[ 41.815081][ T26] audit: type=1800 audit(1554233185.906:26): pid=7649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 41.849557][ T26] audit: type=1800 audit(1554233185.916:27): pid=7649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 41.875076][ T26] audit: type=1800 audit(1554233185.916:28): pid=7649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 42.836707][ T26] audit: type=1800 audit(1554233186.966:29): pid=7649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. 2019/04/02 19:26:34 fuzzer started 2019/04/02 19:26:37 dialing manager at 10.128.0.26:41883 2019/04/02 19:26:37 syscalls: 2253 2019/04/02 19:26:37 code coverage: enabled 2019/04/02 19:26:37 comparison tracing: enabled 2019/04/02 19:26:37 extra coverage: extra coverage is not supported by the kernel 2019/04/02 19:26:37 setuid sandbox: enabled 2019/04/02 19:26:37 namespace sandbox: enabled 2019/04/02 19:26:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/02 19:26:37 fault injection: enabled 2019/04/02 19:26:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/02 19:26:37 net packet injection: enabled 2019/04/02 19:26:37 net device setup: enabled 19:28:46 executing program 0: syzkaller login: [ 182.551816][ T7813] IPVS: ftp: loaded support on port[0] = 21 19:28:46 executing program 1: [ 182.705602][ T7813] chnl_net:caif_netlink_parms(): no params data found [ 182.800126][ T7813] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.818637][ T7813] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.827726][ T7813] device bridge_slave_0 entered promiscuous mode [ 182.837289][ T7813] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.845057][ T7813] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.853564][ T7813] device bridge_slave_1 entered promiscuous mode [ 182.854578][ T7816] IPVS: ftp: loaded support on port[0] = 21 [ 182.881859][ T7813] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.893997][ T7813] bond0: Enslaving bond_slave_1 as an active interface with an up link 19:28:47 executing program 2: [ 182.937356][ T7813] team0: Port device team_slave_0 added [ 182.947847][ T7813] team0: Port device team_slave_1 added [ 183.035255][ T7813] device hsr_slave_0 entered promiscuous mode [ 183.076597][ T7818] IPVS: ftp: loaded support on port[0] = 21 [ 183.083018][ T7813] device hsr_slave_1 entered promiscuous mode 19:28:47 executing program 3: [ 183.216174][ T7813] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.223495][ T7813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.231452][ T7813] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.238651][ T7813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.356483][ T7816] chnl_net:caif_netlink_parms(): no params data found [ 183.439297][ T7823] IPVS: ftp: loaded support on port[0] = 21 19:28:47 executing program 4: [ 183.520043][ T7816] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.530218][ T7816] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.539614][ T7816] device bridge_slave_0 entered promiscuous mode [ 183.554798][ T7813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.566916][ T7818] chnl_net:caif_netlink_parms(): no params data found [ 183.586717][ T7816] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.601632][ T7816] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.625165][ T7816] device bridge_slave_1 entered promiscuous mode [ 183.652312][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.693852][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.703815][ T7826] IPVS: ftp: loaded support on port[0] = 21 [ 183.712311][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.721973][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 183.753972][ T7813] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.789414][ T7816] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.816964][ T7816] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.845185][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 19:28:48 executing program 5: [ 183.863042][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.871489][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.878732][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.926914][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.936038][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.947373][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.954516][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.965728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.975663][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.987566][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.996651][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.008460][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.009776][ T7829] IPVS: ftp: loaded support on port[0] = 21 [ 184.017424][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.035745][ T7813] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 184.046712][ T7813] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.064277][ T7818] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.071344][ T7818] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.078975][ T7818] device bridge_slave_0 entered promiscuous mode [ 184.089443][ T7818] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.097248][ T7818] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.105854][ T7818] device bridge_slave_1 entered promiscuous mode [ 184.113951][ T7816] team0: Port device team_slave_0 added [ 184.135336][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.143313][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.151530][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.160432][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.168765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.177303][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.196794][ T7816] team0: Port device team_slave_1 added [ 184.207483][ T7818] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.219665][ T7818] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.287714][ T7818] team0: Port device team_slave_0 added [ 184.297792][ T7818] team0: Port device team_slave_1 added [ 184.364338][ T7816] device hsr_slave_0 entered promiscuous mode [ 184.422489][ T7816] device hsr_slave_1 entered promiscuous mode [ 184.515871][ T7823] chnl_net:caif_netlink_parms(): no params data found [ 184.576304][ T7818] device hsr_slave_0 entered promiscuous mode [ 184.612571][ T7818] device hsr_slave_1 entered promiscuous mode [ 184.713794][ T7813] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.731840][ T7823] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.739288][ T7823] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.747066][ T7823] device bridge_slave_0 entered promiscuous mode [ 184.755039][ T7823] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.762202][ T7823] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.770115][ T7823] device bridge_slave_1 entered promiscuous mode [ 184.828666][ T7823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.848527][ T7826] chnl_net:caif_netlink_parms(): no params data found [ 184.866970][ T7823] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.934918][ T7823] team0: Port device team_slave_0 added [ 184.942809][ T7823] team0: Port device team_slave_1 added [ 184.994555][ T7826] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.002281][ T7826] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.010237][ T7826] device bridge_slave_0 entered promiscuous mode 19:28:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0xfd36, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000180)={0xc3, 0xffff}) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r4, r3, 0x0, 0x10013c93e) [ 185.061303][ T7816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.082711][ T7826] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.089833][ T7826] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.103418][ T7836] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 185.136734][ T7826] device bridge_slave_1 entered promiscuous mode [ 185.152020][ T7829] chnl_net:caif_netlink_parms(): no params data found [ 185.171249][ T7816] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.212107][ C0] hrtimer: interrupt took 47611 ns [ 185.235000][ T7823] device hsr_slave_0 entered promiscuous mode [ 185.282768][ T7823] device hsr_slave_1 entered promiscuous mode [ 185.380193][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.399146][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.436558][ T7818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.457961][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.473428][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 19:28:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0xfd36, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000180)={0xc3, 0xffff}) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r4, r3, 0x0, 0x10013c93e) [ 185.489493][ T7821] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.496751][ T7821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.512414][ T7826] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.565684][ T7818] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.590048][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.598446][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.613280][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.621865][ T2955] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.629039][ T2955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.643989][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.651985][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.666716][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.678844][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.691649][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.706416][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.723566][ T7826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.778465][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.787373][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.802887][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.811525][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.818793][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.835936][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.846930][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.859547][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.866698][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.880605][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.889595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.905000][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.916450][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 