[ 71.361622][ T26] audit: type=1800 audit(1565642680.396:26): pid=10228 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 71.400102][ T26] audit: type=1800 audit(1565642680.396:27): pid=10228 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 71.426597][ T26] audit: type=1800 audit(1565642680.396:28): pid=10228 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 72.136902][ T26] audit: type=1800 audit(1565642681.196:29): pid=10228 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.119' (ECDSA) to the list of known hosts. 2019/08/12 20:44:50 fuzzer started 2019/08/12 20:44:54 dialing manager at 10.128.0.26:33609 2019/08/12 20:44:54 syscalls: 2487 2019/08/12 20:44:54 code coverage: enabled 2019/08/12 20:44:54 comparison tracing: enabled 2019/08/12 20:44:54 extra coverage: extra coverage is not supported by the kernel 2019/08/12 20:44:54 setuid sandbox: enabled 2019/08/12 20:44:54 namespace sandbox: enabled 2019/08/12 20:44:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/12 20:44:54 fault injection: enabled 2019/08/12 20:44:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/12 20:44:54 net packet injection: enabled 2019/08/12 20:44:54 net device setup: enabled 20:46:35 executing program 0: 20:46:35 executing program 1: syzkaller login: [ 186.784113][T10394] IPVS: ftp: loaded support on port[0] = 21 [ 186.796152][T10396] IPVS: ftp: loaded support on port[0] = 21 20:46:35 executing program 2: [ 187.009189][T10394] chnl_net:caif_netlink_parms(): no params data found [ 187.026852][T10400] IPVS: ftp: loaded support on port[0] = 21 [ 187.043331][T10396] chnl_net:caif_netlink_parms(): no params data found [ 187.096541][T10394] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.107065][T10394] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.115179][T10394] device bridge_slave_0 entered promiscuous mode 20:46:36 executing program 3: [ 187.144750][T10394] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.151918][T10394] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.159711][T10394] device bridge_slave_1 entered promiscuous mode [ 187.193678][T10396] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.203150][T10396] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.211260][T10396] device bridge_slave_0 entered promiscuous mode [ 187.220642][T10394] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.241782][T10394] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.263789][T10396] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.271725][T10396] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.290310][T10396] device bridge_slave_1 entered promiscuous mode [ 187.335975][T10394] team0: Port device team_slave_0 added [ 187.366360][T10396] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.377151][T10394] team0: Port device team_slave_1 added [ 187.410464][T10396] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.426731][T10402] IPVS: ftp: loaded support on port[0] = 21 20:46:36 executing program 4: [ 187.522951][T10394] device hsr_slave_0 entered promiscuous mode [ 187.550570][T10394] device hsr_slave_1 entered promiscuous mode 20:46:36 executing program 5: [ 187.629367][T10394] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.636490][T10394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.643868][T10394] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.650957][T10394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.665874][T10396] team0: Port device team_slave_0 added [ 187.676550][T10396] team0: Port device team_slave_1 added [ 187.694100][T10400] chnl_net:caif_netlink_parms(): no params data found [ 187.734617][T10405] IPVS: ftp: loaded support on port[0] = 21 [ 187.862334][T10396] device hsr_slave_0 entered promiscuous mode [ 187.901199][T10396] device hsr_slave_1 entered promiscuous mode [ 187.940343][T10396] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.955946][T10400] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.963044][T10400] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.970664][T10400] device bridge_slave_0 entered promiscuous mode [ 187.977990][T10400] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.985103][T10400] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.992847][T10400] device bridge_slave_1 entered promiscuous mode [ 188.008419][ T3490] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.015865][ T3490] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.028076][T10394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.044554][T10409] IPVS: ftp: loaded support on port[0] = 21 [ 188.068749][T10400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.105758][T10400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.119357][ T3490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.127131][ T3490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.173446][T10394] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.196652][T10400] team0: Port device team_slave_0 added [ 188.204104][T10400] team0: Port device team_slave_1 added [ 188.210680][T10402] chnl_net:caif_netlink_parms(): no params data found [ 188.268471][ T3490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.277496][ T3490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.285900][ T3490] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.294831][ T3490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.371806][T10400] device hsr_slave_0 entered promiscuous mode [ 188.410468][T10400] device hsr_slave_1 entered promiscuous mode [ 188.460691][T10400] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.472600][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.481512][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.489759][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.496852][ T2987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.542505][T10405] chnl_net:caif_netlink_parms(): no params data found [ 188.554181][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.563128][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.577163][T10402] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.584985][T10402] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.592908][T10402] device bridge_slave_0 entered promiscuous mode [ 188.605453][T10402] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.613546][T10402] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.621451][T10402] device bridge_slave_1 entered promiscuous mode [ 188.640921][T10402] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.650113][T10409] chnl_net:caif_netlink_parms(): no params data found [ 188.658623][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.667326][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.675930][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.699593][T10402] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.722868][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.733712][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.756823][T10402] team0: Port device team_slave_0 added [ 188.770897][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.779151][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.789860][T10402] team0: Port device team_slave_1 added [ 188.872907][T10402] device hsr_slave_0 entered promiscuous mode [ 188.910552][T10402] device hsr_slave_1 entered promiscuous mode [ 188.950282][T10402] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.958789][T10405] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.966019][T10405] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.973711][T10405] device bridge_slave_0 entered promiscuous mode [ 188.981128][T10405] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.988178][T10405] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.995841][T10405] device bridge_slave_1 entered promiscuous mode [ 