[   58.830090][   T26] audit: type=1800 audit(1572188078.607:25): pid=8606 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0
[   58.865080][   T26] audit: type=1800 audit(1572188078.607:26): pid=8606 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[   58.886733][   T26] audit: type=1800 audit(1572188078.617:27): pid=8606 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[   59.492206][ T8671] sshd (8671) used greatest stack depth: 22888 bytes left
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.1.31' (ECDSA) to the list of known hosts.
2019/10/27 14:54:48 fuzzer started
2019/10/27 14:54:50 dialing manager at 10.128.0.26:34793
2019/10/27 14:54:50 syscalls: 2534
2019/10/27 14:54:50 code coverage: enabled
2019/10/27 14:54:50 comparison tracing: enabled
2019/10/27 14:54:50 extra coverage: extra coverage is not supported by the kernel
2019/10/27 14:54:50 setuid sandbox: enabled
2019/10/27 14:54:50 namespace sandbox: enabled
2019/10/27 14:54:50 Android sandbox: /sys/fs/selinux/policy does not exist
2019/10/27 14:54:50 fault injection: enabled
2019/10/27 14:54:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/10/27 14:54:50 net packet injection: enabled
2019/10/27 14:54:50 net device setup: enabled
2019/10/27 14:54:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
14:56:54 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ptype\x00')
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
preadv(r0, &(0x7f0000001440)=[{&(0x7f0000000080)=""/46, 0x2e}, {&(0x7f00000000c0)=""/153, 0x99}], 0x2, 0x0)

14:56:54 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

syzkaller login: [  194.996280][ T8773] IPVS: ftp: loaded support on port[0] = 21
[  195.087778][ T8775] IPVS: ftp: loaded support on port[0] = 21
[  195.144332][ T8773] chnl_net:caif_netlink_parms(): no params data found
14:56:54 executing program 2:
mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYBLOB="00032cbd7000fbdb08000600f8000000"], 0x24}}, 0x4)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x407}, {0x8000, 0x900e}]}, 0xfffffffffffffdd2, 0x2)
ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
pipe(0x0)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@abs, 0x6e)
unlink(&(0x7f0000000040)='./file0\x00')

[  195.201060][ T8773] bridge0: port 1(bridge_slave_0) entered blocking state
[  195.208843][ T8773] bridge0: port 1(bridge_slave_0) entered disabled state
[  195.222410][ T8773] device bridge_slave_0 entered promiscuous mode
[  195.238424][ T8773] bridge0: port 2(bridge_slave_1) entered blocking state
[  195.253775][ T8773] bridge0: port 2(bridge_slave_1) entered disabled state
[  195.278456][ T8773] device bridge_slave_1 entered promiscuous mode
[  195.359621][ T8773] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  195.417040][ T8773] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  195.432548][ T8778] IPVS: ftp: loaded support on port[0] = 21
14:56:55 executing program 3:
rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100))
ptrace(0x10, 0x0)
ptrace$pokeuser(0x6, 0x0, 0x388, 0xfffffffffffffffe)
r0 = syz_open_procfs(0x0, &(0x7f0000000580)='setgroups\x00')
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000080))
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2000, 0x0)
r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x840, 0x0)
r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x2)
r5 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x807, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(r5, 0xc0585605, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x0, 0x3001}})
ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000009000000000000000500000000000000ceeb1b179068d3cfd2f69f1e241349d3b58216847c2e12ab8bb67d03515c9c842188548849e00ffb", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28, @ANYRES32=r1, @ANYBLOB="000000000000000000000000000000003f85991e01cf5ba47c001872bbacb1694acb4a0bdb7359fc360244ca3762a1ddf1940486952d352a30efc041f83e8869eca3bdd1aa4672b14d2db4207203756b9d6d3e28547c6d9d7a62eec5ddd267ca00", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="000000008000"/28])
move_mount(r3, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8)
r6 = getpid()
r7 = getpid()
rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000100)={0x0, 0x8})
ptrace(0x10, r7)
ptrace$pokeuser(0x6, r7, 0x388, 0xfffffffffffffffe)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2000, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x0, 0x3001}})
ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe)
r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x1c1201, 0x0)
r9 = getpid()
r10 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r10, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r10, 0x117, 0x5, &(0x7f00000000c0)='\n', 0x10)
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000280)={0x0, <r11=>0x0}, &(0x7f00000002c0)=0xc)
ioctl$DRM_IOCTL_GET_CLIENT(r8, 0xc0286405, &(0x7f0000000300)={0x5, 0x7fff, r9, 0x0, r11, 0x0, 0x800, 0x3})

[  195.472608][ T8773] team0: Port device team_slave_0 added
[  195.493512][ T8773] team0: Port device team_slave_1 added
[  195.538185][ T8775] chnl_net:caif_netlink_parms(): no params data found
[  195.632832][ T8773] device hsr_slave_0 entered promiscuous mode
14:56:55 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc88a8ffff000c000400040082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0)

[  195.687855][ T8773] device hsr_slave_1 entered promiscuous mode
[  195.848624][ T8781] IPVS: ftp: loaded support on port[0] = 21
[  195.936058][ T8783] IPVS: ftp: loaded support on port[0] = 21
14:56:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0)
fchownat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0)