19:28:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0xfd36, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000180)={0xc3, 0xffff}) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r4, r3, 0x0, 0x10013c93e) [ 185.939945][ T7826] team0: Port device team_slave_0 added [ 185.946262][ T7829] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.960825][ T7829] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.969302][ T7829] device bridge_slave_0 entered promiscuous mode [ 185.986717][ T7829] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.994282][ T7829] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.006765][ T7829] device bridge_slave_1 entered promiscuous mode [ 186.031951][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.041632][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.056535][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.067915][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.082747][ T7826] team0: Port device team_slave_1 added [ 186.106349][ T7816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.130579][ T7823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.171193][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.240969][ T7823] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.317586][ T7826] device hsr_slave_0 entered promiscuous mode [ 186.362592][ T7826] device hsr_slave_1 entered promiscuous mode 19:28:50 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x301880, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x44000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x6) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, 0x0, &(0x7f0000000140)) [ 186.447511][ T7829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.463451][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.474096][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.490831][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.499987][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.509121][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.517526][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.526734][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.536385][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.545003][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.553211][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.560948][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.573505][ T7816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.594192][ T7829] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.610383][ T7856] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 186.718402][ T7856] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.741169][ T7856] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.824831][ T7818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.834335][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.843367][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.851690][ T7821] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.858901][ T7821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.866965][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.875660][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.884153][ T7821] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.891196][ T7821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.900508][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:28:51 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x301880, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x44000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x6) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, 0x0, &(0x7f0000000140)) [ 186.941321][ T7857] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 186.960159][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.993929][ T7829] team0: Port device team_slave_0 added [ 187.013372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.035675][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 19:28:51 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7fff, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x6, 0x4) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2719, &(0x7f0000000000)=""/13, &(0x7f000033bffc)=0xd) [ 187.069246][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.087378][ T7823] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.110889][ T7823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 19:28:51 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000000a) lseek(r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1f, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000040)={0x0, @src_change}) 19:28:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x8001, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2, 0xa00}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x4000700}]}]}, 0x24}}, 0x0) [ 187.147412][ T7829] team0: Port device team_slave_1 added [ 187.171080][ T7826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.179988][ T7863] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 187.272530][ T7875] openvswitch: netlink: IP tunnel dst address not specified [ 187.288281][ T7876] openvswitch: netlink: IP tunnel dst address not specified [ 187.400792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.409316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.418498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.427414][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.436141][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.449641][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.458206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.467164][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.485397][ T7818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.526934][ T7826] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.548758][ T7823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.568833][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 19:28:51 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x200400200) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x400, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x8000000000004}, 0x10) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', 0x0, 0x0, 0x0) write(r0, &(0x7f0000000000)='\r', 0x1) [ 187.577762][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.635833][ T7829] device hsr_slave_0 entered promiscuous mode [ 187.682608][ T7829] device hsr_slave_1 entered promiscuous mode [ 187.749883][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.758940][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.768161][ T7821] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.775300][ T7821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.783187][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.791999][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.800449][ T7821] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.807553][ T7821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.815954][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.824820][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:28:52 executing program 3: pipe2(&(0x7f00000000c0), 0x84000) r0 = socket$inet6(0xa, 0x5, 0x10000000000) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) select(0x0, 0x0, 0x0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000001000)={0x0, 0x2710}) r1 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) accept$inet(r1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000000)={0x80000000, 0x300000, 0x4, 0x80b}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_buf(r0, 0x29, 0x40, &(0x7f0000000f9b), 0x6000000) [ 187.864447][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.877028][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.903825][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.912980][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.921666][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.940660][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.949337][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.958054][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.966798][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.976331][ T7826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.993565][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.038409][ T7826] 8021q: adding VLAN 0 to HW filter on device batadv0 19:28:52 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xf) ioctl$UI_DEV_DESTROY(r0, 0x400c55cb) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x81, 0x37, 0x6, 0x1, 0x4}) [ 188.163514][ T7829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.181803][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.200932][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.211478][ T7829] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.224928][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.234459][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.243564][ T2990] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.250618][ T2990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.272395][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.286193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.295868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.304801][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.311844][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.320062][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.328563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.344479][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.353428][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.361685][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.370416][ T7821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.385441][ T7829] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 188.396694][ T7829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.408517][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.416942][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.425513][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.434262][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.442845][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.451535][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.472489][ T7829] 8021q: adding VLAN 0 to HW filter on device batadv0 