189.025168][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.034365][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.045701][T10409] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.052890][T10409] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.060766][T10409] device bridge_slave_0 entered promiscuous mode [ 189.068766][T10409] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.075892][T10409] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.083378][T10409] device bridge_slave_1 entered promiscuous mode [ 189.105007][T10409] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.117616][T10405] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.132009][T10396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.141195][T10394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.150615][T10409] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.163063][T10405] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.187043][T10396] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.213955][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.221577][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.236350][T10405] team0: Port device team_slave_0 added [ 189.248422][T10394] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.257547][T10409] team0: Port device team_slave_0 added [ 189.269561][T10405] team0: Port device team_slave_1 added [ 189.284500][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.293408][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.304059][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.311145][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.318671][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.327296][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.335527][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.342617][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.351705][T10409] team0: Port device team_slave_1 added [ 189.357883][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.423192][T10405] device hsr_slave_0 entered promiscuous mode [ 189.440494][T10405] device hsr_slave_1 entered promiscuous mode [ 189.480724][T10405] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.502865][T10408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.545437][T10400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.555494][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.605484][T10409] device hsr_slave_0 entered promiscuous mode [ 189.660953][T10409] device hsr_slave_1 entered promiscuous mode [ 189.700358][T10409] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.721378][T10400] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.729917][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.738605][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.746976][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.755076][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.762971][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.771540][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.779808][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 20:46:38 executing program 0: timer_delete(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x200, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r2 = msgget(0x1, 0x79) msgsnd(r2, &(0x7f0000000000), 0x8, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter6\x00') sendfile(r3, r4, 0x0, 0x2007ffffffe) socket$netlink(0x10, 0x3, 0x14) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="04000008406775060000005e8c04e16cdb6b04fef099a04d519c044ba82e07691e0f77e1bcaffe1f33875ffc546f2e6aeeac08a4d52c0d6ab4a1e703d29df563416c3c22b36f4ab5d74f4b760366c0441e2059285880aef7eea2000000007c26d5a5c7db83ae0000000000000000d9a6c222b310080e23584fc8df2af1241f622e9f11659f902113e3660ac305de416778f3123bd38eec17582a23751d3bd999c0029aa66afe478d45ec48f45789cb64a156c507c6cd25da4f8c18cff68993f4b35c0615f35ed2fa0511597cd797816eda79a36cb23457814e2bec5a00744f090536b1f69de122947f7677b1f2ff9c22fbfc04a63615fa91"]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x101000, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) [ 189.815185][T10396] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.827725][T10396] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.857641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.870909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.879274][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.889074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.897673][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.906803][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.917621][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.922974][ C1] hrtimer: interrupt took 26332 ns [ 189.924709][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.965375][T10396] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.987933][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.002411][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.010306][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.018698][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.028244][T10407] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.035315][T10407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.043623][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.052135][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.060665][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.069049][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.081601][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.089385][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.098473][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.114325][T10400] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.125502][T10400] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.156624][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.165921][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.174946][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.183191][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.191641][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.202895][T10402] 8021q: adding VLAN 0 to HW filter on device bond0 20:46:39 executing program 0: timer_delete(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x200, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r2 = msgget(0x1, 0x79) msgsnd(r2, &(0x7f0000000000), 0x8, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter6\x00') sendfile(r3, r4, 0x0, 0x2007ffffffe) socket$netlink(0x10, 0x3, 0x14) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="04000008406775060000005e8c04e16cdb6b04fef099a04d519c044ba82e07691e0f77e1bcaffe1f33875ffc546f2e6aeeac08a4d52c0d6ab4a1e703d29df563416c3c22b36f4ab5d74f4b760366c0441e2059285880aef7eea2000000007c26d5a5c7db83ae0000000000000000d9a6c222b310080e23584fc8df2af1241f622e9f11659f902113e3660ac305de416778f3123bd38eec17582a23751d3bd999c0029aa66afe478d45ec48f45789cb64a156c507c6cd25da4f8c18cff68993f4b35c0615f35ed2fa0511597cd797816eda79a36cb23457814e2bec5a00744f090536b1f69de122947f7677b1f2ff9c22fbfc04a63615fa91"]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x101000, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) [ 190.230639][T10409] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.270699][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.278375][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.297305][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.314793][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.328160][T10400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.330276][T10402] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.356803][T10405] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.358816][T10409] 8021q: adding VLAN 0 to HW filter on device team0 20:46:39 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000000)=0xffff, 