[  196.015892][ T8775] bridge0: port 1(bridge_slave_0) entered blocking state
[  196.023696][ T8775] bridge0: port 1(bridge_slave_0) entered disabled state
[  196.031876][ T8775] device bridge_slave_0 entered promiscuous mode
[  196.057919][ T8775] bridge0: port 2(bridge_slave_1) entered blocking state
[  196.065971][ T8775] bridge0: port 2(bridge_slave_1) entered disabled state
[  196.074171][ T8775] device bridge_slave_1 entered promiscuous mode
[  196.095882][ T8778] chnl_net:caif_netlink_parms(): no params data found
[  196.113595][ T8773] bridge0: port 2(bridge_slave_1) entered blocking state
[  196.120888][ T8773] bridge0: port 2(bridge_slave_1) entered forwarding state
[  196.128801][ T8773] bridge0: port 1(bridge_slave_0) entered blocking state
[  196.135888][ T8773] bridge0: port 1(bridge_slave_0) entered forwarding state
[  196.167461][ T8775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  196.196147][   T12] bridge0: port 1(bridge_slave_0) entered disabled state
[  196.204020][   T12] bridge0: port 2(bridge_slave_1) entered disabled state
[  196.215908][ T8775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  196.235047][ T8786] IPVS: ftp: loaded support on port[0] = 21
[  196.265276][ T8778] bridge0: port 1(bridge_slave_0) entered blocking state
[  196.272872][ T8778] bridge0: port 1(bridge_slave_0) entered disabled state
[  196.281020][ T8778] device bridge_slave_0 entered promiscuous mode
[  196.301898][ T8775] team0: Port device team_slave_0 added
[  196.319342][ T8778] bridge0: port 2(bridge_slave_1) entered blocking state
[  196.326777][ T8778] bridge0: port 2(bridge_slave_1) entered disabled state
[  196.334419][ T8778] device bridge_slave_1 entered promiscuous mode
[  196.342600][ T8775] team0: Port device team_slave_1 added
[  196.404144][ T8778] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  196.427420][ T8773] 8021q: adding VLAN 0 to HW filter on device bond0
[  196.466123][ T8778] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  196.478036][ T8781] chnl_net:caif_netlink_parms(): no params data found
[  196.539105][ T8775] device hsr_slave_0 entered promiscuous mode
[  196.576738][ T8775] device hsr_slave_1 entered promiscuous mode
[  196.616751][ T8775] debugfs: Directory 'hsr0' with parent '/' already present!
[  196.636170][ T8778] team0: Port device team_slave_0 added
[  196.643231][ T8778] team0: Port device team_slave_1 added
[  196.662933][ T8783] chnl_net:caif_netlink_parms(): no params data found
[  196.780660][ T8778] device hsr_slave_0 entered promiscuous mode
[  196.817392][ T8778] device hsr_slave_1 entered promiscuous mode
[  196.856493][ T8778] debugfs: Directory 'hsr0' with parent '/' already present!
[  196.881999][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  196.890739][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  196.913217][ T8781] bridge0: port 1(bridge_slave_0) entered blocking state
[  196.920567][ T8781] bridge0: port 1(bridge_slave_0) entered disabled state
[  196.930125][ T8781] device bridge_slave_0 entered promiscuous mode
[  196.938669][ T8781] bridge0: port 2(bridge_slave_1) entered blocking state
[  196.945725][ T8781] bridge0: port 2(bridge_slave_1) entered disabled state
[  196.953654][ T8781] device bridge_slave_1 entered promiscuous mode
[  196.972890][ T8783] bridge0: port 1(bridge_slave_0) entered blocking state
[  196.981761][ T8783] bridge0: port 1(bridge_slave_0) entered disabled state
[  196.990168][ T8783] device bridge_slave_0 entered promiscuous mode
[  196.998291][ T8783] bridge0: port 2(bridge_slave_1) entered blocking state
[  197.005339][ T8783] bridge0: port 2(bridge_slave_1) entered disabled state
[  197.013194][ T8783] device bridge_slave_1 entered promiscuous mode
[  197.035468][ T8781] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  197.053095][ T8773] 8021q: adding VLAN 0 to HW filter on device team0
[  197.101605][ T8781] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  197.118007][ T8783] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  197.135919][ T8786] chnl_net:caif_netlink_parms(): no params data found
[  197.154688][ T8783] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  197.177105][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  197.186044][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  197.195262][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  197.202755][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  197.219353][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  197.231643][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  197.240827][ T2933] bridge0: port 2(bridge_slave_1) entered blocking state
[  197.248066][ T2933] bridge0: port 2(bridge_slave_1) entered forwarding state
[  197.264809][ T8781] team0: Port device team_slave_0 added
[  197.279301][ T8781] team0: Port device team_slave_1 added
[  197.323728][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  197.338263][ T8783] team0: Port device team_slave_0 added
[  197.378469][ T8781] device hsr_slave_0 entered promiscuous mode
[  197.427072][ T8781] device hsr_slave_1 entered promiscuous mode
[  197.467111][ T8781] debugfs: Directory 'hsr0' with parent '/' already present!
[  197.475035][ T8786] bridge0: port 1(bridge_slave_0) entered blocking state
[  197.482225][ T8786] bridge0: port 1(bridge_slave_0) entered disabled state
[  197.493157][ T8786] device bridge_slave_0 entered promiscuous mode
[  197.501458][ T8786] bridge0: port 2(bridge_slave_1) entered blocking state
[  197.508620][ T8786] bridge0: port 2(bridge_slave_1) entered disabled state
[  197.516482][ T8786] device bridge_slave_1 entered promiscuous mode
[  197.524542][ T8783] team0: Port device team_slave_1 added
[  197.608352][ T8783] device hsr_slave_0 entered promiscuous mode
[  197.656990][ T8783] device hsr_slave_1 entered promiscuous mode
[  197.697104][ T8783] debugfs: Directory 'hsr0' with parent '/' already present!
[  197.709228][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  197.722640][ T8786] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  197.734711][ T8786] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  197.779647][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  197.789166][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  197.798541][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  197.816265][ T8786] team0: Port device team_slave_0 added
[  197.825695][ T8786] team0: Port device team_slave_1 added
[  197.860431][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  197.870366][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  197.928383][ T8786] device hsr_slave_0 entered promiscuous mode
[  197.986749][ T8786] device hsr_slave_1 entered promiscuous mode
[  198.036463][ T8786] debugfs: Directory 'hsr0' with parent '/' already present!
[  198.058481][ T8773] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  198.070686][ T8773] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  198.087245][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  198.100068][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  198.109544][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  198.118305][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  198.127051][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  198.172730][ T8775] 8021q: adding VLAN 0 to HW filter on device bond0
[  198.198203][ T8773] 8021q: adding VLAN 0 to HW filter on device batadv0
[  198.227906][ T8775] 8021q: adding VLAN 0 to HW filter on device team0
[  198.243973][ T8778] 8021q: adding VLAN 0 to HW filter on device bond0
[  198.255295][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  198.269430][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  198.297861][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  198.307869][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  198.316178][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  198.323280][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  198.331692][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  198.342531][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  198.351267][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  198.358562][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  198.366255][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  198.409737][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  198.425844][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  198.436275][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  198.452889][ T8778] 8021q: adding VLAN 0 to HW filter on device team0
[  198.464572][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  198.510826][ T8783] 8021q: adding VLAN 0 to HW filter on device bond0
[  198.519154][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  198.528305][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  198.537247][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  198.545793][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  198.555033][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  198.564096][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  198.572546][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  198.581263][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  198.589700][ T2933] bridge0: port 1(bridge_slave_0) entered blocking state
[  198.596794][ T2933] bridge0: port 1(bridge_slave_0) entered forwarding state
[  198.604877][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  198.613880][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  198.622305][ T2933] bridge0: port 2(bridge_slave_1) entered blocking state
[  198.629395][ T2933] bridge0: port 2(bridge_slave_1) entered forwarding state
[  198.637132][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  198.645032][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  198.663460][ T8781] 8021q: adding VLAN 0 to HW filter on device bond0
[  198.688554][ T8783] 8021q: adding VLAN 0 to HW filter on device team0
[  198.702700][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  198.727288][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  198.739570][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  198.752648][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  198.761366][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
14:56:58 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
eventfd(0x7)
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc08c5102, 0x0)
io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x3}, &(0x7f00000003c0))
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
socket(0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c)
listen(r0, 0x4)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r2 = accept(r0, 0x0, 0x0)
write(r1, &(0x7f0000000100), 0x1ede5)
shutdown(r1, 0x2)
sendto$packet(r2, &(0x7f0000000040)='u', 0x1, 0x8, 0x0, 0x0)

