[ 74.409728] audit: type=1800 audit(1550335569.472:25): pid=10014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 74.429041] audit: type=1800 audit(1550335569.472:26): pid=10014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 74.448525] audit: type=1800 audit(1550335569.472:27): pid=10014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 75.569853] sshd (10079) used greatest stack depth: 54176 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.47' (ECDSA) to the list of known hosts. 2019/02/16 16:46:22 fuzzer started 2019/02/16 16:46:28 dialing manager at 10.128.0.26:39065 syzkaller login: [ 93.020370] ld (10175) used greatest stack depth: 53632 bytes left 2019/02/16 16:46:28 syscalls: 1 2019/02/16 16:46:28 code coverage: enabled 2019/02/16 16:46:28 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/02/16 16:46:28 extra coverage: extra coverage is not supported by the kernel 2019/02/16 16:46:28 setuid sandbox: enabled 2019/02/16 16:46:28 namespace sandbox: enabled 2019/02/16 16:46:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/16 16:46:28 fault injection: enabled 2019/02/16 16:46:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/16 16:46:28 net packet injection: enabled 2019/02/16 16:46:28 net device setup: enabled 16:48:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x1950, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x1cd, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1) sendto$inet6(r0, &(0x7f0000000000)="cc", 0x1, 0x0, 0x0, 0x0) [ 227.502283] IPVS: ftp: loaded support on port[0] = 21 [ 227.635188] chnl_net:caif_netlink_parms(): no params data found [ 227.697262] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.703838] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.712075] device bridge_slave_0 entered promiscuous mode [ 227.720615] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.727182] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.735365] device bridge_slave_1 entered promiscuous mode [ 227.765377] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.776151] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.804488] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.812807] team0: Port device team_slave_0 added [ 227.819111] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.827402] team0: Port device team_slave_1 added [ 227.833759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.842013] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.016376] device hsr_slave_0 entered promiscuous mode [ 228.182682] device hsr_slave_1 entered promiscuous mode [ 228.443272] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 228.450857] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 228.477448] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.483985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.491020] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.497640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.580275] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 228.586504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.599762] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.613158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.624716] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.635920] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.648262] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 228.665271] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 228.671377] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.684679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.692321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.700814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.710233] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.716700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.733677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.740874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.749662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.759232] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.765725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.781894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.788860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.804227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.817907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.826197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.835313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.844120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.854582] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.869723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.878165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.887016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.902847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 228.914855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 228.922440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.930991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.939422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.948036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.963179] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 228.969249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.992606] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 229.012651] 8021q: adding VLAN 0 to HW filter on device batadv0 16:48:44 executing program 0: io_setup(0x200000100000081, &(0x7f0000000080)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 16:48:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000000c0)={@mcast2}, 0x14) 16:48:44 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2000000100000003, 0x300) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x1ff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, 0x0) syz_genetlink_get_family_id$ipvs(0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x14}]}, 0x28}}, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0186416, &(0x7f0000000440)={0x0, 0x8, 0x8, 0x660, 0x1}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'team_slave_0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001980), 0x4924af2, 0x0) [ 229.862565] hrtimer: interrupt took 32904 ns 16:48:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) 16:48:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'ne\x80tevsim0\x00\x02\x00', 0x1402}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) close(r0) [ 230.667084] IPVS: ftp: loaded support on port[0] = 21 [ 230.826026] chnl_net:caif_netlink_parms(): no params data found 16:48:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'ne\x80tevsim0\x00\x02\x00', 0x1402}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) close(r0) [ 230.890408] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.897040] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.905212] device bridge_slave_0 entered promiscuous mode [ 