0x2, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x80100) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) [ 190.365211][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.365661][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.420059][ T2987] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.427168][ T2987] bridge0: port 1(bridge_slave_0) entered forwarding state 20:46:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007e58880e80900006d20002b1f00c0e9ff094a51f10101c7033500f0", 0x26) [ 190.437755][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.455724][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.464795][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.471895][ T2987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.483474][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 20:46:39 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x407, r1) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'raw\x00'}, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) r3 = add_key$user(0x0, &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000680)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r3, 0x0, 0x0, r4) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3ff) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={@local, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800000}) getsockopt(r0, 0xff, 0x7, 0x0, 0x0) utimes(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={{0x0, 0x2710}, {0x0, 0x7530}}) [ 190.493612][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.504601][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.513639][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.530906][ T2987] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.537966][ T2987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.552552][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.560799][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.611043][T10405] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.627634][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.642988][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.654437][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.663669][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.673812][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.680942][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.689329][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.699085][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:46:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007e58880e80900006d20002b1f00c0e9ff094a51f10101c7033500f0", 0x26) [ 190.707985][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.719058][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.730019][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.741429][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.750881][T10408] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.758664][T10408] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 20:46:39 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_FIOSETOWN(r1, 0x8901, 0x0) [ 190.795704][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.804944][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.815224][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.822306][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 20:46:39 executing program 0: creat(&(0x7f0000000200)='./file0\x00', 0x23) acct(&(0x7f0000000480)='./file0\x00') [ 190.839291][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.848725][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.857596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.866944][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.878096][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.885197][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.893201][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.903004][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.912207][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.921089][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.929458][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.943714][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.952998][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.961922][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.977337][T10468] Process accounting resumed [ 190.978548][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.008682][T10405] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 20:46:40 executing program 2: [ 191.049879][T10405] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.085595][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.098349][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.126273][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.135273][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.144399][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.153025][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.161796][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.169971][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.178214][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.186574][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.194767][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.203233][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.211076][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.231544][T10402] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.254595][T10405] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.273603][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.290814][T10407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.305120][T10409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.340034][T10409] 8021q: adding VLAN 0 to HW filter on device batadv0 20:46:40 executing program 3: 20:46:40 executing program 1: 20:46:40 executing program 5: 20:46:40 executing program 3: 20:46:40 executing program 2: 20:46:40 executing program 4: 20:46:40 executing program 0: 20:46:40 executing program 1: 20:46:40 executing program 3: 20:46:40 executing program 2: 20:46:40 executing program 4: 20:46:40 executing program 0: 20:46:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) 20:46:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000022c0)={0x14, 0x8, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 20:46:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x800) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) epoll_create(0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0), 0xc, 0x0}, 0x10) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000cc0)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000e00)={'vcan0\x00', r2}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x80) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 20:46:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:41 executing program 2: 20:46:41 executing program 5: 20:46:41 executing program 3: 20:46:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:41 executing program 5: 20:46:41 executing program 3: 20:46:41 executing program 2: 20:46:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:41 executing program 1: 20:46:41 executing program 2: 20:46:41 executing program 5: 20:46:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:41 executing program 3: 20:46:41 executing program 2: 20:46:41 executing program 5: 20:46:41 executing program 3: 20:46:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:41 executing program 1: 20:46:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:41 executing program 2: 20:46:41 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:41 executing program 3: 20:46:41 executing program 5: 20:46:41 executing program 2: 20:46:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:41 executing program 