[  198.775534][ T8775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  198.793349][ T8781] 8021q: adding VLAN 0 to HW filter on device team0
[  198.834542][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  198.867545][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  198.883435][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  198.891957][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  198.900510][    C0] hrtimer: interrupt took 26689 ns
[  198.901230][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  198.920772][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  198.931733][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  198.940525][ T2933] bridge0: port 1(bridge_slave_0) entered blocking state
[  198.947625][ T2933] bridge0: port 1(bridge_slave_0) entered forwarding state
[  198.955317][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  198.964508][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  198.979165][ T2933] bridge0: port 2(bridge_slave_1) entered blocking state
[  198.986240][ T2933] bridge0: port 2(bridge_slave_1) entered forwarding state
[  198.994325][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  199.003231][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  199.012279][ T2933] bridge0: port 1(bridge_slave_0) entered blocking state
[  199.019393][ T2933] bridge0: port 1(bridge_slave_0) entered forwarding state
[  199.027448][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  199.035248][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  199.043446][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  199.064663][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  199.075533][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  199.084097][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  199.091196][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  199.111972][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  199.120428][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  199.131933][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  199.160472][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  199.170343][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  199.179931][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  199.188985][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  199.198094][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  199.210727][ T8786] 8021q: adding VLAN 0 to HW filter on device bond0
[  199.224873][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  199.235784][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  199.244298][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  199.253888][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  199.263117][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  199.274923][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  199.282800][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  199.291547][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  199.306797][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  199.315355][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  199.324170][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  199.332592][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  199.341241][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  199.349607][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  199.368270][ T8786] 8021q: adding VLAN 0 to HW filter on device team0
[  199.379764][ T8778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  199.391199][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  199.399614][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  199.409957][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  199.419292][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  199.428910][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  199.438047][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  199.446495][   T43] bridge0: port 1(bridge_slave_0) entered blocking state
[  199.453732][   T43] bridge0: port 1(bridge_slave_0) entered forwarding state
[  199.463256][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  199.492731][ T8783] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  199.503391][ T8783] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  199.516303][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  199.524570][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  199.533393][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  199.542460][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  199.551937][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  199.560390][ T3177] bridge0: port 2(bridge_slave_1) entered blocking state
[  199.567463][ T3177] bridge0: port 2(bridge_slave_1) entered forwarding state
[  199.575056][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  199.584679][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  199.594872][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  199.603610][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  199.612791][ T8775] 8021q: adding VLAN 0 to HW filter on device batadv0
[  199.634345][ T8781] 8021q: adding VLAN 0 to HW filter on device batadv0
[  199.662148][ T8778] 8021q: adding VLAN 0 to HW filter on device batadv0
[  199.733354][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  199.756702][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  199.765464][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
14:56:59 executing program 0:

[  199.801730][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  199.810714][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  199.819765][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  199.830518][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  199.858365][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  199.887630][ T8786] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
14:56:59 executing program 0:

[  199.926641][ T8786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  199.951164][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  199.971570][ T8787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  199.982266][ T8831] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
[  200.006831][ T8783] 8021q: adding VLAN 0 to HW filter on device batadv0
14:56:59 executing program 0:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=@routing={0x0, 0x0, 0x4, 0x0, 0x0, [@mcast2]}, 0x18)

[  200.045799][ T8786] 8021q: adding VLAN 0 to HW filter on device batadv0
[  200.198501][ T8831] kvm [8830]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop
14:57:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000005c0)={0x2, 0x221, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb)
sendto$inet6(r0, &(0x7f0000000000), 0x4320, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

[  200.314629][ T8831] kvm [8830]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop
[  200.387593][ T8831] kvm [8830]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1
[  200.622296][ T8867] netlink: del zone limit has 8 unknown bytes
14:57:00 executing program 2:
mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYBLOB="00032cbd7000fbdb08000600f8000000"], 0x24}}, 0x4)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x407}, {0x8000, 0x900e}]}, 0xfffffffffffffdd2, 0x2)
ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
pipe(0x0)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@abs, 0x6e)
unlink(&(0x7f0000000040)='./file0\x00')

[  200.712315][ T8875] netlink: del zone limit has 8 unknown bytes
14:57:00 executing program 1:
syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pidfd_open(0x0, 0x0)
r0 = getpgrp(0x0)
perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x89d02, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x7, @perf_config_ext={0x2}, 0x2, 0x0, 0x5, 0xe5e2ca6783d684b1, 0x2, 0x40}, r0, 0x1, 0xffffffffffffffff, 0x2)
openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0)
r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r2, r3)

14:57:00 executing program 3:
rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100))
ptrace(0x10, 0x0)
ptrace$pokeuser(0x6, 0x0, 0x388, 0xfffffffffffffffe)
r0 = syz_open_procfs(0x0, &(0x7f0000000580)='setgroups\x00')
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000080))
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2000, 0x0)
r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x840, 0x0)
r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x2)
r5 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x807, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(r5, 0xc0585605, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x0, 0x3001}})
ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000009000000000000000500000000000000ceeb1b179068d3cfd2f69f1e241349d3b58216847c2e12ab8bb67d03515c9c842188548849e00ffb", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28, @ANYRES32=r1, @ANYBLOB="000000000000000000000000000000003f85991e01cf5ba47c001872bbacb1694acb4a0bdb7359fc360244ca3762a1ddf1940486952d352a30efc041f83e8869eca3bdd1aa4672b14d2db4207203756b9d6d3e28547c6d9d7a62eec5ddd267ca00", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="000000008000"/28])
move_mount(r3, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8)
r6 = getpid()
r7 = getpid()
rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000100)={0x0, 0x8})
ptrace(0x10, r7)
ptrace$pokeuser(0x6, r7, 0x388, 0xfffffffffffffffe)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2000, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x0, 0x3001}})
ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe)
r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x1c1201, 0x0)
r9 = getpid()
r10 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r10, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r10, 0x117, 0x5, &(0x7f00000000c0)='\n', 0x10)
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000280)={0x0, <r11=>0x0}, &(0x7f00000002c0)=0xc)
ioctl$DRM_IOCTL_GET_CLIENT(r8, 0xc0286405, &(0x7f0000000300)={0x5, 0x7fff, r9, 0x0, r11, 0x0, 0x800, 0x3})

14:57:00 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc88a8ffff000c000400040082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0)

14:57:00 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)

[  201.015639][ T8893] netlink: del zone limit has 8 unknown bytes
14:57:00 executing program 3:

14:57:00 executing program 1:
syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pidfd_open(0x0, 0x0)
r0 = getpgrp(0x0)
perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x89d02, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x7, @perf_config_ext={0x2}, 0x2, 0x0, 0x5, 0xe5e2ca6783d684b1, 0x2, 0x40}, r0, 0x1, 0xffffffffffffffff, 0x2)
openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0)
r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r2, r3)

14:57:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000005c0)={0x2, 0x221, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb)
sendto$inet6(r0, &(0x7f0000000000), 0x4320, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

14:57:00 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc88a8ffff000c000400040082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0)

14:57:01 executing program 5:

14:57:01 executing program 2:
mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYBLOB="00032cbd7000fbdb08000600f8000000"], 0x24}}, 0x4)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x407}, {0x8000, 0x900e}]}, 0xfffffffffffffdd2, 0x2)
ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
pipe(0x0)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@abs, 0x6e)
unlink(&(0x7f0000000040)='./file0\x00')