230.933040] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.939533] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.947742] device bridge_slave_1 entered promiscuous mode [ 230.994554] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.013872] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.043513] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.051891] team0: Port device team_slave_0 added [ 231.059306] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 231.067820] team0: Port device team_slave_1 added [ 231.075455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.083812] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 16:48:46 executing program 0: capget(&(0x7f0000000500)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000540)) 16:48:46 executing program 0: unshare(0x28020400) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xef, 0x200000) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'bridge0\x00', {0x2, 0x4e23, @rand_addr=0x9}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, 0x0, 0x0) [ 231.177186] device hsr_slave_0 entered promiscuous mode [ 231.212267] device hsr_slave_1 entered promiscuous mode [ 231.253035] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 231.260545] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 231.290739] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.297273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.304354] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.310837] bridge0: port 1(bridge_slave_0) entered forwarding state 16:48:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='/dev/ashmem\x00') ioctl$ASHMEM_GET_NAME(r1, 0x81007702, 0x0) socketpair(0x4, 0x6, 0x572, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x101) [ 231.385788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.398956] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.425328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.453412] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.463359] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.487856] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 231.494182] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.510146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.518439] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.524955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.595455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.603776] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.610222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.619595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.628533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.637078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 16:48:46 executing program 0: socketpair$unix(0x1, 0x200200000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x145000, 0x8) getsockname$netlink(r2, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x843, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)=0x0) ioctl$KDDISABIO(r3, 0x4b37) r5 = fcntl$getown(r1, 0x9) kcmp(r4, r5, 0x6, r1, r0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7, 0x8001, 0x6, 0x1000, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r6, 0x8}, &(0x7f0000000340)=0x8) write$P9_RGETATTR(r3, &(0x7f0000000980)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0xa0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r7, 0x0, r0, 0x0, 0x8, 0x0) close(r0) creat(&(0x7f0000000240)='./file0\x00', 0x9) connect$l2tp(r3, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x3, 0x2, 0x3, 0x4, {0xa, 0x4e22, 0x0, @rand_addr="a6bb3e2b0584f0e6865ee74446750c8f", 0x100000001}}}, 0x32) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)="fc", 0x1}], 0x1, 0x0) [ 231.653721] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.661776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.678864] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 231.685533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.755374] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 231.779715] 8021q: adding VLAN 0 to HW filter on device batadv0 16:48:46 executing program 0: socketpair$unix(0x1, 0x200200000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x145000, 0x8) getsockname$netlink(r2, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x843, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)=0x0) ioctl$KDDISABIO(r3, 0x4b37) r5 = fcntl$getown(r1, 0x9) kcmp(r4, r5, 0x6, r1, r0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7, 0x8001, 0x6, 0x1000, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r6, 0x8}, &(0x7f0000000340)=0x8) write$P9_RGETATTR(r3, &(0x7f0000000980)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0xa0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r7, 0x0, r0, 0x0, 0x8, 0x0) close(r0) creat(&(0x7f0000000240)='./file0\x00', 0x9) connect$l2tp(r3, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x3, 0x2, 0x3, 0x4, {0xa, 0x4e22, 0x0, @rand_addr="a6bb3e2b0584f0e6865ee74446750c8f", 0x100000001}}}, 0x32) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)="fc", 0x1}], 0x1, 0x0) 16:48:47 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="0078ca1056008c57ce748ee81c2918f8bb7697a6ee6c6d4cc712d6da0500000000000000e7d9f9ef34313796741769248111142a6bb52405d3bedd9443cf4dca2399a0"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) add_key(0xffffffffffffffff, 0x0, &(0x7f0000000180)="70b179891ddd88b4c00ea679d131ca9918ad5062ded382cb7f7bd95407acc58968d4fe7a41710fbca761cf8289278ccc9645", 0x32, 0xfffffffffffffffb) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 16:48:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'uueue0\b\"\xf1W\xca\xb8\xf4\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xaf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf6\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x3, 0x0, 0x80000001}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x0, 0x0, 0x0, 0x3fd, @time}], 0x30) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x4) 16:48:47 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = geteuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x5}, [{0x2, 0x3, r4}, {0x2, 0x1, r5}, {0x2, 0x1, r6}], {0x4, 0x4}, [{0x8, 0x7, r7}, {0x8, 0x4, r8}], {0x10, 0x4}, {0x20, 0x6}}, 0x4c, 0x2) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f8e6bf6f176d354986ff2abc9c3bb66d86813e0bb4703620927c20019136d43e"}}) 16:48:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x100000001, 0x400) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000180)="e300d5da446953abf1c54d1764372bd227bdcddea3b667a1a594dbef23d48e12af088893177ecbe96243d94b82ad5c9115493ef6dbcf8dfc4059bcd8fd5c3081239809984de161c489c8efcfd26f83718cf3f45e3e1eef0101590a83a75fbdf7f368e475e07e6a7830c5f08c7dd1748a4adcde8a01da125f") sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000140), 