19:28:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000380)={0x18, 0xfffffffffffffff5, 0x4, {0x8}}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000036df018000dd98b6150068c8f400102e1bc810c61f5cdfe5ecda0d5991ae2319b629d813ec4e5c9e80ead910ae94d374614c21648c6985d4602dcb0c6ad77a0590164e693b1886f13beeadc6e87c97f4a59625dd9aa4d86303739c51877889fabd713b5f3cc724f20ddd70c6c04cca6bb15a85f0f66f26b58a149f86ac80b7cc6687ce9d"], 0x14}}, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200800, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000300)=0xfffffffffffffff8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r3, 0x402, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x79}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x20000040) recvmmsg(r1, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) 19:28:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, 0xfffffffffffffffd) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x3, 0x318, [0x20000540, 0x0, 0x0, 0x20000640, 0x20000780], 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/787]}, 0x38b) r3 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x60, 0x101000) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000dc0)) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xa4c00, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040)=0xffffffff, 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x21, "7089eda27a8889e3e90036740c850c71d45a96399da8b02f868a2d79a9399f99e3"}, &(0x7f0000000280)=0x29) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000400)={r5, 0x4, 0x86, "92fd38ed027d7821a25d4057c0efd58d19328eb3e8c353de37049b11f79dce302588195f849aab4ff9f727c0455e9f600363cea1e897b99385529357f56d0b9c0f2d71e222cb066848054adc406cac8a9bd23889f6a11f1a67c8ff4c29de6d4bd2b3dabf09491cff30e7548390e5e30d7414ea806697c974bfe42a8fc3004817093b99b9ce9d"}, 0x8e) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x80}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000300)={r6, @in={{0x2, 0x4e21, @multicast2}}, [0x3, 0x4, 0xffffffffffffffac, 0x9, 0x6, 0x1, 0x401, 0x4, 0xffff, 0x401, 0xda, 0x9, 0xffff, 0x3, 0x8]}, &(0x7f0000000100)=0x100) write$binfmt_elf64(r1, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x7fff, 0x5, 0x40, 0x200, 0x4, 0x3, 0x3e, 0xffffffff, 0xc1, 0x40, 0x328, 0x100000000, 0x5, 0x38, 0x1, 0x3, 0xaa33, 0x8}, [{0x60000007, 0x1, 0x101, 0x80000001, 0x2242, 0x1, 0x400, 0x1}], "9403b020ebbd8bd872792021ab1042f12c2a20d300419b163c58312e4b1ee0311b94692e6dcae8c1682ccb017babf9c6cdc8a50b9f4c89e14ea2598338b18fdbb2923255adb2be50a74db96ee64756174abaa2b68686f93ebafaacc9c37c5a8bcf340d59f22d56ca89ae98e6dc5552fef508754fb4b26f6b6cc4c0654c92b0a3a95fdeb96a79d2949b416136e18ad5ac78560c971f0d6fe6a28edf2d5c4587daccca42794486", [[], [], [], []]}, 0x51e) ioctl$UI_BEGIN_FF_ERASE(r4, 0xc00c55ca, &(0x7f0000000200)={0x10, 0x1, 0x4}) 19:28:52 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x301880, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x44000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x6) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, 0x0, &(0x7f0000000140)) 19:28:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1ff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) write$FUSE_LK(r2, &(0x7f00000000c0)={0x28, 0x0, 0x1, {{0x0, 0x6, 0x1, r3}}}, 0x28) dup2(r0, r1) 19:28:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0x2400000000000) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000240)='TPROXY\x00', 0x7) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4500000053000000aafbc5ac1dc51d2a0e870ed8bd65342021a906a067f971b8c29be63d1447e063f897e0cea4170b9535383b0711eef10f10c960246e609c1564052d522a0a84ac90124561a3"], &(0x7f0000000200), 0x0) 19:28:52 executing program 4: syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) epoll_create(0x100000001) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x401, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000004c0)={0x0, 0x7, 0x30, 0x0, 0x4}, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, 0x0) add_key(&(0x7f0000002300)='pkcs7_test\x00', &(0x7f0000002340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000a40)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000021c0)=[{{0x0, 0x0, &(0x7f0000000a40)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000000)=""/112, 0x70) 19:28:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x40) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0x4b, "563e71c6bf0e4a1914ab87b0fc19b016b86ccfbee7d21ad24c9889cb0f46de0ff4f312ea8eeeb4307dbd33a04825ec1c61b0f5fe5a7d9a3f139d1c44a2a0b4d9cda111f86ca6c37447f21f"}, &(0x7f00000000c0)=0x53) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000440)=""/102) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r4, 0x80000000, 0xfffffffffffffff9}, &(0x7f0000000400)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000540)=ANY=[@ANYBLOB="050000000000000004000000050000a90000000000fa4cc1650000000000400003000000000000000000002560b700fff0c6ffff04040000020000000a00000006d7c8892b94caed464580803e9595f0ddfcec5ea3f956d6236ae87df735b6927b0e670dfa13aa523855770c511156b0081230a75f687ad105ba87ec272900c79aeeee0e0efc0fa5bdcc4e6081bb3dfb68c589285130030550447021f1ef9ce28c919ac90a5e9856382cc074ca0648eeba1bdafa07788a42cb0a3fb97af32662c98029a8c6c80b91b036ddc41633c79e94ca657558d79df29fabd0acf913406733739d84d83e9155f326b43e9cc636bebea1cf041cfe270a7c6acd92"]) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000140)={0x0, 0x0, @ioapic}) recvfrom$unix(r2, &(0x7f0000000240)=""/78, 0x4e, 0x2123, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000004c0)={0x401, 0x0, 0x1, 0xaf5b}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000500)={0x8, r5, 0x10001, 0x4}) [ 188.585061][ T7912] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 19:28:52 executing program 3: r0 = gettid() exit(0x800000000000c) getpriority(0xffffffffffffffff, r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000300)={0x101, {{0xa, 0x4e23, 0x0, @rand_addr="39a0f63fb42136d5a8d872e60612d162", 0x40}}, {{0xa, 0x4e23, 0x8, @rand_addr="8ca1815430367afc5211d855a87f6049", 0x576}}}, 0x108) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x22, "c84f2b", "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"}}, 0x110) ptrace$setregs(0xf, r0, 0x6, &(0x7f0000000040)="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") ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000480)={@local, 0x48, r3}) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x67) 19:28:52 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000000)=0xfffffffffffffffe) r1 = request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='/dev/cec#\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='/dev/cec#\x00', r1) socket$kcm(0x10, 0x2, 0x0) 19:28:53 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="006a7362b96f000200000000103ede4a0b51f82c0f65692a6c655b4c16d6421b7baa826dbb563ce25e6d4270184ef88321bd1c0a1dbf8c522a3b1d1dd36a6039160d348333249eef99f1120d0b80fa2710f926ebdb8b"], 0x8) 19:28:53 executing program 4: r0 = memfd_create(&(0x7f0000000100)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x12, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='maps\x00') ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @raw_data=[0x9, 0x7, 0x0, 0x0, 0x4, 0x4cf, 0x101, 0x5, 0x101, 0x6, 0x9b73, 0x3, 0x9, 0x9, 0x10000, 0x2, 0xc84, 0x6, 0x6, 0x7fffffff, 0x7fffffff, 0x58f, 0x2, 0x7, 0x400, 0x7, 0x20, 0x7f, 0x8, 0x81, 0x4, 0xc1]}) clone(0x40002102101ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RVERSION(r1, &(0x7f0000000140)={0x13, 0x65, 0xffff, 0x9, 0x6, '9P2000'}, 0x13) socket(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xfcBj\xf2{\xcb\xb2\x80\x1e\xb4\xfd\xb4\x88\xc1\r\xe4?\xfd\xf1\x8cy\xcc\xb5\t4\x9c\xc5\\\x8f\xc8\xc8\x80\xd5&\x99\xe6\x16kMS\xf3V\xac\xaf,$1[\xb2m\xce\x17\xee0B\x85\x98R\xee\xe3\x14\xe5i\xe4hn\xa5\xe8\x0e.\xa6\xfeo\xb2\xe6h\xec\x91\xd9@\xc2\xf09\a\xbeA\xc90\xb7\xaeP^q\\V\xf1\x01\xcc\x94\xee9\xe3\x96\x9bB\xd9\xcd\xa6\xc4\xca[\v\n0\x9e\x9a\xfc\xcf\xfc_\x85\x0f\xe0\x803\x18.\x02\xd3+') 19:28:53 executing program 2: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$sock_netdev_private(r1, 0x89fd, &(0x7f0000000140)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000100)={0x2, 0x8, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000240)={0x2009, 0x401, 0x200000000004, 0xfc5, 0x2, 0x4}) 19:28:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") modify_ldt$read_default(0x2, &(0x7f0000000080)=""/191, 0xbf) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty=[0x4, 0x0, 0x0, 0x5], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30000c, 0x0, 0x0, @ipv4={[0x207835], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 19:28:53 executing program 2: socket$alg(0x26, 0x5, 0x0) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x80000000, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000001c0)={0xf4}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000003c0)={0x34, 0x0, &(0x7f0000000380)}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) r4 = userfaultfd(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="07000000a7fcff30e43001f6eb01ab845efb30d1c0f7", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000280)={0x7, 0x8000, 0x0, 0x6d86, 0x663b4bbd, 0x4, 0x9571, 0x0, r5}, 0x20) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000440)) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB="020000000000000008000000000000007160000000000000b85100000000000000800000cf58f3ae2429bd867038c1569583a91adc646757a9c784ad83923690a1ddd5d5d8b9c0fc203dd0b421215d060cbb4966951b5384171dfd2eb09a3865c4adc62eeb3d9c14dcd5e0b56783925cdab6093d7f8b5e"]) r6 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) fchmod(r2, 0x0) bind$vsock_dgram(r3, 0x0, 0xfffffffffffffe5f) prctl$PR_GET_THP_DISABLE(0x2a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_upper(&(0x7f0000000500)='./control\x00', &(0x7f0000000540)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb6002067fea5fd778ead4c24e4f4d9074e04e30a54110d1eba0d3fe5a5fa56dc5ebbf81b7e4d4c8f265cd5add58a82ffc7e5e10dc07c4299958633cac41829a7c5b65556b6218"], 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000140)) r7 = gettid() sendmsg$nl_generic(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB="c40000004200200026bd7000ffdbdf250a0000008ca1aa5d64201227eb2d128b4b141c42703d40f553d2afdf3b555c134c2293d76f285b8fc4b5fa034216de431b341e049997b29e55ffc46a5079b1245eb350868a163a6215e01169e87775f90d957af1111ddb55cfd57becd7bed7fe34250ede887c8e9dff90691f00fc57b64b05c56a9a747cb8ded0f53ccbe34c42177bf70f1990ec402ad2f34d946a4adb2dcfb078297824e3ce011286c5f067b6c73b68c108002c00000800000800680001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40800}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r7, 