14:57:01 executing program 3:

[  201.375125][ T8914] netlink: del zone limit has 8 unknown bytes
14:57:01 executing program 5:

14:57:01 executing program 3:

14:57:01 executing program 4:

14:57:01 executing program 1:

14:57:01 executing program 5:

14:57:01 executing program 4:

14:57:01 executing program 3:

14:57:01 executing program 0:

14:57:01 executing program 2:
mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="2400000022c709f22d93a17c0000000ccc7525aff9c9fb7a1d372cc0238ebf47a7793960ae5d98c5c12bc3ce6adb183ef90fa51e7af0eb02209e5e0b628f293cac179c27ba392e4c78659c8c20e65fa8bcf2be928f7278d81a9228bc47d774ba7b089379856b5c5afe9a8af23efe871bcdee93cebe3f79a5531f37c0325c2a3507f12ccdd1b0f1328d37ea5a6f7a54d9bff577d00f2619316e4ad1fb8bd2fa2775a8de99f7a5456b3bdb9b9c0c49aa511f1831ae31b52c657cd1abb58d1dbd88eb1935e66b6730e44e3c38b433d2373072579753d4cd5c8cf849bee1fd940aee9212b1013612e2896f9a9a64c841097057d8944b8f84980ee8e2c0ea0147aa966ab6fc2580739ace58ed93dbc09113cb09bbc1bfcf2097846aa4b4939d60e98fba4ea8a470231487b76475c5e4a76a5ab5d9", @ANYRES16=r0, @ANYBLOB="00032cbd7000fbdb08000600f8000000"], 0x24}}, 0x4)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x407}, {0x8000, 0x900e}]}, 0xfffffffffffffdd2, 0x2)
ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0)
pipe(0x0)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@abs, 0x6e)
unlink(&(0x7f0000000040)='./file0\x00')

14:57:01 executing program 5:

14:57:01 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00')
fchdir(r1)
r2 = inotify_init()
inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1)
getdents64(r1, 0x0, 0x0)

14:57:01 executing program 4:

14:57:01 executing program 3:

14:57:01 executing program 0:

14:57:01 executing program 5:

14:57:02 executing program 3:

14:57:02 executing program 4:

14:57:02 executing program 1:

14:57:02 executing program 2:

14:57:02 executing program 0:

14:57:02 executing program 3:

14:57:02 executing program 5:

14:57:02 executing program 1:

14:57:02 executing program 4:

14:57:02 executing program 3:

14:57:02 executing program 2:

14:57:02 executing program 0:

14:57:02 executing program 1:

14:57:02 executing program 5:

14:57:02 executing program 3:

14:57:02 executing program 0:

14:57:02 executing program 4:

14:57:02 executing program 1:

14:57:02 executing program 2:

14:57:02 executing program 5:

14:57:02 executing program 3:

14:57:02 executing program 0:

14:57:02 executing program 4:

14:57:02 executing program 1:

14:57:02 executing program 2:

14:57:02 executing program 5:

14:57:02 executing program 3:

14:57:02 executing program 0:

14:57:03 executing program 1:

14:57:03 executing program 4:

14:57:03 executing program 2:

14:57:03 executing program 5:

14:57:03 executing program 3:

14:57:03 executing program 1:

14:57:03 executing program 0:

14:57:03 executing program 2:

14:57:03 executing program 4:

14:57:03 executing program 5:

14:57:03 executing program 3:

14:57:03 executing program 1:

14:57:03 executing program 0:

14:57:03 executing program 4:

14:57:03 executing program 2:

14:57:03 executing program 3:

14:57:03 executing program 5:

14:57:03 executing program 0:

14:57:03 executing program 1:

14:57:03 executing program 4:

14:57:03 executing program 2:

14:57:03 executing program 3:

14:57:03 executing program 5:

14:57:03 executing program 4:

14:57:03 executing program 0:

14:57:03 executing program 3:

14:57:03 executing program 2:

14:57:03 executing program 1:
syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)
pidfd_open(0x0, 0x0)
r1 = getpgrp(0x0)
perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x5, 0x5, 0x0, 0x3, 0x89d02, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x7, @perf_config_ext={0x0, 0x6}, 0x2, 0xffffffffffffcb5c, 0x5, 0xe5e2ca6783d684b1, 0x2, 0x40, 0x7ff}, r1, 0x1, r0, 0x2)
r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x200)
r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000100))
r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
dup2(r2, 0xffffffffffffffff)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r5, r6)

14:57:04 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10)
connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d0070d52bafd9c4365dde7f3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31dc0fd9204d487c0e827c48e74be901c460b8b"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48)
r2 = socket$kcm(0x29, 0x1000000000002, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1})
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0)

14:57:04 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:04 executing program 0:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45eddb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f51b106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e582e82ba80a0fa881e689f7615baf78f0859fc000060d6a0b61193d4a1cb622431d4521124d46dab2fee5e91531bfdfe5cb19ff15d91dd1a92efa823a3c231ea82fdf0e7fcf509bf50600a24", 0xc5}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0)
tkill(r0, 0x3c)
ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0)
openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

14:57:04 executing program 3:

14:57:04 executing program 4:

[  204.377111][ T9064] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
14:57:04 executing program 3:
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6628)

14:57:04 executing program 4:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket(0x400040000000015, 0x805, 0x0)
getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f0000000000)=0xf0ff7f)

[  204.544351][ T9080] BPF:hdr_len not found
14:57:04 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4)
connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10)

14:57:04 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10)
connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d0070d52bafd9c4365dde7f3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31dc0fd9204d487c0e827c48e74be901c460b8b"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48)
r2 = socket$kcm(0x29, 0x1000000000002, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x34000}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0x2f81, 0x0)

14:57:04 executing program 1:
syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)
pidfd_open(0x0, 0x0)
r1 = getpgrp(0x0)
perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x5, 0x5, 0x0, 0x3, 0x89d02, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x7, @perf_config_ext={0x0, 0x6}, 0x2, 0xffffffffffffcb5c, 0x5, 0xe5e2ca6783d684b1, 0x2, 0x40, 0x7ff}, r1, 0x1, r0, 0x2)
r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x200)
r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000100))
r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
dup2(r2, 0xffffffffffffffff)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r5, r6)

14:57:04 executing program 4:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000000101fdff000000000000000000008dddb137b90bf01800000800080004000000"], 0x24}}, 0x0)

14:57:04 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

[  204.749923][ T9099] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
[  204.904020][ T9110] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'.
14:57:04 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080))
r1 = syz_open_pts(r0, 0x0)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3)
ioctl$TCGETA(r1, 0x5457, &(0x7f0000000000))

14:57:04 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x402}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  205.243192][ T9119] kvm [9118]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1
[  205.269798][ T9119] kvm [9118]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110
14:57:07 executing program 0:
r0 = socket(0x40000000015, 0x805, 0x0)
connect$inet6(r0, &(0x7f0000001140)={0xa, 0x0, 0x0, @mcast2}, 0x1c)