0xc, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000003236c84929cb242de918005534000000f7a0e49932da15a40c78976bc0deabdf4f63c077107b6e08cc879d65de70274199a9230b6779c80d259ba770f01e06d5c3c048c2a08eb37a598b0c225d3db562fcb51339d35a", @ANYRES32=0x0, @ANYBLOB="000000000000000020001200100001006970366772657461700000000c0002000800080000000000"], 0x40}}, 0x0) 16:48:47 executing program 1: r0 = socket$inet6(0xa, 0x7, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000140)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f000001ef80)=[{0x20, 0x0, 0x7, "44100e010000f70b00"}], 0x20}, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @local, 0x9}, 0x1c) 16:48:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x4e24, @empty}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) chroot(&(0x7f0000000080)='./file0\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e24, @multicast2}}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e24, @multicast2}], 0x10) 16:48:47 executing program 1: unshare(0x20400) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x6, 0x100000001, 0x1f, 0x6}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={r1, 0x1104f372, 0x5, [0x8, 0xee90, 0x1000, 0x6, 0xbf]}, 0x12) r2 = socket$inet6(0xa, 0x3, 0x3f) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x2773, 0x7, 0x1, 0x7, 0x9a}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={r3, 0x3ff}, &(0x7f00000000c0)=0x8) 16:48:47 executing program 0: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000140)='sit0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\xe6\x13i:te0\x00\x00 \x00', 0x9600}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000140)='sit0\x00') getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xfb, "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"}, &(0x7f0000000040)=0x103) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x93ea}, &(0x7f0000000100)=0xffffff6c) 16:48:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(r0, 0x4, 0x44000) timerfd_create(0x7, 0x80800) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000440)=""/231) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000000)={0x80000000, 0x0, 0x1}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40240, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') write$P9_RREADLINK(r4, &(0x7f0000000540)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1f4, r5, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x110, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8df1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xefe6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7a8c}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0x1f4}}, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) 16:48:47 executing program 0: request_key(&(0x7f0000000000)='asymmetriD\x00', &(0x7f0000000280), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) [ 232.838668] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 16:48:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000400000000000000073014300000000009500000000000000"], &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x20000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x4, 0x797, 0x1}}, 0x30) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x1000000000000000) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x4, 0x1fffffc, 0x4, 0x9, 0x2, 0x6}, 0xfffffffffffffff7}, 0xa) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x5, @ipv4={[], [], @local}, 0x200}, @in6={0xa, 0x4e21, 0x1, @remote, 0x438}], 0x38) 16:48:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000040)={'gre0\x00', @ifru_names='bond_slave_1\x00'}) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0x13, "d1"}, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ptrace$pokeuser(0x6, r1, 0x20, 0x1) ioctl$sock_ifreq(r0, 0x6291afb45a865e2d, &(0x7f0000000140)={'b\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xff\x00', @ifru_addrs=@llc={0x1a, 0xfffe, 0x3, 0x6, 0xfffffffffffffffe, 0x9}}) 16:48:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x7) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="480000001400190d09004beafd0d8c560a84ed7a80ffe00600000000000000a2bc560389000000200000000101ff0000000309ff5bffff00c7e5ed4e000000000000000000000000", 0x12b}], 0x1000000000000322) 16:48:48 executing program 0: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x138) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 16:48:48 executing program 0: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x138) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 16:48:48 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) socket$inet(0x2, 0x2, 0xfffffffffffffff7) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000080)={0x0, 0x0, 0x0, {0xc}}) 16:48:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x7) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="480000001400190d09004beafd0d8c560a84ed7a80ffe00600000000000000a2bc560389000000200000000101ff0000000309ff5bffff00c7e5ed4e000000000000000000000000", 0x12b}], 0x1000000000000322) 16:48:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000022, &(0x7f0000000000)=0xfffffffffffffffd, 0x3a) recvmsg(r1, &(0x7f0000002600)={&(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000140)=""/180, 0xb4}, {&(0x7f0000000240)=""/207, 0xcf}, {&(0x7f0000000040)=""/38, 0x26}, {&(0x7f0000000340)=""/102, 0x66}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/213, 0xd5}, {&(0x7f00000014c0)=""/192, 0xc0}], 0x7, &(0x7f0000001600)=""/4096, 0x1000}, 0x100) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x1, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000002640)='/dev/null\x00', 0x200, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000026c0)={0x1, &(0x7f0000002680)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000002700)={r3, 0x1}) 16:48:48 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x7}}, 0x10) keyctl$set_reqkey_keyring(0xe, 0x3) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x1b, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 16:48:48 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000400)={'syz0'}, 0x4) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x2000000000000078, &(0x7f0000000040)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x14800, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000000)={0x8, 0x200, 0x1fa}) fdatasync(r1) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='cgroup\x00') r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x80400, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x4000, 0x82) r7 = eventfd2(0x0, 0x1) setns(r4, 0x20000000) io_submit(r2, 0x7, &(0x7f0000000840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x2, r1, &(0x7f0000000080)="c76b0c1bf9d11512ad519abbaa76d4bf1379b47fb3632375f4d3f492065681e69fb0cbc5874040799af03f0875a50d720fd53e4a70d7ab87c224a37c95743bdf82950320bb5c01fc610a993562ae77e89b56f0a5931c1afa254f58d42f2df0a685c64320573cde83592fe95b62abf4176b1245288222", 0x76, 0x76, 0x0, 