0x15) close(r4) ioctl$int_in(r3, 0x800000c0045002, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x12, 0xfa00, {0x0, &(0x7f0000000300)}}, 0x20) 19:28:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x4da) 19:28:53 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0xa2, &(0x7f0000ffd000/0x2000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) fstat(r1, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x24, 0x40) iopl(0xeb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xfe95) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xef, "0c392c8c49dff0df8657a10c16bbcc1a287e5da8dd97c598b6a8863b7107ec5e8ad3727c50d5767c74d6c273f04eacf27a464d25caf8aff1315491087c43e972c41ac4b642d677a30481263c0fb92b0109328515f764c2a1bce26ac14f3cfcd37beb7475c8b2e454232106b8294f3271609057436ff31b349f92670381456b69cbb0aa94246473f8910c97f53e8554162a11a18ff0913e9aa3bbfa8fc6ba9da852bbd6b0f8bc84ac56c0808d1cfc8c7f6f5682550b8564ad72de97c558f31fcb9354265733d38e8724bc4095a071ea0cbfe258c2dba68b342d53fc3e75e68decf7a770ecfc92f67bb87acca64ed533"}, &(0x7f0000000000)=0xf7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80, 0xc, 0x0, 0x6, r3}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) set_thread_area(&(0x7f00000004c0)={0x0, 0x20101000, 0x2000, 0x0, 0x7, 0x9, 0x6000, 0x0, 0x0, 0x3}) 19:28:53 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x301880, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x44000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x6) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, 0x0, &(0x7f0000000140)) [ 189.490835][ T7969] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 19:28:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x801, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0xffa8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x802, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000180)={0x6, @sliced={0x2, [0x7, 0x1, 0x101, 0x3, 0x7, 0x20, 0x8, 0xd49, 0x0, 0xffffffffffffff81, 0x1000, 0x2, 0x8, 0x80000000, 0xfffffffffffffffb, 0x8, 0x80000000, 0x10001, 0x9, 0xfffffffffffffff7, 0x100, 0x81, 0xf544, 0x4f, 0x9, 0x7fffffff, 0x0, 0x1, 0x52, 0x7, 0xfffffffffffffffa, 0x8, 0x4, 0x4, 0x653, 0x0, 0x16c9, 0x1, 0x1, 0x1000, 0x2, 0x1f, 0x3, 0x477e6507, 0xc8, 0x5, 0x80000001, 0x40], 0x6}}) ioctl$TCFLSH(r1, 0x540b, 0x1) 19:28:53 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="02008e00ce8c7acb7bdb66ec7b85b9d5c2498ca1f5bac4143be1685e430d39ebae9b6e78d4a7bd0cc4ebef031e8fefe754cfe18e2319cee6065661f2a999bba9491cd9e89d1a84bd1e6628e193d09b7daaed82dcef373280249755dc64d3c5e684374c636acc31704c8ae16c2103a28bbf715c3124fb41a55b3e8392437e15ce6756604fe66947a3802c54fa5aa5fa93a7e17b733320c5161109451e4bfd5de4348efa75049a5eaa6339917285fb46dc1a65b81acb03e6652bf14a8c6d997e793d950de9c00297bf0d662e7e6ec0b3b0704f099596c6011f3ed73d99cc4ac8968ef33d355fa84bac8022aa665009"], 0x96) r2 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r2, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000090a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 19:28:54 executing program 2: socket$alg(0x26, 0x5, 0x0) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x80000000, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000001c0)={0xf4}) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000003c0)={0x34, 0x0, &(0x7f0000000380)}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) r4 = userfaultfd(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="07000000a7fcff30e43001f6eb01ab845efb30d1c0f7", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000280)={0x7, 0x8000, 0x0, 0x6d86, 0x663b4bbd, 0x4, 0x9571, 0x0, r5}, 0x20) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000440)) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB="020000000000000008000000000000007160000000000000b85100000000000000800000cf58f3ae2429bd867038c1569583a91adc646757a9c784ad83923690a1ddd5d5d8b9c0fc203dd0b421215d060cbb4966951b5384171dfd2eb09a3865c4adc62eeb3d9c14dcd5e0b56783925cdab6093d7f8b5e"]) r6 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) fchmod(r2, 0x0) bind$vsock_dgram(r3, 0x0, 0xfffffffffffffe5f) prctl$PR_GET_THP_DISABLE(0x2a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_upper(&(0x7f0000000500)='./control\x00', &(0x7f0000000540)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb6002067fea5fd778ead4c24e4f4d9074e04e30a54110d1eba0d3fe5a5fa56dc5ebbf81b7e4d4c8f265cd5add58a82ffc7e5e10dc07c4299958633cac41829a7c5b65556b6218"], 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000140)) r7 = gettid() sendmsg$nl_generic(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB="c40000004200200026bd7000ffdbdf250a0000008ca1aa5d64201227eb2d128b4b141c42703d40f553d2afdf3b555c134c2293d76f285b8fc4b5fa034216de431b341e049997b29e55ffc46a5079b1245eb350868a163a6215e01169e87775f90d957af1111ddb55cfd57becd7bed7fe34250ede887c8e9dff90691f00fc57b64b05c56a9a747cb8ded0f53ccbe34c42177bf70f1990ec402ad2f34d946a4adb2dcfb078297824e3ce011286c5f067b6c73b68c108002c00000800000800680001000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40800}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r7, 0x15) close(r4) ioctl$int_in(r3, 0x800000c0045002, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x12, 0xfa00, {0x0, &(0x7f0000000300)}}, 0x20) 19:28:54 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0xa2, &(0x7f0000ffd000/0x2000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) fstat(r1, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x24, 0x40) iopl(0xeb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xfe95) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xef, "0c392c8c49dff0df8657a10c16bbcc1a287e5da8dd97c598b6a8863b7107ec5e8ad3727c50d5767c74d6c273f04eacf27a464d25caf8aff1315491087c43e972c41ac4b642d677a30481263c0fb92b0109328515f764c2a1bce26ac14f3cfcd37beb7475c8b2e454232106b8294f3271609057436ff31b349f92670381456b69cbb0aa94246473f8910c97f53e8554162a11a18ff0913e9aa3bbfa8fc6ba9da852bbd6b0f8bc84ac56c0808d1cfc8c7f6f5682550b8564ad72de97c558f31fcb9354265733d38e8724bc4095a071ea0cbfe258c2dba68b342d53fc3e75e68decf7a770ecfc92f67bb87acca64ed533"}, &(0x7f0000000000)=0xf7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80, 0xc, 0x0, 0x6, r3}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) set_thread_area(&(0x7f00000004c0)={0x0, 0x20101000, 0x2000, 0x0, 0x7, 0x9, 0x6000, 0x0, 0x0, 0x3}) 19:28:54 executing program 2: r0 = gettid() openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_getres(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r2, 0x7, &(0x7f0000010000)) tkill(r0, 0x1000000000016) r3 = dup3(r1, r2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x5, 0x3, [0x200, 0x9, 0x8]}, &(0x7f0000000040)=0xe) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8, 0xb24c, 0x100000000, r4}, 0x10) [ 190.208771][ T7967] syz-executor.1 (7967) used greatest stack depth: 21256 bytes left 19:28:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r1, 0x7c, "bc0c930492c6f4b340b373dad24e69b19da1eb2048258e310c6bfaed3daac7e6a29eb3b789bf707e53534f8de5d8cb025de90d91d0b06805db49776f800ae635d884c98c77042432afb5c592d15fad383d51033633a0ef1d45946b3f9ffebebfa002b972b131946a133baccad127bb896ffe82ee3c1fe517a5c9b626"}, &(0x7f00000001c0)=0x84) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) 19:28:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xf903, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="2f000000ea255dbf7769a5d7fbe5fee86a82e3def8746fbfd8e24ba50c8f482a0379f1ccf15cb12799e1144db3973341c9caf1b06f9d9ba6b64856c0040ebef534f28871bbac3ee9d7a34e425d6678a243718e943591d8de86fc7b13df81fc686862e902622f4e"], &(0x7f00000000c0)=0x37) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0xff}, &(0x7f0000000140)=0x8) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000500)={0xf000000, 0x1, 0x0, [], &(0x7f0000000000)={0x98f908, 0xfffdfffffffffffe, [], @ptr=0x70a000}}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) 19:28:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x801, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0xffa8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x802, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000180)={0x6, @sliced={0x2, [0x7, 0x1, 0x101, 0x3, 0x7, 0x20, 0x8, 0xd49, 0x0, 0xffffffffffffff81, 0x1000, 0x2, 0x8, 0x80000000, 0xfffffffffffffffb, 0x8, 0x80000000, 0x10001, 0x9, 0xfffffffffffffff7, 0x100, 0x81, 0xf544, 0x4f, 0x9, 0x7fffffff, 0x0, 0x1, 0x52, 0x7, 0xfffffffffffffffa, 0x8, 0x4, 0x4, 0x653, 0x0, 0x16c9, 0x1, 0x1, 0x1000, 0x2, 0x1f, 0x3, 0x477e6507, 0xc8, 0x5, 0x80000001, 0x40], 0x6}}) ioctl$TCFLSH(r1, 0x540b, 0x1) 19:28:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x80000000008}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x100003f00}, 0x2c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa002, 0x0) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f0000000100)={0x0, 0x6, 0x78ae, [], &(0x7f0000000040)=0x4}) 19:28:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) unshare(0x400) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000240)={0x0, 0x2000000001, 0x2, &(0x7f0000000080)}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r4, 0x200, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x49}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x22}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x5) signalfd4(r0, &(0x7f0000000140)={0x8}, 0x8, 0x80000) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r6 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$link(0x8, r5, r6) [ 190.448939][ T8023] Unknown ioctl -1071098328 19:28:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') socket$rds(0x15, 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) sysfs$2(0x2, 0x80000000, &(0x7f0000000400)=""/4096) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=@getstats={0x1c, 0x22, 0x301, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 190.520356][ T8031] Unknown ioctl -1071098328 19:28:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r3, 0x9fc, 0x70bd25, 0x25dfdbfb, {}, ["", ""]}, 0x14}}, 0x43) connect$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x8, 0x6, @local}, 0x14) ioctl$TIOCGLCKTRMIOS(r0, 0x5428, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000240)={@rand_addr=0x8d1, @local, @local}, 0xc) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000280)={0x5, 0x3, 0xfffffffffffff946}) 19:28:54 executing program 4: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffca4, &(0x7f0000000000)='vmnet0\x00\xf0\xff\xff\xff\xff\xff\xffp\x06\x00\x00\x00temppp0cpuse\x01\x00'}, 