14:57:07 executing program 4:
getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x0)
open(0x0, 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)
openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(0x0, 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_open_dev$video(&(0x7f0000000300)='/dev/video#\x00', 0x1, 0x840000)
ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0)
write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000000)={0xb}, 0xb)
sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={<r0=>0x0}, &(0x7f0000000500)=0xc)
ptrace$setopts(0x7abb990919170921, r0, 0x10001, 0x111)
ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000a00)={"c5c48455550c5f15d6a1e54e8434d392b1ee8ce0d8cc789e6f9f5fff37ea66e3ca2631545d2fac4abc17eb7ac022137c40ce9850330e934af106b6d2b7b23ab19ac6157f94543f7759d7d90386c0a66d13d3e29cd3c6af3aacf0403dfd57a8f8135dc35686b0919abd7055617083c2d27e3b8f482c0f739c8d5b6b8550e111346a569c4ef7974920a0d7d047f3aa354d1ecdd6032a60c603c404884d346b4f5f2a11da56be949d0f7631fc8cfaaad5c4a62696e3e255e89ea6a55cd3d7c072f17a1259489e5c8c35e774bdf939b28c750dbbcabb6f8243e7ddc524c53053d507b8d8841c66088bb387c003a38c6b56c6d3943436d3bfaee3a64f70cf0786eeefcb20c20d6ccab79d6b56c389e2c2036dd5c530cf9375fcdfc5c64ed37d249442e633724fc2a1c05ceb01c61a1ec83aa77af2a86431dbd70b1f57d83b558d5b7f991e59e4de3d94ecfd0d1ee35e28b03fc0c4edf919b649dbe0bee545c8a523de067f6d4c93585430d396a84a8128244e7880b3fb27d3e25bbdae3248a60f3835a8e5c1b8ec9054f0b28c3b8f3bb8805756908d313f77fe38934b57b1626bf795f20ded88ac5593dfd331d6ee199ae59864a789c50a0716705a5066680491ae4865f94eb777f1af9cecf98eba79e57ba4f056fc2faafc2b6b876323a192fad3e9e2328191df6def6cc8a74e7bf7032a69810371780f6035b205461f06194bee219f01225d7770067d4b8368b6e76cad966e9c68b3fa9129196dc06422e56a72c96dd97c436c97fc9c0fafbe9a70db131c4ccc0c16e37b3dd16b47c80c8dbf457f5eeb2a0bd1bd121d55092b7a421af41520af3a14d021ac7a5b687be522b7077604441a420679cc1f7dc60c6a7a9c38d5cc925f45180bf6c3d03296df35e80cee74a9d5112ad31d9f73a929f26ab98b78034136f5c780db45f6685ef241766a1b1e6b1022867fee580f6d4edd7209d80a69d5a9c14f5c8f40d0146fd345c293f8f528fd0f769ba1d3e1afb2d7ecc7642d84f5427bc7eb8d3df8587fdf9c8a1ae6fb8da5f4c7f41dcc4357aa174bc748f2b7b936acf1a571b37051f582e64662547b5b5a300dad70abe401d31ab0ee0f954836e504b2600fac22a7563f765a5e28a9c8e5070f87c7108d2bba9dd471e07f853794ecc5b07ed9613474efee45e3cbf4d1e8731f6f2fc4916eeb5477e38618149221fdcb7fa0b96dc6d93300310ac036e2bca6de88be17d01ef15da72524dc3c3414aeb8035892e6cb9a8a8e0ede1f083fe121e6d968e2c5974db5a86f9087e11c0e07ed02df3cf64be47e80c63925975d2514335b6cd952154bbc1bf2b52adf0c6529d9d05acf16f5b2178395e7df8ad6223d19a38d63d6785ef1fc69100b79a92325e358f75f8213f858e725fc0c1246ad2f0c1cdb3fc933e7ba971de2707689bfe56cc62cb0179b090d83435d3b"})
read(0xffffffffffffffff, &(0x7f0000000340)=""/175, 0xaf)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

14:57:07 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10)
connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d0070d52bafd9c4365dde7f3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31dc0fd9204d487c0e827c48e74be901c460b8b"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48)
r2 = socket$kcm(0x29, 0x1000000000002, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x2, 0x0)

14:57:07 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)
pidfd_open(0x0, 0x0)
r0 = getpgrp(0x0)
perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x5, 0xe5e2ca6783d684b1, 0x2, 0x40}, r0, 0x1, 0xffffffffffffffff, 0x2)
r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40046607, 0x0)
syz_open_dev$mice(0x0, 0x0, 0x200)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0)
r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r2, r3)

14:57:07 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:07 executing program 2:
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0)
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0)
shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0)
ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f00000003c0))
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x0, 0xf}}, 0x20)
r2 = getpid()
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x9c, 0x92, 0x0, 0x8, 0x0, r2})
write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0)
r3 = accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000380)=0x10)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, 0x0, 0xfffffffffffffe1f)
clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4)
setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000400), 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
socket(0x10, 0x2, 0x0)
syz_open_procfs(0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100))
ptrace$getsig(0x18, 0x0, 0x1, 0x0)

[  207.465162][ T9135] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
14:57:07 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x616, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f0000000300)=""/200, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffd8}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1)

14:57:07 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c)
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6)
sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
r1 = socket$inet6(0xa, 0x80003, 0xff)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071")
sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0)

14:57:07 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:07 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)
pidfd_open(0x0, 0x0)
r0 = getpgrp(0x0)
perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x5, 0xe5e2ca6783d684b1, 0x2, 0x40}, r0, 0x1, 0xffffffffffffffff, 0x2)
r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40046607, 0x0)
syz_open_dev$mice(0x0, 0x0, 0x200)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0)
r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r2, r3)

14:57:07 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10)
connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d0070d52bafd9c4365dde7f3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31dc0fd9204d487c0e827c48e74be901c460b8b"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48)
r2 = socket$kcm(0x29, 0x1000000000002, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x2, 0x0)

14:57:07 executing program 2:
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0)
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0)
shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0)
ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f00000003c0))
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x0, 0xf}}, 0x20)
r2 = getpid()
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x9c, 0x92, 0x0, 0x8, 0x0, r2})
write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0)
r3 = accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000380)=0x10)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, 0x0, 0xfffffffffffffe1f)
clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4)
setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, &(0x7f0000000400), 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
socket(0x10, 0x2, 0x0)
syz_open_procfs(0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100))
ptrace$getsig(0x18, 0x0, 0x1, 0x0)

14:57:07 executing program 2:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:07 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10)
connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d0070d52bafd9c4365dde7f3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31dc0fd9204d487c0e827c48e74be901c460b8b"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48)
r2 = socket$kcm(0x29, 0x1000000000002, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x1}}], 0x2, 0x0)

14:57:07 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:07 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x612, 0x0)
ftruncate(r0, 0x0)

14:57:07 executing program 5:
connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1)
r0 = semget(0x3, 0x2, 0x0)
semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000280)=""/41)