0x0, r3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, &(0x7f00000001c0)="a4d5b7783832d7ce83bd144f337cea6d0ac5151e947cf6a9a2", 0x19, 0x7ff, 0x0, 0x2, r4}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f0000000340)="4903bd6c553c55961e14daf5963d3ec172aa39fe0f43cfedeef05771380fee1a99a8ef59105ab8d2560115da55c0cce1a84c808bab1ef9b6550fa5f5b8f2202928c818c5f1917b51f478c930", 0x4c, 0x80, 0x0, 0x1, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f0000000440)="0c10cc536eef837e3ecb3ec5212fd644f6bf57a4e1c040f5d353ac96da8b4330ad9d7eff82c02b26afcdde6c43c10f4c56975fdfeb900b32fdeadd59567731ac1a4bd4d4ec0d73e56ac63bb64664ca01fedd5758cd213ad56c3da0dc13a2abf0612dfb0ebc8c98bdf0c5b600b23f4b88e4d0c595e1fb9f0e3f5d87cc9b0c58511b54bce969fcf62ff167caba7ae502", 0x8f, 0x19cb, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000540)="bbd6c233d875b527c358aca9cda047198779ba49132a26e9656fd906ace0feb1eda628a9ec54b632f9542a17e5749692f0ad32d8fd7db15bda866fcc34adf14fda724c253d6d3dc6b1e2e37551f44f30c8c0fd4038a3424bf4e34c9344b73dc65bb883c606d47cd86f68c09990eb1cd981cca6ab0409390b249523646bc727a129e1e1c5164c", 0x86, 0x9, 0x0, 0x1, r6}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7, r0, &(0x7f0000000680)="3347fd603e55cf918cf8b143d09b97e6f33e2e13c876404af4a05c15ea3f9f50e20abe641d1b03fd018ffa2cec3713d3bb37c6fad9a018957b70fcc7d8902d63c8d4fbc582c50ab4949f935ad90eaf5f1eb380809d43821236e802a544cdf9ed9449a3ba014e927e0a5f92ac2e44d37afad40f29e41d2d06470173489eb36e6eb49776a5b5a98d64af7d0b3df635966ad2eeb171a483a729442e", 0x9a, 0x4, 0x0, 0x2, r7}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x2, 0x7fff, 0xffffffffffffffff, &(0x7f0000000780)="9ad125bdd03e85a40ef9aaf56fc3c9faca87768a9c2d9b53247d0d6869162cd14f5427e75448a7a8f32d1aed4c329f898d0852105a43e9e0c405597cf87e58f04fc77826a73f2091f204c2ee0900403f15083e5611a87c286784f5737d3915e576fe5a3a77441fb638626b6241d7fe2fce9ac9961b06e15757072cd90782e7", 0x7f, 0x3, 0x0, 0x0, r0}]) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000008c0)={&(0x7f0000000880)='./file0/file0\x00', r4}, 0x10) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) [ 233.674343] ucma_write: process 30 (syz-executor.1) changed security contexts after opening file descriptor, this is not allowed. 16:48:49 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xff, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000080)={0xd, @raw_data="9be5b1fdefb98302e4cf37b52703faef89809ad8bc0e826c31b71babdafbba131e1b4be2c4cefee6f7eaccec2afea9c35b000527b7f28917f3cfc9a4b3b71e1be78837f7875aa549c5de50ea0e5dd380be7bb5e40b84588ef3e9c54a9c51ee54c4e0cec7f9c6986b921295f64b8465d1523286bb6d3d16b2be62da8d09072cf5fdf6887ce09df21cb7c91e2d711250c3a3d0877b9e6731bd2f9cc2b4a5637b3ac7bd727d3181fd4a724497eecfb97bcdd2bd1484e846a2bcac630926342a09c2855c6ac9c2a5c413"}) 16:48:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xf6d5, 0x0) r3 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000480)={0xd90, 0x0, 'client1\x00', 0x1, "d9c2023d2bf1ca89", "9c5a2a028151db16622d44f39a65a363bf9d50aeaec20f3728386be707b171a2", 0xfff, 0x3}) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f00000001c0)=""/250) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x3) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x330) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) signalfd4(r3, &(0x7f0000000300)={0x7}, 0x8, 0x80800) sendto$inet6(r1, &(0x7f00000005c0), 0x2aa355c025eab061, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040), 0x4) 16:48:49 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/.y\xff\x13\x8c.\xddB\xd3\'\xf7\x06\xb0\x86\xf9\xc9\n\xbf\fB\x86\x9117n\x14mptZ&\xfd\xe0\xd4\x90Vr\xe4\xa6\x87\xab\x8a(\xb5b\xff\x8bCPq\xf2\xad\xb6h\x1a\xfa,', 0x1ff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xa29b) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000040)={0x100, @broadcast}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x9, 0x4e23, 0x0, 0xa, 0xa0, 0x80, 0x0, r1, r2}, {0xb8, 0x0, 0xfffffffffffffff8, 0xc7b9, 0x9, 0x2, 0x4, 0xfffffffffffffffb}, {0xffffffffffffff58, 0x33, 0x7fffffff, 0xa1}, 0x6, 0x6e6bb1, 0x0, 0x1, 0x3, 0x3}, {{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4d4, 0x7f}, 0x2, @in6=@mcast1, 0x3504, 0x7, 0x2, 0x200, 0x6, 0xe769, 0x6}}, 0xe8) 16:48:49 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000000000/0x2000)=nil) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xa116, 0x40800) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x40, 0x0, &(0x7f00000000c0)=[@increfs={0x40046304, 0x4}, @enter_looper, @increfs={0x40046304, 0x2}, @acquire_done={0x40106309, r1, 0x1}, @acquire, @increfs, @increfs={0x40046304, 0x1}], 0xc4, 0x0, &(0x7f0000000100)="0f76641cdc503427bc129cda6e845c6e41606ae058af5da3aad5ee497e3c37f674cde5e29b5ce5f6a4ff0f9eb2bf02e5e09aa75259bd6c419213d738a35314d6cb4f06c3a47f68d7f9808cd7074fb8c8bca78a8510a5bc5a25d071c1bf30ee6a2f0af9a7e6fdfbc3795da7cf5937826556ad81979f78c91f7e7ea2fdc730bacc0182fc10cf5e569b63af74eb40adbdfe1fc439f6814d56f40f84d6d69c5f48edd0ff84846c82e074737a5ea1487d4d7ef0a192df3e799e18bbf117fc857fa30d8a62a60c"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') mremap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000004000/0x3000)=nil) 16:48:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x8000, &(0x7f0000357000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x4008010, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 16:48:49 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x9c1, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 16:48:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x7, 0x100000001, 0x35}, 0x2c) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/hwrng\x00', 0x713200, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000001b40)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000140)=@req={0x6, 0xffffffffffffffe1, 0x2, 0x1}, 0x10) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7fffffff, 0x440) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000180)) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r1}, 0x2c) 16:48:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x400) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='map_files\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) 16:48:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_SET_CPUID(0x1012, 0x2) exit(0x0) 16:48:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) open_by_handle_at(r0, &(0x7f0000000000)={0xa4, 0x3, "e991c54f1d65a1e503e2b5ed4cec66ad6425b2806ea44f424638d871c1fc20da5a48e56f8186a128f65aed9011b39393946686fd803ea2db9c9e0c688d8fdc98b10ae9f6e0b088b881d68b4cdac53d84896be6ab8a3472f00c2b33a4c9ef5d0510f2e5b24e5f07bbae69d6405665b5ba66112424bbbda2b3b8153ea05bcf3e8e351070fedfcddbf83c90301f9130ba4ac46b4a994638f5ead3f5e77d"}, 0x200000) sendto$inet6(r0, &(0x7f0000000240)="d7", 0x1, 0x40, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000300)={0x9, 0x400000}, 0x9) close(r0) 16:48:50 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x3fe, &(0x7f0000000040)=0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x81, 