0x197) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030062e67660f50e900004681e400000100440fe531feabc4aba39d6c450754ddea420fae9972b571112d02") 19:28:54 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0xdf}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x9}, 0x8) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@random="9f5fd736f08c", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ca819d", 0x8, 0x3a, 0x0, @dev, @local, {[], @icmpv6=@echo_request}}}}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20840, 0x0) r3 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fchownat(r2, &(0x7f0000000040)='./file0\x00', r3, r4, 0x0) 19:28:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000000) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{}]}) 19:28:55 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0xa2, &(0x7f0000ffd000/0x2000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) fstat(r1, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x24, 0x40) iopl(0xeb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xfe95) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xef, "0c392c8c49dff0df8657a10c16bbcc1a287e5da8dd97c598b6a8863b7107ec5e8ad3727c50d5767c74d6c273f04eacf27a464d25caf8aff1315491087c43e972c41ac4b642d677a30481263c0fb92b0109328515f764c2a1bce26ac14f3cfcd37beb7475c8b2e454232106b8294f3271609057436ff31b349f92670381456b69cbb0aa94246473f8910c97f53e8554162a11a18ff0913e9aa3bbfa8fc6ba9da852bbd6b0f8bc84ac56c0808d1cfc8c7f6f5682550b8564ad72de97c558f31fcb9354265733d38e8724bc4095a071ea0cbfe258c2dba68b342d53fc3e75e68decf7a770ecfc92f67bb87acca64ed533"}, &(0x7f0000000000)=0xf7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80, 0xc, 0x0, 0x6, r3}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) set_thread_area(&(0x7f00000004c0)={0x0, 0x20101000, 0x2000, 0x0, 0x7, 0x9, 0x6000, 0x0, 0x0, 0x3}) 19:28:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xa00, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000200)={0xff, "7f082049ee12f5b1812743bdc27c1bd7a588cad9598c25efa58fa1edec76c270", 0x21, 0x9, 0x7, 0x6, 0x2}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x80000001, @dev={0xfe, 0x80, [], 0xe}, 0x5}, {0xa, 0x4e21, 0x1c23, @dev={0xfe, 0x80, [], 0x23}, 0x3ff}, r2, 0x4}}, 0x48) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f00000001c0)={0x0, 0x34324142, 0x0, @stepwise}) 19:28:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {0x0}], 0x3, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480), 0x0, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) prctl$PR_GET_FP_MODE(0x2e) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000340)={r1, 0xfc70000000000000, 0x7ff}, 0x0, &(0x7f0000002280)="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", &(0x7f0000000380)="23bcd4c7bd48bfefc1cf8872afa990919225b0387553b9740ec3b2a50a1ee6ff0ad713403758b73f") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x8) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000140)=0x3f) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000280)={r3, 0x1, 0x6, @random="efef04321cf1"}, 0x10) r4 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r4, 0x6, &(0x7f0000000000)={0x3c, 0xa2, 0x7}) chroot(&(0x7f0000000180)='./file1\x00') r5 = accept$alg(r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x6}) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x20000011) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:28:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r0, &(0x7f00000000c0)='mounts\x00') clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x8) 19:28:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x2c, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'bcsf0\x00', 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc92e60c01fdc78df, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000080)=0x719, 0x4) r3 = getuid() setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x2, 0x4e23, 0x6, 0xa, 0xa0, 0xa0, 0x7f, r1, r3}, {0x5, 0xffffffffffff27da, 0x9, 0x7ff, 0xffffffff, 0x6, 0x4, 0x80000000}, {0x7, 0x7ff, 0x6d335acc}, 0x3, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x3506, 0x6, 0x0, 0x400, 0x2, 0x7f, 0x1f}}, 0xe8) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000240)={'ve\x05\n\x00\x00\x00\n\x00', @ifru_ivalue=0x3f}) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 19:28:57 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0xa2, &(0x7f0000ffd000/0x2000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) fstat(r1, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x24, 0x40) iopl(0xeb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xfe95) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xef, "0c392c8c49dff0df8657a10c16bbcc1a287e5da8dd97c598b6a8863b7107ec5e8ad3727c50d5767c74d6c273f04eacf27a464d25caf8aff1315491087c43e972c41ac4b642d677a30481263c0fb92b0109328515f764c2a1bce26ac14f3cfcd37beb7475c8b2e454232106b8294f3271609057436ff31b349f92670381456b69cbb0aa94246473f8910c97f53e8554162a11a18ff0913e9aa3bbfa8fc6ba9da852bbd6b0f8bc84ac56c0808d1cfc8c7f6f5682550b8564ad72de97c558f31fcb9354265733d38e8724bc4095a071ea0cbfe258c2dba68b342d53fc3e75e68decf7a770ecfc92f67bb87acca64ed533"}, &(0x7f0000000000)=0xf7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80, 0xc, 0x0, 0x6, r3}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) set_thread_area(&(0x7f00000004c0)={0x0, 0x20101000, 0x2000, 0x0, 0x7, 0x9, 0x6000, 0x0, 0x0, 0x3}) 19:28:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="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", 0x4c1, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000840)=""/4096, 0x57a) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000440)=ANY=[@ANYRES32=0x0], &(0x7f0000000040)=0x1) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x3, 0x200000) ioctl$NBD_DISCONNECT(r3, 0xab08) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x200, 0x90) dup(r2) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000780)) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) write$sndseq(r3, &(0x7f0000001900)=[{0x100, 0x4, 0x3, 0x9d, @tick=0x1, {0x1e3, 0x7fffffff}, {0x9, 0x1}, @queue={0x2, {0xcc0e, 0x6}}}, {0x362b, 0xff, 0xff, 0x400, @time, {0x1, 0x4}, {0x3, 0xfffffffffffffffd}, @raw8={"7b496d576d0dddeedc6373c3"}}, {0x401, 0x8000, 0x148, 0x0, @tick=0x8, {0x5, 0x40}, {0x8000, 0x800}, @connect={{0x8, 0xfff}, {0x2, 0xfe4d}}}, {0x8000000, 0x58, 0x4, 0x7f, @time={0x77359400}, {0x99, 0x7}, {0x7fff, 0x4}, @queue={0x2, {0x1, 0xff}}}, {0x27, 0x1, 0x100000001, 0x95, @time={0x0, 0x989680}, {0x8, 0x81}, {0x40, 0xfffffffffffffffb}, @addr={0x1, 0x9}}, {0x6e, 0xffffffff, 0x3, 0x7f, @time={0x77359400}, {0x1, 0x9}, {0x1, 0x7b2}, @note={0x8, 0x8, 0xe3, 0x3f, 0x1}}, {0x7, 0x3, 0x100, 0x4, @time={0x0, 0x1c9c380}, {0x8, 0xffffffffffffff95}, {0x1778, 0x8}, @queue={0x9, {0x6, 0x9}}}, {0x401, 0x80000001, 0x8, 0x9, @tick=0x3, {0x2, 0x8}, {0x5ef, 0x7}, @addr={0x0, 0x80}}, {0x8b, 0xffffffffffffffc0, 0x7ff, 0x492d, @tick=0x8654, {0x7001, 0x18000000000000}, {0x4, 0x7}, @raw32={[0x0, 0x10000, 0x2]}}], 0x1b0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast1}, 0x9}, {0xa, 0x4e20, 0xfffffffffffffff8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, 0xfffffffffffffff7}, 0x2, [0x0, 0x4, 0x1, 0xe2de, 0x1, 0x0, 0x7, 0x40]}, 0x5c) r4 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x80002) statx(r4, &(0x7f0000000180)='./file0\x00', 0x6500, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000600)) openat$vim2m(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/video35\x00', 0x2, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v1={0x1000000, [{0xb425, 0x1}]}, 0xc, 0x3) semget$private(0x0, 0x3, 0x200) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r5 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) write$cgroup_type(r5, &(0x7f00000000c0)='threaded\x00', 0xff4c) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000001880)=@add_del={0x2, &(0x7f0000001840)='veth0_to_bond\x00'}) [ 193.300110][ T8085] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 19:28:57 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001240)=0x14, 0x0) sendto$packet(r2, &(0x7f0000001140)="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", 0xfa, 0x4, &(0x7f0000001280)={0x11, 0x5, r3, 0x1, 0x8001}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$FUSE(r0, &(0x7f0000000040), 0x1000) r4 = syz_open_dev$mice(&(0x7f0000001040)='/dev/input/mice\x00', 0x0, 0x8000) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0x7}]}}}]}, 0x3c}}, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000001080)={0x3, 0x10000, 0x1, 0x3ff, 0x7, 0x4}) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000012c0)={0x0, 0x100000000, 0x8, 0x8, 0x3, 0x4, 0x2, 0x400, {0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x8, 0x1c9, 0x8, 0x6, 0xffffffff}}, &(0x7f0000001380)=0xb0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000013c0)={0x2, [0x0, 0x0]}, &(0x7f0000001400)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000001440)={r6, 0x0, 0x2, 0x124, 0xeb9, 0x0, 0x7f, 0x101, {r7, @in6={{0xa, 0x4e22, 0x1, @remote, 0x8001}}, 0xaebf, 0x3, 0x7, 0x1, 0x2}}, &(0x7f0000001500)=0xb0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) 19:28:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) bind$can_raw(r1, &(0x7f0000000040), 0x10) write(r1, &(0x7f0000000080)="26f58cbeef78c3ec195fa9105e1664aaa6e8166fb702cacf38dd6235eedccb4bf2ab68fc3d5ec1", 0x27) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000840)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfd}, 0x14}}, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000003c0)={0x0, 0xfffffffd, 0x2, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 19:28:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x10001, 0x9ead, 0x9}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b000000000000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="0203060910003f000000004c9e00000002001300020000000000000000f8a60105000600200000000000070000001f0000000001000300000000000002000100f500000000000002000100000500000a00000000000000000000000000000000170000000000000000000000000000000000003c15000000000000000000003c53e68b5b424961acb900"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000002, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f00000003c0)) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000002c0)={0x1, 0x0, @pic={0x10001, 0x400, 0x5, 0x1f, 0x80000001, 0x2, 0x0, 0x930000000000000, 0x8, 0x5, 0x1, 0x9, 0x81, 0x3ff, 0x6, 0xffffffffffff73d4}}) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000140)={0x5, 0x9, 0x2, 0x3, 0x18, 0xf9, 0x9, 0x100000001, 0x8, 0x6, 0x80000001, 0x8}) 19:28:57 