14:57:07 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:08 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x11, 0x800000003, 0x0)
bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14)
sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002400e581a885ddb05cc582f24186cf1b", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000000000000000682fda66d8eaa66e0971a523980d0600078130c22e4f7333728ed700668b1e0b310000cd1dc8206bf9ad6d97611ff95265797fb4002fc988975844be1f2a39ce246e9466c34de4f2f3027977ad2fcd3da80b0ff8179358eea667ca58769651fecf6d952ba381f6a3ad85818a9d5335db756399827418f847debe6409c26cce7caac7dbb538696e3e2266293922f9c865034cbc36ca819a3c5fdcf68bf912806be8"], 0x48}}, 0x0)

14:57:08 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)
pidfd_open(0x0, 0x0)
r1 = getpgrp(0x0)
perf_event_open(0x0, r1, 0x1, r0, 0x2)
r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x200)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000100))
r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r3, r4)

14:57:08 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:08 executing program 5:
r0 = socket$inet6(0xa, 0x800000000000002, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x363, &(0x7f0000000200)=[{&(0x7f0000000140), 0x304}], 0x8}, 0x2}], 0x13, 0x0)

14:57:08 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0xff)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071")
socket$inet(0x2, 0x3, 0x2)
syz_emit_ethernet(0xfdef, &(0x7f0000000240)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "1300dd", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0)

14:57:08 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:08 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/psched\x00')
sendfile(r0, r1, 0x0, 0x80)

14:57:08 executing program 1:
r0 = msgget(0x1, 0x0)
msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/243)

14:57:08 executing program 5:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@quiet='quiet'}]})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)

14:57:08 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:08 executing program 2:
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd)
r0 = gettid()
tkill(r0, 0x39)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x100000001)

14:57:08 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:08 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370)
lseek(r1, 0x203ffffd, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
io_setup(0x3f, &(0x7f00000001c0))
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002})
io_submit(0x0, 0x0, 0x0)
syz_open_dev$vbi(0x0, 0x1, 0x2)
r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x15<g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4p.e\x050,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_\xf8(\xa4\x91\xc8\v\x9b>3\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0)
ftruncate(r2, 0x1000000)
sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0)
write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357)
r3 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0)
r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00')
sendfile(r3, r4, 0x0, 0x497a)
sendfile(r3, r4, &(0x7f0000000040)=0x1ffffffc, 0x5)
ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000100))
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)
socket$inet6_tcp(0xa, 0x1, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)

[  209.051559][ T9227] FAT-fs (loop5): bogus number of reserved sectors
[  209.070628][ T9227] FAT-fs (loop5): Can't find a valid FAT filesystem
[  209.129567][ T9227] FAT-fs (loop5): bogus number of reserved sectors
[  209.168580][ T9227] FAT-fs (loop5): Can't find a valid FAT filesystem
14:57:09 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)
pidfd_open(0x0, 0x0)
r1 = getpgrp(0x0)
perf_event_open(0x0, r1, 0x1, r0, 0x2)
r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x900, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x200)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0), 0x8)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000100))
r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0)
dup2(r3, r4)

14:57:09 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:09 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:09 executing program 5:
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0)
syz_open_pts(0xffffffffffffffff, 0x4000000000002)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd)
r0 = gettid()
tkill(r0, 0x39)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)

14:57:09 executing program 2:
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643ae9"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0)

14:57:09 executing program 0:
sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:09 executing program 5:
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0)
syz_open_pts(0xffffffffffffffff, 0x4000000000002)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd)
r0 = gettid()
tkill(r0, 0x39)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)

[  209.558011][ T9268] ceph: device name is missing path (no : separator in [d:�)
[  209.592151][ T9272] ceph: device name is missing path (no : separator in [d:�)
14:57:09 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:09 executing program 0:
sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:09 executing program 5:
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0)
syz_open_pts(0xffffffffffffffff, 0x4000000000002)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd)
r0 = gettid()
tkill(r0, 0x39)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)

14:57:09 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
r1 = socket$inet6(0xa, 0x1000000000002, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r1, 0x0, r2)
setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000480)={0x77359400}, 0x10)
readv(r3, &(0x7f0000000080)=[{&(0x7f0000000340)=""/176, 0xac}], 0x1)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
socket$inet6_tcp(0xa, 0x1, 0x0)

14:57:09 executing program 2:
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643ae9"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0)

14:57:09 executing program 4:
perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r0=>0xffffffffffffffff})
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r1, r0)

14:57:09 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:09 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffffb264ccad000c000100050d00007d5500010c000b000079"], 0x2c}}, 0x0)

14:57:09 executing program 0:
sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

[  210.016178][ T9300] ceph: device name is missing path (no : separator in [d:�)
14:57:09 executing program 2:
setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c)
r2 = accept4(r0, 0x0, 0x0, 0x80800)
openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0)

14:57:09 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:09 executing program 0:
socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

[  210.143045][ T9313] netlink: 'syz-executor.5': attribute type 1 has an invalid length.
14:57:10 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0)
r1 = socket$inet6(0xa, 0x0, 0x0)
recvmmsg(r1, 0x0, 0x0, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = socket$inet6(0xa, 0x80002, 0x0)
sendto$inet6(r4, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
sendto$inet6(r4, &(0x7f00000009c0)="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", 0x530, 0xc001, 0x0, 0x0)
sendto$inet6(r4, &(0x7f00000002c0)="316930d7ddc47b0d0964e44a889ba6c1be2e4ad52e0283df58b41a65d8c697b9e808de17e3c9abbf55d733e55bac6cd83b64c5c3fdba15150c321554f9b2f15607fc8454bb2491e147c167afbb04d052d1ae68507c3c21a8f6bff9881ee56b2f9f9ea404b6b84fe418c1f324e3a6110f5405570c67e64b5929836a61f8459bb93b0403177ef60a57581f2cd227ad51abf557ad803e079be945d35afc8efb8251b5890e0db3602fbf8f1233447bc4af0fd01d2c2a38767640956faf61d893f5311f42b923fb9683989f5c4e9d4955e33c9498a3a48a70ac89ac878167364a9352b59e289b1abb9b3fa8b462f508ac0f50c8dfdfb5621c74672ac30893b3c82a09a3f0acd926e28bb9044a9111acf413c70147ab883d088539e120c60d170ba8291660fbbef8938b1e0ce0f9f925d4648b875f162d3a137abaf0eb7e512037d784967f008b8b4a684f6aa2b12692d1f4734d6e2cbf5860e097b74b709eace79d0000e2cc097a992bc1010b6c86ea4887117a8e448a89fd085efab072ddcf4e8613f72cea255f2c298f832e3b7db8446020edeea316b0f86b1c3fda99546d1228939a9c50801513c5ae3c2c58b53971665e81f621b64aeb14e21ea3f305e65e662b0297458eb9bbad1f2055b68695942d69a996b95ab4bfe29b0be128", 0x1db, 0x400c000, 0x0, 0x0)
setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4)
setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000000), 0x4)
faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xa1, 0x1600)
socket$nl_xfrm(0x10, 0x3, 0x6)

14:57:10 executing program 4:
r0 = socket$inet(0xa, 0x801, 0x84)
sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff})
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
listen(r0, 0xfc0004)
accept4(r0, 0x0, 0x0, 0x0)