0x5}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=r3, @ANYBLOB="d0cf0800000000000000070000010200060064d8c583fdc2189d2454cc262040a705a7e0e255ca1ef312ee485a8b669155a723a91d08ed6da09ea858daa9949f060731acad43f9928f6f45eaf758f0a642ba12edf26a0e282de949dcb3e8d6694c03413f1563019a0e1f0204fb3e8ff0e9589a58b126e7bf0342d6dbba28076382f9a9680378668dc2597b10c349a40b110308b7634db91200fe43edf12d258b0307184fb8b83f19db49cebafa2c0e635574ee5808c50de2bac0bacd37897d8f9fea3a50705206a69158eb9eacf9397b6f6d0d"], 0x16) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xffffffffffffff27, 0x0, 0x0, 0x4}]) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000002c0)={r3, 0x9c, "21028fc42d7037490d5707a6ef78df67786920b4d0709cef9b08114512ef98c96a6b4bf7a05aef5fc1a0f3700d828e3ccf84accc45ff071f1f432a7b0dafb3c352fd1556784a099124ce96ba3e7ac41000e39f6d19ec871693f5b8d024b005864cc2f3c5e3318b9d764e7b944000ef8db7584ef00a11eacff46c9388b47bc4840b3feef04f1ea5992068330a61dacb9443d3ec429af113e4369262be"}, &(0x7f0000000180)=0x301) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="01000100000000004e21ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000300000002004e240000000000000000000000000000000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005a04c50a"], 0x210) r5 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x1ff, 0x200400) openat$vimc0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video0\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x1, 0x4) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x2) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) 16:48:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) open_by_handle_at(r0, &(0x7f0000000000)={0xa4, 0x3, "e991c54f1d65a1e503e2b5ed4cec66ad6425b2806ea44f424638d871c1fc20da5a48e56f8186a128f65aed9011b39393946686fd803ea2db9c9e0c688d8fdc98b10ae9f6e0b088b881d68b4cdac53d84896be6ab8a3472f00c2b33a4c9ef5d0510f2e5b24e5f07bbae69d6405665b5ba66112424bbbda2b3b8153ea05bcf3e8e351070fedfcddbf83c90301f9130ba4ac46b4a994638f5ead3f5e77d"}, 0x200000) sendto$inet6(r0, &(0x7f0000000240)="d7", 0x1, 0x40, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000300)={0x9, 0x400000}, 0x9) close(r0) 16:48:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) open_by_handle_at(r0, &(0x7f0000000000)={0xa4, 0x3, "e991c54f1d65a1e503e2b5ed4cec66ad6425b2806ea44f424638d871c1fc20da5a48e56f8186a128f65aed9011b39393946686fd803ea2db9c9e0c688d8fdc98b10ae9f6e0b088b881d68b4cdac53d84896be6ab8a3472f00c2b33a4c9ef5d0510f2e5b24e5f07bbae69d6405665b5ba66112424bbbda2b3b8153ea05bcf3e8e351070fedfcddbf83c90301f9130ba4ac46b4a994638f5ead3f5e77d"}, 0x200000) sendto$inet6(r0, &(0x7f0000000240)="d7", 0x1, 0x40, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000300)={0x9, 0x400000}, 0x9) close(r0) 16:48:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, 0xfffffffffffffffd) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:48:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x4000c) dup2(r0, r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000740)) 16:48:50 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$P9_RVERSION(r0, &(0x7f0000000100)={0x15, 0x65, 0xffff, 0x7ff, 0x8, '9P2000.L'}, 0x15) socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$TIOCSSOFTCAR(r0, 0x40096101, &(0x7f0000000040)) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000080)) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000140)={0x9, 0xffff, 0xaa, 0x20}) 16:48:50 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x47, 0x10000) setsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, 0xc) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r2, 0x700, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000000}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x82}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc1ab}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000c4}, 0xfcde61d4ad5205bb) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r0}) r3 = socket$inet6(0xa, 0xe, 0x6378e78d) fchmod(r1, 0x84) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xf6a961389fb90ca7}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x140, r4, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x93}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4085}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb403}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23ee}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x800}, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000500)='trusted.overlay.origin\x00', &(0x7f0000000540)='y\x00', 0x2, 0x3) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000580)={0xff, 0x14, [0x4, 0x4, 0x9, 0x3, 0x5]}) sysfs$3(0x3) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000005c0)={0xffffffffffffff85, "98fedc3b4cea64c9360b59223ce73e9154f914d88d9cbf3d9bd13a1b995a6712", 0x21, 0xa29, 0xffffffff, 0x4, 0x1}) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000640)={0x80000000, 0x4d8a, 0x7fffffff, 0xfffffffffffff001, 0xb, 0x4af}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r5, r6) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000880)={0xa8, ""/168}) connect$l2tp(r1, &(0x7f0000000940)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @rand_addr=0x7}, 0x3, 0x0, 0x0, 0x4}}, 0x2e) ioctl$TIOCSCTTY(r1, 0x540e, 0x3) r7 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000009c0)={{0x5, 0x3, 0xffffffff, 0x40, 'syz1\x00', 0x9a}, 0x2, 0x410, 0x4969, r7, 0x4, 0x44, 'syz0\x00', &(0x7f0000000980)=['y\x00', 'IPVS\x00', 'eth\x00', 'y\x00'], 0xd, [], [0x4, 0x8, 0x800, 0x10001]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffff9c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000b00)={0x4}) syz_open_dev$audion(&(0x7f0000000b40)='/dev/audio#\x00', 0xff, 0xa001) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) accept$unix(r1, &(0x7f0000000c00), &(0x7f0000000c80)=0x6e) 16:48:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000001980)={0x20000000000001e6, &(0x7f0000000580)=[{0x48000015, 0xfffffffffffffffd}, {0x6, 0x6}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000000)=""/18) [ 235.767074] QAT: Stopping all acceleration devices. [ 235.786460] QAT: Device 0 not found 16:48:50 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x4000, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000180)={0x0, 0xffffffffffffffe1}, 0x2) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/121, 0x79) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000001c0)) 16:48:51 executing program 0: unshare(0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='\x05F\x8f\x15L#\x18\xc3\xf5>\xe0\xa8\x833L\xfc\xb0\x12c~&\x16\xeeB\xe0k\xad\x96j@\xde\xbc\x82\xf0\xd9\xd5\xdc7Hm\xcc\x8b$\xdc\xc5I\xca\x97t6\xdc\xc7\x96\xa8d\a\xbc}\x9ef\xcb_-\xd2\xae9\xd6\xf1\x8c\xc1\xb6\xca\xed\xe1cH\'\xc3]\xd2\x98\xc5+A\x00Ne\xfe\xda-\xe9\xc6\x82\xde9\x8b\xf3\x98\xef\xd7\x89\xa3\xfc\xed\xb0\xef\xf4\xba\x8d\x8aL\xbf\a\xfb\xccrlY_n\xb6c\xe3\x9f\xf8\x91\x8d\xc5O\xdc9Fn9\x1d\xa0\x19\xa4\xcen\\\xca\n\xfb\x91\xc7\xdf\xc4 \xc4\x9e') fstat(r1, &(0x7f0000001f00)) 16:48:51 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x40080) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f000033bffc)) 16:48:51 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40000) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0xfffffffffffffff8, "a65728512acf4595d95d0f9a24c53128af7cbd52f36f00", 0x800, 0x10001, 0x3, 0x14, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 16:48:51 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0x40101283) [ 236.337799] IPVS: ftp: loaded support on port[0] = 21 16:48:51 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) recvmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x90) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x8002, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f00000002c0)=""/115) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='C', 0x1}], 0x1}, 0x0) 16:48:51 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000200)={0x6, 0x3, 0x44, 0x2, 0xe9e}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0)=[{&(0x7f0000000000)="030200001400ad", 0x7}], 0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) close(r3) socket$netlink(0x10, 0x3, 0xa) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r4, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r5, 0x2, 0x8}, 0xc) [ 236.557395] chnl_net:caif_netlink_parms(): no params data found [ 236.624587] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.631079] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.639345] device bridge_slave_0 entered promiscuous mode [ 236.658019] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.664557] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.672759] device bridge_slave_1 entered promiscuous mode [ 236.706074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.717133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.746163] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.754540] team0: Port device team_slave_0 added [ 236.760848] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.769347] team0: Port device team_slave_1 added [ 236.776088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.784545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.857910] device hsr_slave_0 entered promiscuous mode [ 236.954054] device hsr_slave_1 entered promiscuous mode [ 237.083435] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 237.091092] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 237.121850] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.128337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.135441] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.141957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.215037] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 237.221171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.233880] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.247636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.257743] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.268011] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.279853] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 237.301026] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 237.307230] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.324438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.332822] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.339273] bridge0: port 1(bridge_slave_0) entered forwarding state 16:48:52 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) recvmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x90) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x8002, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f00000002c0)=""/115) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='C', 0x1}], 0x1}, 0x0) [ 237.393230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.401715] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.408226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.418016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.427238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.436072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.459007] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 237.471249] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 237.477422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.501151] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 237.518771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.527696] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.535781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 16:48:52 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) r2 = gettid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x6) fcntl$setsig(r4, 0xa, 0x12) read(r5, &(0x7f0000001080)=""/244, 0x2b6) sendmsg(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000000040)=@nl=@unspec, 0xffffffffffffff41, 0x0, 0xfffffffffffffcdc, 0x0, 0x2a3}, 0x80000000000) dup2(r4, r5) fcntl$setown(r4, 0x8, r2) tkill(r2, 0x16) 16:48:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00\xc0/\x00\xa9\x9b\x80(\x12/\xb4\xc2\xed\xaac\xbd\xff\x1e\xa8N\xc4\xd2\xd2\x9a\xf2\x90\xfb\xb0\xe8\x15+\xb7\x82\x9d\x84p\xc2\xa2L\xfb\xe0\xe59\x1d\xeb^D~B\xc6Q\x9a{\x96\xed\xefN\xc0[J\x1b\r\xd9w\x03*\x98B\x1b}\v\xb1\xea\xf3\a\xcd\f\x84\xd1\'\'\x93\xb1q\xdc\x13au\x98f^\x9f\xe7[\x84\x1c\xa2\x87\x91\xd4\xd4\x17\xbe\xfaC]\x03(6\x91l\xb9}t\x97V\r\xc6k\xfe\x9d\xf4\xa1\xb6hi\x0f\x9f.\xa5\t\xe0\xb23w\xe4\xff\xef\xee%aj\xaa\x1d\xc6\xcc\x80H\xdecjn9dEH\xc6 \xafd\x8a\xb6C\xe6\x8d\x9e\x13x5vZ\xd6') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x800000000004, 0x2001e, r1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x7d, &(0x7f0000000000), &(0x7f0000000180)=0x5b) 16:48:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt(r0, 0x1, 0x2, &(0x7f0000000180)=""/204, &(0x7f0000000040)=0xcc) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x4e22, @broadcast}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000596000)=0x9, 0x4) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f00000000c0)=0x8, 0x4) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) recvfrom$inet(r3, &(0x7f0000000340)=""/252, 0xfc, 0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x200, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7, 0x8000) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000280)={0x3, 0x7}) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e22}, 0x10) ioctl$DRM_IOCTL_DROP_MASTER(r4, 0x641f) 16:48:53 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x133090b413123c81) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 16:48:53 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) unshare(0x8000400) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8000, 0x0) r1 = dup(r0) sendmsg$rds(r1, &(0x7f0000002040)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/213, 