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0xfffffffffffffffe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x20000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) rseq(0x0, 0x0, 0x0, 0x0) r3 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000fec000/0x4000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f00000000c0)=""/33) r4 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000100)={0x5, "a7ec316cca7d3224b0ccf74622c4740c815c0fa8538d594c71311f091b19c72e", 0x3, 0x22, 0x0, 0x7, 0x0, 0x4, 0x3ac, 0x80}) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000040)={r4, 0x0, 0x606, 0x0, 0x90}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x1, 0x0, 0x0) 19:28:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000040)="71fe000000008000000001800000000019", 0x11) io_setup(0x1, &(0x7f0000479000)=0x0) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x4, 0x20000) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f00000003c0)=0x1) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="16", 0x1}]) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'batadv0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000b90e00003f000000eeffffff0000000008000000810000000200000009000000030000000300000004000000f8ffffff8000000000040000ffff00005ab00000090000006d0a00000001000009000000230c000000000000"]}) r4 = shmget$private(0x0, 0x2000, 0x1e05, &(0x7f0000ffc000/0x2000)=nil) r5 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r7 = getuid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) r10 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x40001, 0x0) ioctl$TIOCGPGRP(r10, 0x540f, &(0x7f0000000380)=0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000280)={{0x5, r5, r6, r7, r8, 0x80, 0x40}, 0x7, 0x6, 0xa1, 0x3, r9, r11, 0x3}) [ 193.654202][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 193.654218][ T26] audit: type=1326 audit(1554233337.786:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0x50000 19:28:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) bind$can_raw(r1, &(0x7f0000000040), 0x10) write(r1, &(0x7f0000000080)="26f58cbeef78c3ec195fa9105e1664aaa6e8166fb702cacf38dd6235eedccb4bf2ab68fc3d5ec1", 0x27) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000840)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfd}, 0x14}}, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000003c0)={0x0, 0xfffffffd, 0x2, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 193.700929][ T26] audit: type=1326 audit(1554233337.826:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4582b9 code=0x50000 [ 193.724526][ T26] audit: type=1326 audit(1554233337.826:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4582b9 code=0x50000 [ 193.796585][ T26] audit: type=1326 audit(1554233337.826:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4582b9 code=0x50000 19:28:58 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x4602, 0x200, 0x6, 0x80}, {0x2, 0x880b, 0x1, 0x4}, {0xefd4, 0x80000001, 0x200000000000000, 0x28}]}, 0x10) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f6105000a9b04001f00000001000800080016000400ff7e", 0x24}], 0x1}, 0x0) 19:28:58 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xbb5b, 0x200200) fsync(r0) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x6e3adcf9a6b72f31, 0x1}, 0x1}}, 0x18) r1 = shmget(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f00000000c0)=""/51) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x2276, &(0x7f0000000000)) 19:28:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x100000400000010, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r1, &(0x7f0000000200)="2400000052001f0014f9f4070100000002000710080001000100000008009437c56e00009c6e8fc75e4b10eebe02d86d3cf6977f76a2d7ef9d6621daa96c0196c43ed626abd8f37259943e2b90d9ce2ea728517be127d0edae994a1c56c03ac8844f3cf5db356e3cff3abd2c03607f4f85346a882b52548e65ab596b8d8831d8d251", 0x82) 19:28:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/netlink\x00') bind$rds(r1, &(0x7f00000003c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x8) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x9a, "d8ceb88315e5a331d96dd3b0573a9fe5cbffde136c77ff31c7b807db1811963e0607729f430af49dbd849530ef9b218fa63a24447738f9230e7b8651b1f5943f99d0dd6e7519344a0d0ff8740721cb5dc4679a3f4c1a04862ba34a34d9d71c7dbe8f9c05a1f407a04415cfa167bc7064cd0f2303731404c5d9eaaf8b3d5b64c4f2d69764f3296e15383bae6c5c044fbfced5b536c872104e3c95"}, &(0x7f00000001c0)=0xa2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000240)={r3, @in={{0x2, 0x4e21, @rand_addr=0x2}}, [0x3, 0x7ff, 0x2d3e, 0x1, 0x7d54925f, 0x0, 0x80, 0x6, 0x4, 0x9, 0x3, 0x9, 0x7, 0x0, 0x6]}, &(0x7f0000000340)=0x100) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000400)=0x0) wait4(r4, &(0x7f0000000440), 0x1, &(0x7f0000000480)) r5 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) [ 193.836130][ T26] audit: type=1326 audit(1554233337.826:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0x50000 [ 193.947849][ T26] audit: type=1326 audit(1554233337.826:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4582b9 code=0x50000 [ 193.997234][ T26] audit: type=1326 audit(1554233337.826:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0x50000 [ 194.058267][ T26] audit: type=1326 audit(1554233337.826:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4582b9 code=0x50000 [ 194.081187][ T26] audit: type=1326 audit(1554233337.826:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4582b9 code=0x50000 19:28:58 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0xa2, &(0x7f0000ffd000/0x2000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) fstat(r1, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x24, 0x40) iopl(0xeb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xfe95) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xef, "0c392c8c49dff0df8657a10c16bbcc1a287e5da8dd97c598b6a8863b7107ec5e8ad3727c50d5767c74d6c273f04eacf27a464d25caf8aff1315491087c43e972c41ac4b642d677a30481263c0fb92b0109328515f764c2a1bce26ac14f3cfcd37beb7475c8b2e454232106b8294f3271609057436ff31b349f92670381456b69cbb0aa94246473f8910c97f53e8554162a11a18ff0913e9aa3bbfa8fc6ba9da852bbd6b0f8bc84ac56c0808d1cfc8c7f6f5682550b8564ad72de97c558f31fcb9354265733d38e8724bc4095a071ea0cbfe258c2dba68b342d53fc3e75e68decf7a770ecfc92f67bb87acca64ed533"}, &(0x7f0000000000)=0xf7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80, 0xc, 0x0, 0x6, r3}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:28:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x0, 0x2, 0x7}}, 0x14) getsockopt$inet6_opts(r0, 0x29, 0x24, 0x0, &(0x7f0000000000)) 19:28:58 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f61ffff6552b08502da7bb40e6e6372797074667320747275737465643aea6d696d655f747970"], 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x400400, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x35fa, 0x7fffffff, 0x2, 0x7, 0x0, 0x9, 0x40, 0x8, 0x400, 0x20, 0x1bb6, 0x40, 0x1, 0x1f, 0x0, 0x1, 0x200, 0x3, 0x401, 0xffffffff, 0x5, 0x50fe, 0x800, 0x6, 0x7, 0x8, 0x400, 0x9, 0x75, 0xffff, 0x6, 0x4, 0x200, 0x0, 0x5bf, 0xfff, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={&(0x7f0000000200), 0xe}, 0x80, 0x6, 0x40100000000, 0xd, 0x237, 0x8, 0x10000}, r1, 0x7, r2, 0x4) rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x2, @random="277a4c148d89", 'bridge_slave_0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r3, 0x40047452, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local, 'irlan0\x00'}}) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000000)={0x1, 0x7, 0xfffffffffffffe01, 0x2000000000000000, 0x10, 0xfffffffffffffffc}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 19:28:58 executing program 4: syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$kcm(0x10, 0x800000000002, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)) socket$alg(0x26, 0x5, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x54000010, &(0x7f0000ffa000/0x3000)=nil) r1 = syz_open_dev$dspn(0x0, 0x2, 0x20000) r2 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x4, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7ff) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000300)={0x7c, 0x3, 0x100, 0x0, 0x4, 0x5, 0xffff, 0x4, 0x0, 0x0, 0x3, 0x2, 0x0, 0x7ff, 0x80000001, 0x2, 0x2, 0x10001, 0x9}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000440)=""/255) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x81, 0xffff}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) write$P9_RWRITE(r3, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7177}, 0xb) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) getpriority(0x3, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000000)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000180)) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) unshare(0x3fe) socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xefb20100]}, @empty, @loopback, 0x3}) [ 194.126482][ T26] audit: type=1326 audit(1554233337.826:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8106 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4582b9 code=0x50000 [ 194.246470][ T8157] encrypted_key: keylen parameter is missing [ 194.311821][ T8163] encrypted_key: keylen parameter is missing 19:28:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(0x0, 0x0, 0x2) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0xc1a}, 0x10) r2 = epoll_create1(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) r4 = getgid() write$FUSE_ENTRY(r0, &(0x7f00000002c0)={0x90, 0x0, 0x4, {0x1, 0x2, 0x5b0, 0x8, 0x0, 0x3, {0x0, 0x1ff, 0x8, 0x8, 0x4c0, 0x6, 0x3ff, 0x3, 0x7, 0xff, 0x4, r3, r4, 0x2}}}, 0x90) socket$inet_udp(0x2, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82080008}, 0xc, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="2002000000e7712ec9a533aae6bc82e1540a5b3e17f1285e0d48453c8656002f51242540bda1f543bbd7d0141b96bc94e5bb8d", @ANYRES16=r5, @ANYBLOB="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"], 0x220}, 0x1, 0x0, 0x0, 0x20000000}, 0x91) r6 = epoll_create1(0x0) close(r0) r7 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000c85000)) ioctl$TCSETSW(r7, 0x5403, &(0x7f0000000380)={0x10001, 0x647, 0xf1a, 0x3ff, 0x1a, 0x1000, 0xb12, 0x7, 0x2, 0xc0, 0x0, 0x1f}) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r2, &(0x7f0000000140)={0x5}) 19:28:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=ANY=[@ANYBLOB="0202060910000000000000ac443ab34e4b1fd954714c9e000000020013000220a700000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000003000000000000020001000000000036d3fa0fa95c000000020000000005800500002000000a00000000000000fffcffffffffffff"], 0x80}}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0xc) sched_setaffinity(r2, 