14:57:10 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x200)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

[  210.394661][    C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  210.676371][    C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
14:57:12 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071")
r1 = socket$netlink(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @rand_addr="b6eeb94dabff920469d573bd92064dbf"}}}}]}]}, 0x6c}}, 0x0)

14:57:12 executing program 0:
socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:12 executing program 4:
r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}})
io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f00000008c0), 0x1)

14:57:12 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:12 executing program 2:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = socket$inet6(0xa, 0x80003, 0xff)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071")
syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "b4091d", 0x30, 0xffffff3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2d]}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0)

14:57:12 executing program 5:
r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x2980c, 0x0, 0x0, [], [{0x801}]})

14:57:12 executing program 0:
socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000070000004408f5ffffff0000"], 0x18}}], 0x2, 0x0)

14:57:12 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370)
lseek(r1, 0x203ffffd, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
io_setup(0x3f, &(0x7f00000001c0))
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002})
syz_open_dev$vbi(0x0, 0x1, 0x2)
r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x15<g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4p.e\x050,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_\xf8(\xa4\x91\xc8\v\x9b>3\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0)
ftruncate(r2, 0x0)
sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0)
write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357)
r3 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0)
r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00')
sendfile(0xffffffffffffffff, r4, 0x0, 0x497a)
sendfile(r3, r4, &(0x7f0000000040), 0x0)
ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000100))
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil)
socket$inet6_tcp(0xa, 0x1, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000))

14:57:12 executing program 5:
semget(0x3, 0x2, 0xc600)

[  213.102465][ T9366] Started in network mode
[  213.116259][ T9366] Own node identity ff010000000000000000000000000001, cluster identity 4711
14:57:12 executing program 4:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x4002)
io_setup(0xc32f, &(0x7f0000000440)=<r1=>0x0)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0)
ftruncate(r0, 0x48280)
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000800)='7', 0x1}])

14:57:13 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c)
syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "b4091d", 0x30, 0xffffff3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2d]}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0)

[  213.177763][ T9366] Enabling of bearer <udp:syz0@> rejected, failed to enable media
[  213.213578][ T9378] Enabling of bearer <udp:syz0@> rejected, failed to enable media
14:57:13 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, 0x0, 0x0, 0x0)

14:57:13 executing program 1:
r0 = socket$inet(0xa, 0x801, 0x84)
sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80)
setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20}, 0xb)
r1 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}})
dup3(r1, r0, 0x0)

[  213.378142][   T26] kauditd_printk_skb: 3 callbacks suppressed
[  213.378157][   T26] audit: type=1804 audit(1572188233.157:31): pid=9384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir390162475/syzkaller.mNETrR/25/bus" dev="sda1" ino=16615 res=1
14:57:13 executing program 5:
semget(0x3, 0x0, 0xc6)

[  213.548931][ T9402] ==================================================================
[  213.556791][   T26] audit: type=1804 audit(1572188233.237:32): pid=9384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir390162475/syzkaller.mNETrR/25/bus" dev="sda1" ino=16615 res=1
[  213.557250][ T9402] BUG: KASAN: null-ptr-deref in io_wq_cancel_all+0x28/0x2a0
[  213.557267][ T9402] Write of size 8 at addr 0000000000000004 by task syz-executor.1/9402
[  213.597641][ T9402] 
[  213.599978][ T9402] CPU: 0 PID: 9402 Comm: syz-executor.1 Not tainted 5.4.0-rc4-next-20191025 #0
[  213.608925][ T9402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  213.618972][ T9402] Call Trace:
[  213.618991][ T9402]  dump_stack+0x172/0x1f0
[  213.619006][ T9402]  ? io_wq_cancel_all+0x28/0x2a0
[  213.619022][ T9402]  ? io_wq_cancel_all+0x28/0x2a0
[  213.619036][ T9402]  __kasan_report.cold+0x5/0x41
[  213.619049][ T9402]  ? io_wq_cancel_all+0x28/0x2a0
[  213.641408][ T9402]  kasan_report+0x12/0x20
[  213.641425][ T9402]  check_memory_region+0x134/0x1a0
[  213.641445][ T9402]  __kasan_check_write+0x14/0x20
[  213.660712][ T9402]  io_wq_cancel_all+0x28/0x2a0
[  213.665484][ T9402]  io_ring_ctx_wait_and_kill+0x1e2/0x710
[  213.671113][ T9402]  io_uring_release+0x42/0x50
[  213.671128][ T9402]  __fput+0x2ff/0x890
[  213.671146][ T9402]  ? io_ring_ctx_wait_and_kill+0x710/0x710
[  213.671160][ T9402]  ____fput+0x16/0x20
[  213.671175][ T9402]  task_work_run+0x145/0x1c0
[  213.671193][ T9402]  do_exit+0x904/0x2e60
[  213.671213][ T9402]  ? mm_update_next_owner+0x640/0x640
[  213.703696][ T9402]  ? lock_downgrade+0x920/0x920
[  213.708556][ T9402]  ? _raw_spin_unlock_irq+0x23/0x80
[  213.713771][ T9402]  ? get_signal+0x392/0x24f0
[  213.718364][ T9402]  ? _raw_spin_unlock_irq+0x23/0x80
[  213.723578][ T9402]  do_group_exit+0x135/0x360
[  213.728179][ T9402]  get_signal+0x47c/0x24f0
[  213.732602][ T9402]  ? lock_downgrade+0x920/0x920
[  213.737461][ T9402]  do_signal+0x87/0x1700
[  213.741697][ T9402]  ? __kasan_check_read+0x11/0x20
[  213.746715][ T9402]  ? _copy_to_user+0x118/0x160
[  213.751488][ T9402]  ? setup_sigcontext+0x7d0/0x7d0
[  213.756531][ T9402]  ? exit_to_usermode_loop+0x43/0x380
[  213.761908][ T9402]  ? do_syscall_64+0x65f/0x760
[  213.766678][ T9402]  ? exit_to_usermode_loop+0x43/0x380
[  213.772058][ T9402]  ? lockdep_hardirqs_on+0x421/0x5e0
[  213.777350][ T9402]  ? trace_hardirqs_on+0x67/0x240
[  213.782384][ T9402]  exit_to_usermode_loop+0x286/0x380
[  213.787673][ T9402]  do_syscall_64+0x65f/0x760
[  213.792273][ T9402]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  213.798172][ T9402] RIP: 0033:0x459f39
[  213.802088][ T9402] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  213.821711][ T9402] RSP: 002b:00007f3cd50efcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[  213.830129][ T9402] RAX: 0000000000000001 RBX: 000000000075bfd0 RCX: 0000000000459f39
[  213.838188][ T9402] RDX: 00000000004c0781 RSI: 0000000000000081 RDI: 000000000075bfd4
14:57:13 executing program 5:
setuid(0xee01)
r0 = msgget(0x1, 0x0)
msgsnd(r0, 0x0, 0x0, 0x0)

14:57:13 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6)