0xd5}, {&(0x7f00000003c0)=""/188, 0xbc}, {&(0x7f0000000480)=""/71, 0x47}, {&(0x7f0000000500)=""/183, 0xb7}, {&(0x7f00000005c0)=""/181, 0xb5}, {&(0x7f0000000680)=""/160, 0xa0}, {&(0x7f0000000740)=""/74, 0x4a}], 0x7, &(0x7f0000001f80)=[@rdma_args={0x48, 0x114, 0x1, {{0x1, 0x4}, {&(0x7f0000000840)=""/4096, 0x1000}, &(0x7f0000001d40)=[{&(0x7f0000001840)=""/101, 0x65}, {&(0x7f00000018c0)=""/66, 0x42}, {&(0x7f0000001940)=""/171, 0xab}, {&(0x7f0000001a00)=""/151, 0x97}, {&(0x7f0000001ac0)=""/150, 0x96}, {&(0x7f0000001b80)=""/119, 0x77}, {&(0x7f0000001c00)=""/223, 0xdf}, {&(0x7f0000001d00)=""/38, 0x26}], 0x8, 0x20, 0x9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001dc0)=""/251, 0xfb}, &(0x7f0000001ec0), 0x2}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001f00)}, &(0x7f0000001f40), 0x1}}], 0xa8, 0x1}, 0x4001) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f00000000c0)=0xe8) clone(0x40000, &(0x7f0000000100)="7cec1428657540f2c313f86d4ab4ac6b3674bbc170ca2502a5e1bc273249dc7384c0ad030fdfbf3145361cb00e9644a55a9a7daac195cb39ed45b95ef5eebd0651e1d3d89e4d4d094b032ed20b8e41030a411b8506204b5d501ab0620026f7d0edc38af83489bdd1f1464c1c51a653dbd6e01f5247c74e455dd72d07667a3defad5943ed7161d1783d82281af0fbc3d8ab97c8318250725e54e4944b662292c052759a08dd3ca323c6706530237b70d02738099f3878dee56865", &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000001c0)="191f2117878aa836ac56387405c4139878cdd640b7b6c0d938ece334ab092516555c2411cb5a078fe1c6ff5eb65592aac4e16e3eb3053ed5451accec18a7d193a7f13491db5d22a1f14e7561ed3e8c4c6f4a789cfc3d912cc38f4884ba0f97af8d507091a61fb54867c9f67c37be1f392a34e00bc911e856c25cde79382e1a472e986267892f92bdf2cd9eb696725763566cb080ba34226aef91dcd703eaca8885610d69521673d9c8d1e871be296c2595c58e7af3624428eb77fa27fe4fc98a53cbc50681bdf1e51412de1f0b6ad0e87753f2a20a0d21c55b2e8068b6b803") 16:48:53 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234418dd25d766070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r1, 0x800000000000937a, &(0x7f0000000000)) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x7fff, 0x101}]}, 0xc, 0x1) 16:48:53 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) recvmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x90) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x8002, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f00000002c0)=""/115) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='C', 0x1}], 0x1}, 0x0) 16:48:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = getpgrp(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xc00, 0x0) unlinkat(r3, &(0x7f00000000c0)='./file0\x00', 0x200) kcmp(r1, r2, 0x6, r0, r0) r4 = socket$packet(0x11, 0xfffffffffffffffe, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x13e, &(0x7f0000000700)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0x108, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @local, {[], @gre={{0x0, 0x501}, {}, {}, {}, {}, {0x8, 0x6558, 0x0, "2e7c1df3f2f4acbb4ace6e8a50565b595591e78d9b12245a598496ea23d4c406af9f3b4a3f009159f9ac1555e4477ff94d4d50913843082ace4419eb0e79f826c9d383e2310e60b0b49f7a2d305f00945c1f774a8da5fb8f04988ee9e082d4f9070955ff1bbd44d6fdb144e01f9f2e5ee65ccc71338ca0a50652cb6b5ae30e0fce110b555945fa43cebd22a399d6a33dea3af82460a33f5a491976018b1b56dd512d481061c6bb980d69bccee5352b18539b08b6ac9e0116f524316e8c9c036ecc70932c"}}}}}}}, 0x0) 16:48:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000013c0)=[{&(0x7f0000000300)="27990bf24a1283be6bcd769f57689b3a6a06066f644b7156137653ee64e95cfc363e6a5fb13dab339098ccc0382b82380ecabcac88c8b5a148518d641ce125ef58b4", 0xffffffffffffff76}, {&(0x7f0000000380)="6d50341848dcfaf5c49aa0e07078daddd9dfbc41ffdd4b76f35cd968dd86", 0x1e}, {&(0x7f00000003c0)="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", 0x1000}], 0x3) socket$vsock_stream(0x28, 0x1, 0x0) r1 = accept(r0, &(0x7f0000002880)=@ipx, &(0x7f0000002900)=0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000002940)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @remote}], 0x40) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0}) r4 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) sendmsg$key(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x2, 0xd, 0xfe, 0x3, 0x4, 0x0, 0x70bd28, 0x25dfdbfb, [@sadb_sa={0x2, 0x1, 0x4d6, 0x1, 0x1, 0x7a, 0x1, 0xa0000001}]}, 0x20}}, 0x4001) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000080)={r3}) 16:48:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "2e8fa0215ab66eb23d450c2003074a73"}, 0x11, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r1, &(0x7f00000018c0)=[{0x0}, {&(0x7f0000000080)=""/46, 0x2e}], 0x2, 0x2000107b) 16:48:53 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) unshare(0x2000400) r1 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000080)=0x7, 0xf4) 16:48:53 executing program 1: r0 = epoll_create1(0x80000) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x100) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x20000, 0x0, 0x41}) fcntl$lock(r0, 0x7, &(0x7f0000000140)) 16:48:53 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x5) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000380), 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0xc17d}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e20, 0xffffffffffffd35f, @local, 0x9}}, [0xb8c6, 0x9, 0x6, 0x6, 0x400, 0x61a5, 0x40, 0x8, 0x4, 0x7, 0x6659, 0x3ff, 0x5, 0x0, 0xfff]}, &(0x7f0000000300)=0x100) sync_file_range(r0, 0xace0000000000000, 0x74b, 0x2) 16:48:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\xe0\xff\xff\xff\x00\x00\x00\x00\x00\t\xca\xa6/\xbbX\xffK\x87\x13Y\xca\x03\"\xb7Z\xa3\xd9p+C\x92\x00\x95\xec\x10\t\x8f\x0e\xb49om`\x88\xbccb\x84Q\xd7', 0x0) fsetxattr(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000deff23fa945c48e90731ee47c1332a8d5dc9790961c02f76110264a36c34ce8bb2563964d4786310f4c80fc2cb5afeba5e136e54e224c8714c572e07cef71b949dfafb449a0a5071a9f812adb8b9afd4ee99e86dfbfdcf5892f7b7ef72a56b1dd834c8f1587295d7d09894de15d05928041350cb50948ef6827d9182623d9b46e2c048a5a85f559d47b4dda5db4a7ea26a46301f83b9ff9471fb2b7c2995848deb3bd54f837d72e2ed332561eebe0c5fcf693f37014a3cac13a61eff892f201bcb0f1000ff05bade2dc62b0059c762441130dc2335839c456aa00285c66918e864cd"], &(0x7f0000000080)='\x00\xe0\xff\xff\xff\x00\x00\x00\x00\x00\t\xca\xa6/\xbbX\xffK\x87\x13Y\xca\x03\"\xb7Z\xa3\xd9p+C\x92\x00\x95\xec\x10\t\x8f\x0e\xb49om`\x88\xbccb\x84Q\xd7', 0x33, 0x3) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000932e000000000000000300000000000000000000000100e20000000000000000000000000000000000"], 0x58) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='uid_map\x00') execveat(r1, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x1000) 16:48:54 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) socket$inet(0x2, 0x800, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) write$nbd(r0, &(0x7f00000000c0)={0x67446698, 0x0, 0x1, 0x4, 