0x8, &(0x7f0000000780)=0xecad) r3 = socket$netlink(0x10, 0x3, 0x8000000004) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r4 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000005c0)={0x0, 0x3, 0x10, 0x7, 0x4}, &(0x7f0000000600)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000640)={r5, 0x0, 0xfff, 0x9, 0x3, 0x3}, 0x14) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/hwrng\x00', 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000500), 0x10) write$cgroup_subtree(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="3d8a853294531c81690f000f4a70920a50dabde676557ae345bac6a62a929761a5a7efa1c67ee9f83c3520007069647300"/64], 0x40) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000700)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000340)={0x3c, 0x8000, 0x0, 0x5, 0x0}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000400)={r8, @in6={{0xa, 0x4e24, 0x7, @mcast1, 0x8}}, 0x7ff, 0x0, 0x8001, 0x8, 0x14}, &(0x7f00000004c0)=0x98) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f0000000580)=0xff) r9 = accept4(r7, 0x0, &(0x7f0000000380), 0x0) accept4$alg(r9, 0x0, 0x0, 0x0) r10 = pkey_alloc(0x0, 0x2) pkey_free(r10) write$P9_RSETATTR(r6, &(0x7f0000000540)={0x7, 0x1b, 0x1}, 0x7) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$SO_COOKIE(r11, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000200)=0x8) setrlimit(0xc, &(0x7f0000000080)={0x6, 0x29}) mq_open(&(0x7f0000000240)='.osix_acl_access:eth0user{\x02', 0x40, 0x1, &(0x7f0000000280)={0x100000001, 0x8, 0x8, 0x9, 0x1, 0x3, 0x2, 0x6}) 19:28:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0xff00000000000000, 0x0, 0xffffff84, 0x5601}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r0) 19:28:58 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) write$P9_ROPEN(r0, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0xc0, 0x0, 0x8}, 0x8001}}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, &(0x7f00000000c0), 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 19:28:58 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x200, 0x0) write$UHID_CREATE(r1, &(0x7f00000001c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/242, 0xf2, 0x7, 0x800, 0x3, 0xffffffff, 0x7c00000000000000}, 0x120) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') preadv(r2, &(0x7f0000000480), 0x10000000000000f4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 19:28:58 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000180)=0x7, 0x1) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000240)="e6c75531886cfc8b824a2a6e2b286280435f2bbf6fd271d620adf7156374eba23979a4ea1af3f80f1d6fc83c40ea48f7957b1855893d0e096f99982f825d652ac2d4a16e8686d4ca96c4ebf0c97fdf602c90a6784f675b91a210aab59cc26a243f1c0b35b20903f5a7ca28f5ec3c9b90b659261c3b43c4ee9998bdba4ae11d6f4548f137e4c3b29cab09faccb197edfaae3e404e2623b3498d1eda7cb0aee2df8116a74892c708f36aa3a46c4ee8d203c366074b9784545efa7edf1b8030b5bbb2ef795fc4a99f810122b68198e757e8ca4846da55d4eebbf18e8d678b82344ea5ad74f4e63bbf3850fa97", 0xeb, 0xfffffffffffffffb) keyctl$describe(0x6, r2, &(0x7f0000000340)=""/157, 0x9d) creat(&(0x7f00000001c0)='./bus\x00', 0x1) socketpair$unix(0x1, 0x80000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x11, r4, 0x0) unlink(&(0x7f00000000c0)='./bus\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') preadv(r5, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) r6 = semget$private(0x0, 0x3, 0x40c) dup(r1) semctl$SEM_INFO(r6, 0x0, 0x13, &(0x7f0000000080)=""/3) r7 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname$inet(r7, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000140)=0xfffffffffffffee6) 19:28:58 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0xa2, &(0x7f0000ffd000/0x2000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) fstat(r1, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x24, 0x40) iopl(0xeb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xfe95) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xef, "0c392c8c49dff0df8657a10c16bbcc1a287e5da8dd97c598b6a8863b7107ec5e8ad3727c50d5767c74d6c273f04eacf27a464d25caf8aff1315491087c43e972c41ac4b642d677a30481263c0fb92b0109328515f764c2a1bce26ac14f3cfcd37beb7475c8b2e454232106b8294f3271609057436ff31b349f92670381456b69cbb0aa94246473f8910c97f53e8554162a11a18ff0913e9aa3bbfa8fc6ba9da852bbd6b0f8bc84ac56c0808d1cfc8c7f6f5682550b8564ad72de97c558f31fcb9354265733d38e8724bc4095a071ea0cbfe258c2dba68b342d53fc3e75e68decf7a770ecfc92f67bb87acca64ed533"}, &(0x7f0000000000)=0xf7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80, 0xc, 0x0, 0x6, r3}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:28:58 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) write$P9_ROPEN(r0, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0xc0, 0x0, 0x8}, 0x8001}}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, &(0x7f00000000c0), 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 19:28:58 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0xa2, &(0x7f0000ffd000/0x2000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x562, &(0x7f0000ffd000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000300), &(0x7f0000000480)=0x6e) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) fstat(r1, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x24, 0x40) iopl(0xeb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@remote}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xfe95) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xef, "0c392c8c49dff0df8657a10c16bbcc1a287e5da8dd97c598b6a8863b7107ec5e8ad3727c50d5767c74d6c273f04eacf27a464d25caf8aff1315491087c43e972c41ac4b642d677a30481263c0fb92b0109328515f764c2a1bce26ac14f3cfcd37beb7475c8b2e454232106b8294f3271609057436ff31b349f92670381456b69cbb0aa94246473f8910c97f53e8554162a11a18ff0913e9aa3bbfa8fc6ba9da852bbd6b0f8bc84ac56c0808d1cfc8c7f6f5682550b8564ad72de97c558f31fcb9354265733d38e8724bc4095a071ea0cbfe258c2dba68b342d53fc3e75e68decf7a770ecfc92f67bb87acca64ed533"}, &(0x7f0000000000)=0xf7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80, 0xc, 0x0, 0x6, r3}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:28:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000004c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$vcsn(&(0x7f0000001a00)='/dev/vcs#\x00', 0x9ea, 0x0) read$eventfd(r1, 0x0, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000180)=""/67, 0x43) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000300)=""/225, 0xe1}, {&(0x7f0000000400)=""/48, 0x30}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f0000000440)=""/117, 0x75}, {&(0x7f00000015c0)=""/90, 0x5a}, {&(0x7f0000001640)=""/87, 0x57}, {0x0}], 0x8, 0x0, 0x0, 0xa0}, 0xb18adc9706b39d51) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000600)={0x8, &(0x7f0000000080)=[{}, {}, {}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000780)={r3, 0x2, &(0x7f0000000680)=[0x7, 0x9], &(0x7f00000006c0)=[0x1ff, 0x60d, 0x1, 0x63, 0x61], 0x42, 0x3, 0x3f, &(0x7f0000000700)=[0x1ff, 0x0, 0x6], &(0x7f0000000740)=[0xfffffffffffffffa]}) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000900)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000001940)={{0x2c, @broadcast, 0x0, 0x1, 'rr\x00', 0x1, 0x7fff, 0x64}, {@multicast1, 0x0, 0x1, 0x5, 0x0, 0x1}}, 0x44) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40a01, 0x0) keyctl$setperm(0x5, 0x0, 0x100000000000400) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x100000001) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000840)) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000880)=@assoc_value={0x0, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b21867a8c5fd29c07e21e33fbef908a25193cb02eb1cc28dcee6015c98b5d0300924dbabd1f2c1413a3ce08f4f69ac175826de7c764a3eca70bb4f2c06a54bcecd215fa284c9f851c861ac40cf3955edfe463de3508072d5dc34b7646c5664800000000000000000000000000000000e4966718a1b04b2fce835002829c9645d157779f3230526872c5f5859990454f4cd7aa88b6c8ea326f2ac75a7b034aac1e6f9fa108009a65243ee6f019ccc43e14c3c68cea32839c60dfd065c5d9e24246aee5d838842655d4341c3c0a13b39dbc4c9d6b8126751c0ff6cd1268ecf2b617a788f808f67f22c200000000000000004deb7d48870dc5588c70501322adad7d71184a8cfff7f5503d53d34b6a6abbe2ae462482d4f273aee2087eaa6bd01c857cf29dd8d939497f3663ba281775364b1518129749c09391d54cb677af80c3f664c8bd6efa5f65ecc2fd3f5257400b3b0bde82dd0f650398b3b950034ca5d6e9feb181e63a19d10b810673eb32288e230f885fa4a7c2e7ca211f205beb68fc0123826d6548b4d9938422699476a465f1521dc5b809e97caefd00000000856d54963ee81a1d19c7de6abded5381ad8e8a27619c0860348c2de1770d5f7435f061", @ANYRES32, @ANYRESHEX=0x0], 0x0) bind$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000008c0)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r6 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r6, 0x80247008, &(0x7f0000000040)) 19:28:59 executing program 2: unshare(0x2000400) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000400)={0xc99, 0x2247, 0x2f10627}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgid(0x0) process_vm_writev(r2, &(0x7f0000000480)=[{&(0x7f0000000300)=""/144, 0x90}, {&(0x7f00000008c0)=""/189, 0xbd}], 0x2, &(0x7f0000000800)=[{&(0x7f00000004c0)=""/246, 0xf6}, {&(0x7f00000005c0)=""/140, 0x8c}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/178, 0xb2}], 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000040)={0x3, 0x2, 0x1000, 0x10001, 0x5, 0xffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000100)="877877815548b53c265a19b453b59a638cb5705891ca29d79f71a5f6c29e1a19f88ed1ae4118e06f97b519daf8fd077b05ff8e58d4fdcb69d00c0d634c19", &(0x7f00000001c0)=""/218}, 0x18) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f00000003c0), 0x0, 0x4000000000006c00) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/15, 0xf) 19:28:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x5, 0x0, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000580)="5f39203a1e", 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x40, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000680)={0xd57d, {{0xa, 0x4e21, 0x40, @rand_addr="c91def5593f2b657ae0804cf627c2efc", 0x4}}}, 0x88) ptrace(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ptrace$poke(0x5, r4, &(0x7f0000000180), 0x5) close(r3) prctl$PR_SET_TSC(0x1a, 0x3) write$cgroup_int(r2, &(0x7f0000000100), 0x1bd) connect$caif(r2, &(0x7f0000000000)=@rfm={0x25, 0xaa, "f003096c3c5485804a0bce9b6cf635ea"}, 0x18) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') splice(r1, 0x0, r3, 0x0, 0x8100000, 0x0) ioctl$TIOCGSID(r2, 0x5429, 0x0) ptrace(0x9, 0x0) 19:28:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000013c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x6c00) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r4 