14:57:13 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370)
lseek(r1, 0x203ffffd, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
io_setup(0x3f, &(0x7f00000001c0))
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002})
syz_open_dev$vbi(0x0, 0x1, 0x2)
r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x15<g8\xddGdF(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4p.e\x050,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_\xf8(\xa4\x91\xc8\v\x9b>3\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0)
ftruncate(r2, 0x0)
sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0)
write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357)
r3 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0)
r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00')
sendfile(0xffffffffffffffff, r4, 0x0, 0x497a)
sendfile(r3, r4, &(0x7f0000000040), 0x0)
ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000100))
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil)
socket$inet6_tcp(0xa, 0x1, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000))

14:57:13 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, 0x0, 0x0, 0x0)

14:57:13 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)
r0 = socket$inet(0x2, 0x2, 0x0)
setsockopt$inet_int(r0, 0x0, 0x400000000b, &(0x7f0000778ffc)=0x100000001, 0x3)
sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00008a8ff0)={0x2, 0x4e22, @loopback}, 0x10)
recvmsg(r0, &(0x7f000089e000)={0x0, 0x0, 0x0}, 0x2000)

[  213.846268][ T9402] RBP: 000000000075bfc8 R08: 0000000000000009 R09: 0000000000000000
[  213.854229][ T9402] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000075bfd4
[  213.854241][ T9402] R13: 00007ffc779f40ff R14: 00007f3cd50f09c0 R15: 000000000075bfd4
[  213.870181][ T9402] ==================================================================
[  213.878238][ T9402] Disabling lock debugging due to kernel taint
[  213.891401][ T9402] Kernel panic - not syncing: panic_on_warn set ...
[  213.898055][ T9402] CPU: 1 PID: 9402 Comm: syz-executor.1 Tainted: G    B             5.4.0-rc4-next-20191025 #0
[  213.908375][ T9402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  213.912965][ T3922] kobject: 'loop3' (000000003823f68c): fill_kobj_path: path = '/devices/virtual/block/loop3'
[  213.918443][ T9402] Call Trace:
[  213.918462][ T9402]  dump_stack+0x172/0x1f0
[  213.918476][ T9402]  panic+0x2e3/0x75c
[  213.918486][ T9402]  ? add_taint.cold+0x16/0x16
[  213.918498][ T9402]  ? io_wq_cancel_all+0x28/0x2a0
[  213.918514][ T9402]  ? preempt_schedule+0x4b/0x60
[  213.955220][ T9402]  ? ___preempt_schedule+0x16/0x18
[  213.960328][ T9402]  ? trace_hardirqs_on+0x5e/0x240
[  213.965370][ T9402]  ? io_wq_cancel_all+0x28/0x2a0
[  213.970309][ T9402]  end_report+0x47/0x4f
[  213.971031][ T3922] kobject: 'loop4' (0000000016502670): kobject_uevent_env
[  213.974461][ T9402]  ? io_wq_cancel_all+0x28/0x2a0
[  213.974475][ T9402]  __kasan_report.cold+0xe/0x41
[  213.974490][ T9402]  ? io_wq_cancel_all+0x28/0x2a0
[  213.981742][ T3922] kobject: 'loop4' (0000000016502670): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  213.986518][ T9402]  kasan_report+0x12/0x20
[  213.986531][ T9402]  check_memory_region+0x134/0x1a0
[  213.986543][ T9402]  __kasan_check_write+0x14/0x20
[  213.986553][ T9402]  io_wq_cancel_all+0x28/0x2a0
[  213.986565][ T9402]  io_ring_ctx_wait_and_kill+0x1e2/0x710
[  213.986577][ T9402]  io_uring_release+0x42/0x50
[  213.986589][ T9402]  __fput+0x2ff/0x890
[  213.986604][ T9402]  ? io_ring_ctx_wait_and_kill+0x710/0x710
[  214.028780][ T3922] kobject: 'loop4' (0000000016502670): kobject_uevent_env
[  214.031190][ T9402]  ____fput+0x16/0x20
[  214.035873][ T3922] kobject: 'loop4' (0000000016502670): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  214.039817][ T9402]  task_work_run+0x145/0x1c0
[  214.039830][ T9402]  do_exit+0x904/0x2e60
[  214.039844][ T9402]  ? mm_update_next_owner+0x640/0x640
[  214.039859][ T9402]  ? lock_downgrade+0x920/0x920
[  214.039871][ T9402]  ? _raw_spin_unlock_irq+0x23/0x80
[  214.039882][ T9402]  ? get_signal+0x392/0x24f0
[  214.039891][ T9402]  ? _raw_spin_unlock_irq+0x23/0x80
14:57:13 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x400e010)
recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0)

14:57:13 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)
r0 = socket$inet(0x2, 0x2, 0x0)
setsockopt$inet_int(r0, 0x0, 0x400000000b, &(0x7f0000778ffc)=0x100000001, 0x3)
sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00008a8ff0)={0x2, 0x4e22, @loopback}, 0x10)
recvmsg(r0, &(0x7f000089e000)={0x0, 0x0, 0x0}, 0x2000)

[  214.039903][ T9402]  do_group_exit+0x135/0x360
[  214.039914][ T9402]  get_signal+0x47c/0x24f0
[  214.039927][ T9402]  ? lock_downgrade+0x920/0x920
[  214.039951][ T9402]  do_signal+0x87/0x1700
[  214.088464][ T3922] kobject: 'loop5' (00000000a73051b7): kobject_uevent_env
[  214.091886][ T9402]  ? __kasan_check_read+0x11/0x20
[  214.091899][ T9402]  ? _copy_to_user+0x118/0x160
[  214.091918][ T9402]  ? setup_sigcontext+0x7d0/0x7d0
[  214.141526][ T9402]  ? exit_to_usermode_loop+0x43/0x380
[  214.146881][ T9402]  ? do_syscall_64+0x65f/0x760
[  214.151641][ T9402]  ? exit_to_usermode_loop+0x43/0x380
[  214.156995][ T9402]  ? lockdep_hardirqs_on+0x421/0x5e0
[  214.162261][ T9402]  ? trace_hardirqs_on+0x67/0x240
[  214.167279][ T9402]  exit_to_usermode_loop+0x286/0x380
[  214.172550][ T9402]  do_syscall_64+0x65f/0x760
[  214.177122][ T9402]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  214.183000][ T9402] RIP: 0033:0x459f39
[  214.186878][ T9402] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  214.206558][ T9402] RSP: 002b:00007f3cd50efcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[  214.214959][ T9402] RAX: 0000000000000001 RBX: 000000000075bfd0 RCX: 0000000000459f39
[  214.223013][ T9402] RDX: 00000000004c0781 RSI: 0000000000000081 RDI: 000000000075bfd4
[  214.230966][ T9402] RBP: 000000000075bfc8 R08: 0000000000000009 R09: 0000000000000000
[  214.238939][ T9402] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000075bfd4
[  214.246931][ T9402] R13: 00007ffc779f40ff R14: 00007f3cd50f09c0 R15: 000000000075bfd4
[  214.256769][ T9402] Kernel Offset: disabled
[  214.261111][ T9402] Rebooting in 86400 seconds..