0x2, "b2d4ca216a6c281157324d425764cd06480618086b478a399ba68f840c61bb7077a48b3670daa72244a141bd17a76d8884b63548270c317dc81d29898f56b43e0bd03cc30f76adb690e26aff9766e770ab9eeaef311de4eb06410a39e596a86c2a14e14df9feff65924a9bf3cba9e7242523aa73285547ae108b8661a8cf1d60da48ba67751a60b4a0a6c54294c4c9bc5a5f06446986fa09198783471184c07181486a3eb5aefa79e7da43a6ca6e3cf3b7f52525fb0868dc841885e0f48a2aca9e513fce5cb0f20ffb573b06356f868577eb44334feb25"}, 0xe7) 16:48:54 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) recvmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x90) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x8002, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f00000002c0)=""/115) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='C', 0x1}], 0x1}, 0x0) [ 239.334359] ================================================================== [ 239.341778] BUG: KMSAN: kernel-infoleak in _copy_to_user+0x16b/0x1f0 [ 239.348283] CPU: 1 PID: 10527 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 239.355472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.364839] Call Trace: [ 239.367442] dump_stack+0x173/0x1d0 [ 239.371163] kmsan_report+0x12e/0x2a0 [ 239.374987] kmsan_internal_check_memory+0x465/0xb10 [ 239.380122] kmsan_copy_to_user+0xab/0xc0 [ 239.384283] _copy_to_user+0x16b/0x1f0 [ 239.388193] sctp_getsockopt+0x2530/0x17f70 [ 239.392559] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 239.397765] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 239.402992] ? sctp_setsockopt+0x13560/0x13560 [ 239.407592] sock_common_getsockopt+0x13f/0x180 [ 239.412278] ? sock_recv_errqueue+0x8f0/0x8f0 [ 239.416790] __sys_getsockopt+0x489/0x550 [ 239.420964] __se_sys_getsockopt+0xe1/0x100 [ 239.425392] __x64_sys_getsockopt+0x62/0x80 [ 239.429738] do_syscall_64+0xbc/0xf0 [ 239.433468] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 239.438668] RIP: 0033:0x457e29 [ 239.441883] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.460912] RSP: 002b:00007f4aaab5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 239.468648] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457e29 [ 239.475920] RDX: 0000000000000070 RSI: 0000000000000084 RDI: 0000000000000005 [ 239.483195] RBP: 000000000073c180 R08: 0000000020000300 R09: 0000000000000000 [ 239.490556] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f4aaab5f6d4 [ 239.497832] R13: 00000000004c9a88 R14: 00000000004d02f8 R15: 00000000ffffffff [ 239.505116] [ 239.506748] Uninit was stored to memory at: [ 239.511100] kmsan_internal_chain_origin+0x134/0x230 [ 239.516248] kmsan_memcpy_memmove_metadata+0xcf2/0xf10 [ 239.521533] kmsan_memcpy_metadata+0xb/0x10 [ 239.525860] __msan_memcpy+0x58/0x70 [ 239.529581] sctp_getsockopt+0xbcb9/0x17f70 [ 239.533907] sock_common_getsockopt+0x13f/0x180 [ 239.538586] __sys_getsockopt+0x489/0x550 [ 239.542751] __se_sys_getsockopt+0xe1/0x100 [ 239.547081] __x64_sys_getsockopt+0x62/0x80 [ 239.551409] do_syscall_64+0xbc/0xf0 [ 239.555158] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 239.560361] [ 239.561986] Uninit was stored to memory at: [ 239.566314] kmsan_internal_chain_origin+0x134/0x230 [ 239.571421] kmsan_memcpy_memmove_metadata+0xcf2/0xf10 [ 239.576729] kmsan_memcpy_metadata+0xb/0x10 [ 239.581093] __msan_memcpy+0x58/0x70 [ 239.584816] sctp_do_8_2_transport_strike+0x9c8/0xab0 [ 239.590012] sctp_do_sm+0x1c1b/0x9af0 [ 239.593822] sctp_primitive_REQUESTHEARTBEAT+0x175/0x1a0 [ 239.599289] sctp_apply_peer_addr_params+0x210/0x1d60 [ 239.604508] sctp_setsockopt+0x12e42/0x13560 [ 239.608922] sock_common_setsockopt+0x13b/0x170 [ 239.613596] __sys_setsockopt+0x493/0x540 [ 239.617752] __se_sys_setsockopt+0xdd/0x100 [ 239.622082] __x64_sys_setsockopt+0x62/0x80 [ 239.626411] do_syscall_64+0xbc/0xf0 [ 239.630131] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 239.635332] [ 239.635338] Uninit was stored to memory at: [ 239.635359] kmsan_internal_chain_origin+0x134/0x230 [ 239.635375] kmsan_memcpy_memmove_metadata+0xcf2/0xf10 [ 239.635389] kmsan_memcpy_metadata+0xb/0x10 [ 239.635403] __msan_memcpy+0x58/0x70 [ 239.635419] sctp_transport_new+0x16d/0x9a0 [ 239.635434] sctp_assoc_add_peer+0x532/0x1f70 [ 239.635450] sctp_process_init+0x1a1b/0x3ed0 [ 239.635467] sctp_sf_do_5_1D_ce+0xe22/0x3080 [ 239.635479] sctp_do_sm+0x2c8/0x9af0 [ 239.635499] sctp_endpoint_bh_rcv+0xd5b/0x1000 [ 239.635514] sctp_inq_push+0x300/0x420 [ 239.635527] sctp_rcv+0x3c2f/0x54f0 [ 239.635540] sctp6_rcv+0x41/0x70 [ 239.635556] ip6_protocol_deliver_rcu+0xb5a/0x23a0 [ 239.635570] ip6_input+0x2b6/0x350 [ 239.635585] ip6_rcv_finish+0x4e7/0x6d0 [ 239.635599] ipv6_rcv+0x34b/0x3f0 [ 239.635612] process_backlog+0x756/0x10e0 [ 239.635624] net_rx_action+0x78b/0x1a60 [ 239.635638] __do_softirq+0x53f/0x93a [ 239.635642] [ 239.635649] Local variable description: ----addr.i@sctp_process_init [ 239.635654] Variable was created at: [ 239.635669] sctp_process_init+0xb5/0x3ed0 [ 239.635685] sctp_sf_do_5_1D_ce+0xe22/0x3080 [ 239.635689] [ 239.635698] Bytes 16-23 of 256 are uninitialized [ 239.635716] Memory access of size 256 starts at ffff88804dfbfc28 [ 239.635723] Data copied to user address 0000000020000200 [ 239.635728] ================================================================== [ 239.635733] Disabling lock debugging due to kernel taint [ 239.635742] Kernel panic - not syncing: panic_on_warn set ... [ 239.635759] CPU: 1 PID: 10527 Comm: syz-executor.2 Tainted: G B 5.0.0-rc1+ #9 [ 239.635767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.635772] Call Trace: [ 239.635794] dump_stack+0x173/0x1d0 [ 239.635816] panic+0x3d1/0xb01 [ 239.635860] kmsan_report+0x293/0x2a0 [ 239.635886] kmsan_internal_check_memory+0x465/0xb10 [ 239.635921] kmsan_copy_to_user+0xab/0xc0 [ 239.635941] _copy_to_user+0x16b/0x1f0 [ 239.635967] sctp_getsockopt+0x2530/0x17f70 [ 239.636010] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 239.636031] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 239.636071] ? sctp_setsockopt+0x13560/0x13560 [ 239.636089] sock_common_getsockopt+0x13f/0x180 [ 239.636113] ? sock_recv_errqueue+0x8f0/0x8f0 [ 239.636131] __sys_getsockopt+0x489/0x550 [ 239.636162] __se_sys_getsockopt+0xe1/0x100 [ 239.636190] __x64_sys_getsockopt+0x62/0x80 [ 239.636208] do_syscall_64+0xbc/0xf0 [ 239.636238] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 239.636250] RIP: 0033:0x457e29 [ 239.636272] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.636281] RSP: 002b:00007f4aaab5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 239.636302] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457e29 [ 239.636311] RDX: 0000000000000070 RSI: 0000000000000084 RDI: 0000000000000005 [ 239.636320] RBP: 000000000073c180 R08: 0000000020000300 R09: 0000000000000000 [ 239.636331] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f4aaab5f6d4 [ 239.636345] R13: 00000000004c9a88 R14: 00000000004d02f8 R15: 00000000ffffffff [ 239.637630] Kernel Offset: disabled [ 239.946884] Rebooting in 86400 seconds..