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x20000000000081, 0x408400) r5 = getpid() kcmp(r3, r5, 0x2, r2, r2) r6 = fcntl$getown(r0, 0x9) r7 = perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x8, 0x7f, 0x1f, 0x3, 0x0, 0x80000001, 0x10000, 0x1, 0x20, 0x8, 0x1, 0x4, 0x8001, 0xfbd, 0x101, 0x1, 0x6, 0x1ff, 0x9, 0x1, 0x101, 0x100000001, 0xac43, 0x3, 0x7, 0x9, 0x9, 0x7df, 0x0, 0x1, 0x4, 0xffffffffffffffdc, 0x3ff, 0x1, 0x5, 0x7, 0x0, 0xcfa2, 0x3, @perf_config_ext={0x8001, 0x1}, 0x8, 0x1, 0x0, 0x7, 0x8, 0x7fff, 0x7}, r6, 0x7, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() r12 = geteuid() ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000680)={r7, 0x0, 0x8, 0x6, 0x9}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000000640)=[{&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000140)="6eb6783e1515fdf34a7ad85bbea8656eda378d36d519a3f92bdfa56721da5353f149881ba5f7a8ba6e3bc828c0a9437ea56907b6", 0x34}], 0x1, &(0x7f0000000540)=[@rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r3, r8, r9}, @cred={0x20, 0x1, 0x2, r6, r10, r11}, @rights={0x38, 0x1, 0x1, [r0, r1, r0, r4, r1, r2, r1, r0, r2, r1]}, @rights={0x28, 0x1, 0x1, [r0, r4, r1, r1, r2, r1]}, @cred={0x20, 0x1, 0x2, r6, r12, r13}], 0xf0, 0x4000000}], 0x1, 0x1) [ 345.012333][ T1042] INFO: task syz-executor.0:8170 blocked for more than 143 seconds. [ 345.020516][ T1042] Not tainted 5.1.0-rc3+ #49 [ 345.025824][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 345.034573][ T1042] syz-executor.0 D28552 8170 7813 0x00000004 [ 345.040909][ T1042] Call Trace: [ 345.044362][ T1042] __schedule+0x817/0x1cc0 [ 345.048797][ T1042] ? __sched_text_start+0x8/0x8 [ 345.053801][ T1042] ? wait_woken+0x250/0x250 [ 345.058415][ T1042] schedule+0x92/0x180 [ 345.062733][ T1042] synchronize_rcu_expedited+0x54e/0x5b0 [ 345.068676][ T1042] ? rcu_exp_wait_wake+0x3c0/0x3c0 [ 345.073859][ T1042] ? is_dynamic_key+0x1c0/0x1c0 [ 345.079183][ T1042] ? finish_wait+0x260/0x260 [ 345.083876][ T1042] ? __lock_acquire+0x548/0x3fb0 [ 345.088894][ T1042] ? perf_trace_run_bpf_submit+0x138/0x190 [ 345.094960][ T1042] ? skb_dequeue+0x12e/0x180 [ 345.099567][ T1042] ? find_held_lock+0x35/0x130 [ 345.104545][ T1042] ? skb_dequeue+0x12e/0x180 [ 345.109172][ T1042] synchronize_rcu.part.0+0x76/0xe0 [ 345.114455][ T1042] ? synchronize_rcu_expedited+0x5b0/0x5b0 [ 345.120289][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 345.125789][ T1042] ? trace_hardirqs_on+0x67/0x230 [ 345.130862][ T1042] ? kasan_check_read+0x11/0x20 [ 345.135796][ T1042] synchronize_rcu+0x27/0xa0 [ 345.140476][ T1042] pfkey_release+0x270/0x340 [ 345.145438][ T1042] __sock_release+0xd3/0x2b0 [ 345.150048][ T1042] ? __sock_release+0x2b0/0x2b0 [ 345.155168][ T1042] sock_close+0x1b/0x30 [ 345.159415][ T1042] __fput+0x2e5/0x8d0 [ 345.163849][ T1042] ____fput+0x16/0x20 [ 345.168062][ T1042] task_work_run+0x14a/0x1c0 [ 345.172772][ T1042] exit_to_usermode_loop+0x273/0x2c0 [ 345.178075][ T1042] do_syscall_64+0x52d/0x610 [ 345.182940][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.188840][ T1042] RIP: 0033:0x4582b9 [ 345.192973][ T1042] Code: 42 08 48 89 04 24 e8 c6 ee fc ff 48 8b 6c 24 08 48 83 c4 10 c3 e8 07 1c 00 00 eb c5 cc cc cc cc cc 64 48 8b 0c 25 f8 ff ff ff <48> 3b 61 10 0f 86 9b 00 00 00 48 83 ec 28 48 89 6c 24 20 48 8d 6c [ 345.213151][ T1042] RSP: 002b:00007f87a12c5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 345.222017][ T1042] RAX: 0000000000000009 RBX: 0000000000000002 RCX: 00000000004582b9 [ 345.230370][ T1042] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 000000000000000a [ 345.238402][ T1042] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 345.246478][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f87a12c66d4 [ 345.254758][ T1042] R13: 00000000004be777 R14: 00000000004cf3f0 R15: 00000000ffffffff [ 345.262843][ T1042] [ 345.262843][ T1042] Showing all locks held in the system: [ 345.270594][ T1042] 1 lock held by khungtaskd/1042: [ 345.275728][ T1042] #0: 00000000530df645 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 345.285404][ T1042] 3 locks held by kworker/u4:4/2627: [ 345.290756][ T1042] #0: 00000000474799ee (&rq->lock){-.-.}, at: __schedule+0x1fc/0x1cc0 [ 345.299411][ T1042] #1: 00000000530df645 (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 [ 345.308629][ T1042] #2: 0000000069f5c886 (&base->lock){..-.}, at: lock_timer_base+0x56/0x1b0 [ 345.317586][ T1042] 1 lock held by rsyslogd/7687: [ 345.322523][ T1042] #0: 0000000051766550 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 345.331352][ T1042] 2 locks held by getty/7778: [ 345.336111][ T1042] #0: 00000000562a8044 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 345.345157][ T1042] #1: 00000000726ebb9a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 345.354965][ T1042] 2 locks held by getty/7779: [ 345.359691][ T1042] #0: 00000000dd277401 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 345.368714][ T1042] #1: 00000000ce78bc21 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 345.378521][ T1042] 2 locks held by getty/7780: [ 345.383288][ T1042] #0: 0000000065354e0d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 345.392315][ T1042] #1: 00000000cc7a0533 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 345.401891][ T1042] 2 locks held by getty/7781: [ 345.406696][ T1042] #0: 00000000010d84a7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 345.415839][ T1042] #1: 00000000617fdda7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 345.425507][ T1042] 2 locks held by getty/7782: [ 345.430192][ T1042] #0: 0000000069412c42 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 345.439477][ T1042] #1: 000000004134a8a6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 345.449257][ T1042] 2 locks held by getty/7783: [ 345.454024][ T1042] #0: 0000000070dbe92e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 345.463085][ T1042] #1: 0000000031ea0af6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 345.472847][ T1042] 2 locks held by getty/7784: [ 345.477524][ T1042] #0: 00000000188dedac (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 345.486607][ T1042] #1: 00000000f4fd6b84 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 345.496274][ T1042] 1 lock held by syz-executor.0/8170: [ 345.501639][ T1042] #0: 00000000fcce3432 (&sb->s_type->i_mutex_key#11){+.+.}, at: __sock_release+0x89/0x2b0 [ 345.511911][ T1042] [ 345.514261][ T1042] ============================================= [ 345.514261][ T1042] [ 345.522752][ T1042] NMI backtrace for cpu 0 [ 345.527120][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3+ #49 [ 345.534727][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.544790][ T1042] Call Trace: [ 345.548169][ T1042] dump_stack+0x172/0x1f0 [ 345.552507][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 345.557772][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 345.563460][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 345.569554][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 345.575577][ T1042] watchdog+0x9b7/0xec0 [ 345.579744][ T1042] kthread+0x357/0x430 [ 345.583935][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 345.589510][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 345.595864][ T1042] ret_from_fork+0x3a/0x50 [ 345.600536][ T1042] Sending NMI from CPU 0 to CPUs 1: [ 345.606407][ C1] NMI backtrace for cpu 1 [ 345.606414][ C1] CPU: 1 PID: 2627 Comm: kworker/u4:4 Not tainted 5.1.0-rc3+ #49 [ 345.606420][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.606424][ C1] Workqueue: bat_events batadv_nc_worker [ 345.606431][ C1] RIP: 0010:__lock_acquire+0x9ef/0x3fb0 [ 345.606443][ C1] Code: 0f 85 e9 26 00 00 48 83 7b 40 00 0f 84 b8 0e 00 00 48 8b 95 30 ff ff ff 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 04 02 <84> c0 74 08 3c 03 0f 8e c5 23 00 00 41 8b 42 20 25 00 80 04 00 3d [ 345.606447][ C1] RSP: 0018:ffff8880a169fb18 EFLAGS: 00000802 [ 345.606455][ C1] RAX: 0000000000000000 RBX: ffffffff8a0bec00 RCX: 1ffff11014265dae [ 345.606460][ C1] RDX: 1ffff11014265dae RSI: ffff8880a132ed50 RDI: ffffffff8a0bec40 [ 345.606465][ C1] RBP: ffff8880a169fc50 R08: 00000000b7c12262 R09: ffffffff895e5fd4 [ 345.606471][ C1] R10: ffff8880a132ed50 R11: ffff8880a132e480 R12: ffff8880a132ed48 [ 345.606476][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 345.606481][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 345.606486][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 345.606491][ C1] CR2: 000000c436b81010 CR3: 0000000089ca7000 CR4: 00000000001406e0 [ 345.606494][ C1] Call Trace: [ 345.606498][ C1] ? debug_object_deactivate+0x1e4/0x360 [ 345.606502][ C1] ? mark_held_locks+0xf0/0xf0 [ 345.606505][ C1] ? find_held_lock+0x35/0x130 [ 345.606509][ C1] ? batadv_nc_worker+0x1fa/0x760 [ 345.606513][ C1] ? mark_held_locks+0xf0/0xf0 [ 345.606516][ C1] lock_acquire+0x16f/0x3f0 [ 345.606519][ C1] ? batadv_nc_worker+0xe3/0x760 [ 345.606523][ C1] batadv_nc_worker+0x117/0x760 [ 345.606527][ C1] ? batadv_nc_worker+0xe3/0x760 [ 345.606531][ C1] process_one_work+0x98e/0x1790 [ 345.606534][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 345.606538][ C1] ? lock_acquire+0x16f/0x3f0 [ 345.606542][ C1] worker_thread+0x98/0xe40 [ 345.606545][ C1] ? trace_hardirqs_on+0x67/0x230 [ 345.606549][ C1] kthread+0x357/0x430 [ 345.606553][ C1] ? process_one_work+0x1790/0x1790 [ 345.606557][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 345.606560][ C1] ret_from_fork+0x3a/0x50 [ 345.606911][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 345.829696][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3+ #49 [ 345.837335][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.847493][ T1042] Call Trace: [ 345.850951][ T1042] dump_stack+0x172/0x1f0 [ 345.855531][ T1042] panic+0x2cb/0x65c [ 345.859437][ T1042] ? __warn_printk+0xf3/0xf3 [ 345.864031][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 345.869681][ T1042] ? ___preempt_schedule+0x16/0x18 [ 345.874793][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 345.881328][ T1042] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 345.887592][ T1042] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 345.893895][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 345.900281][ T1042] watchdog+0x9c8/0xec0 [ 345.904664][ T1042] kthread+0x357/0x430 [ 345.908792][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 345.914689][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 345.920938][ T1042] ret_from_fork+0x3a/0x50 [ 345.926566][ T1042] Kernel Offset: disabled [ 345.930908][ T1042] Rebooting in 86400 seconds..