsg+0x2d8/0x2e0 [ 281.818689][T11601] ___sys_sendmsg+0x12c4/0x1590 [ 281.823522][T11601] __se_sys_sendmsg+0x305/0x460 [ 281.828367][T11601] __x64_sys_sendmsg+0x4a/0x70 [ 281.833114][T11601] do_syscall_64+0xbc/0xf0 [ 281.837517][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.843399][T11601] [ 281.845713][T11601] Byte 8 of 16 is uninitialized [ 281.850545][T11601] Memory access of size 16 starts at ffffc900054f8000 [ 281.857296][T11601] Data copied to user address 0000000000a6f7c8 [ 281.863431][T11601] ================================================================== [ 281.871480][T11601] Disabling lock debugging due to kernel taint [ 281.877616][T11601] Kernel panic - not syncing: panic_on_warn set ... [ 281.884283][T11601] CPU: 0 PID: 11601 Comm: syz-executor.3 Tainted: G B 5.3.0-rc7+ #0 [ 281.893581][T11601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.903621][T11601] Call Trace: [ 281.906923][T11601] dump_stack+0x191/0x1f0 [ 281.911256][T11601] panic+0x3c9/0xc1e [ 281.915163][T11601] kmsan_report+0x2ca/0x2d0 [ 281.919658][T11601] kmsan_internal_check_memory+0x189/0x4e0 [ 281.925464][T11601] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 281.931353][T11601] kmsan_copy_to_user+0xa9/0xb0 [ 281.936206][T11601] _copy_to_user+0x16b/0x1f0 [ 281.940794][T11601] do_ipt_get_ctl+0x9ca/0x1010 [ 281.945572][T11601] ? compat_do_ipt_set_ctl+0x3c20/0x3c20 [ 281.951191][T11601] nf_getsockopt+0x481/0x4e0 [ 281.955780][T11601] ip_getsockopt+0x29a/0x460 [ 281.960368][T11601] ? compat_ip_setsockopt+0x380/0x380 [ 281.965726][T11601] tcp_getsockopt+0x1c6/0x1f0 [ 281.970407][T11601] ? tcp_get_timestamping_opt_stats+0x1850/0x1850 [ 281.976820][T11601] sock_common_getsockopt+0x13f/0x180 [ 281.982187][T11601] ? sock_recv_errqueue+0x8f0/0x8f0 [ 281.987385][T11601] __sys_getsockopt+0x533/0x7b0 [ 281.992237][T11601] __se_sys_getsockopt+0xe1/0x100 [ 281.997262][T11601] __x64_sys_getsockopt+0x62/0x80 [ 282.002276][T11601] do_syscall_64+0xbc/0xf0 [ 282.006795][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 282.012707][T11601] RIP: 0033:0x45c51a [ 282.016603][T11601] Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 282.036283][T11601] RSP: 002b:0000000000a6f618 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 [ 282.044692][T11601] RAX: ffffffffffffffda RBX: 0000000000a6f640 RCX: 000000000045c51a [ 282.052660][T11601] RDX: 0000000000000041 RSI: 0000000000000000 RDI: 0000000000000003 [ 282.060631][T11601] RBP: 0000000000714e80 R08: 0000000000a6f63c R09: 0000000000004000 [ 282.068592][T11601] R10: 0000000000a6f740 R11: 0000000000000212 R12: 0000000000000003 [ 282.076562][T11601] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000713a40 [ 282.085364][T11601] Kernel Offset: disabled [ 282.089700][T11601] Rebooting in 86400 seconds..