1: 20:46:41 executing program 2: 20:46:41 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:42 executing program 5: 20:46:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:42 executing program 3: 20:46:42 executing program 2: 20:46:42 executing program 5: 20:46:42 executing program 1: 20:46:42 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:42 executing program 2: 20:46:42 executing program 1: 20:46:42 executing program 5: 20:46:42 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:42 executing program 3: 20:46:42 executing program 5: 20:46:42 executing program 1: 20:46:42 executing program 2: 20:46:42 executing program 3: 20:46:42 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:42 executing program 1: 20:46:42 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:42 executing program 5: 20:46:42 executing program 2: 20:46:42 executing program 3: 20:46:42 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:42 executing program 1: 20:46:42 executing program 3: 20:46:42 executing program 2: 20:46:42 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:42 executing program 5: 20:46:42 executing program 1: 20:46:42 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:42 executing program 3: 20:46:42 executing program 5: 20:46:42 executing program 2: 20:46:43 executing program 3: 20:46:43 executing program 2: 20:46:43 executing program 1: 20:46:43 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:43 executing program 4: socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:43 executing program 5: 20:46:43 executing program 3: 20:46:43 executing program 2: 20:46:43 executing program 1: 20:46:43 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:43 executing program 4: socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:43 executing program 3: 20:46:43 executing program 2: 20:46:43 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x3000) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000000)=0xffff, 0x2, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x80100) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) 20:46:43 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:43 executing program 4: socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:43 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000880)='mounts\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 20:46:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@sha1={0x1, "f1db9bbc42723a031d6ac55a8621dde732d4e6d0"}, 0x15, 0x1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000000c0)) lstat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000300)) fstat(r1, &(0x7f0000000c40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000540)=0xc) stat(&(0x7f0000000800)='./bus\x00', &(0x7f00000005c0)) getegid() getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000440)=0x14) fstat(r3, &(0x7f0000000840)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0xbb6421b9e5d58d2f, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendto$inet6(r2, &(0x7f0000000200)="90992a9622260859ba34523ef1da7b6cbae78d2cf1a7a1e674a372adab32b8fc4af30500eed3ae05b4d607e675a1d6a9637a737226737ce572af94908f63deb938fd5290eda164ff5facbfafda2146d2ee8537f5a3c0b10f419525d668c4fce2a5e998c86808403dfe9b4eb8c836b28ffaa9d6091f037f71d02523f8f10b41c326b04262398704d29a1e8449e6229bae5d488e13ae69c9d26f37bc29e910108ef592957cc48e7c1a0dc05ba15990e3c0ce27c6", 0xb3, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 20:46:43 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:43 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 20:46:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:43 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 20:46:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:43 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x301100, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000080)={0x40, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)={0x6000}) r2 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x1000000, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x2}) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000340)={0x8, @vbi}) 20:46:43 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 20:46:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:44 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@sha1={0x1, "f1db9bbc42723a031d6ac55a8621dde732d4e6d0"}, 0x15, 0x1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000000c0)) lstat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000300)) fstat(r1, &(0x7f0000000c40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000540)=0xc) stat(&(0x7f0000000800)='./bus\x00', &(0x7f00000005c0)) getegid() getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000440)=0x14) fstat(r3, &(0x7f0000000840)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0xbb6421b9e5d58d2f, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendto$inet6(r2, &(0x7f0000000200)="90992a9622260859ba34523ef1da7b6cbae78d2cf1a7a1e674a372adab32b8fc4af30500eed3ae05b4d607e675a1d6a9637a737226737ce572af94908f63deb938fd5290eda164ff5facbfafda2146d2ee8537f5a3c0b10f419525d668c4fce2a5e998c86808403dfe9b4eb8c836b28ffaa9d6091f037f71d02523f8f10b41c326b04262398704d29a1e8449e6229bae5d488e13ae69c9d26f37bc29e910108ef592957cc48e7c1a0dc05ba15990e3c0ce27c6", 0xb3, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 20:46:44 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '?'}, 0x119) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18}, 0x18) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000200)={0x0, @reserved}) writev(r1, &(0x7f0000000740)=[{&(0x7f00000025c0)="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", 0xe0a}], 0x1) write$P9_RREADLINK(r1, &(0x7f0000000240)=ANY=[], 0xc9) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:46:44 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', 0x0}) 20:46:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) [ 195.267704][T10763] UHID_CREATE from different security context by process 29 (syz-executor.2), this is not allowed. [ 195.279855][ T3490] hid-generic 0000:0000:0000.0001: item fetching failed at offset -1748151743 20:46:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', 0x0}) 20:46:44 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 195.343838][ T3490] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 20:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000000)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000009) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0xfffffffffffffffa) mlock2(&(0x7f0000a4f000/0x4000)=nil, 0x4000, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000080)={0x10000, 0x6, 0x1, 0x2, 0x8}) 20:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'gretap0\x00', {0x2, 0x4e24, @empty}}) 20:46:44 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', 0x0}) 20:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) 20:46:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:44 executing program 2: r0 = userfaultfd(0x80800) sigaltstack(&(0x7f0000722000/0x4000)=nil, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00000ed000/0x3000)=nil, 0x3000}, 0x1}) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L+', 0x1}, 0x28, 0x2) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setreuid(r1, r2) 20:46:44 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x0, 0x0, 0x68}}) 20:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) 20:46:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:44 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x9, 0x4000) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000140)={{0x2}, {0x7fff, 0x8}, 0x0, 0x1, 0xb9}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000001c0)=0x25e7, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000040)={0x0, @reserved}) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), 0x4) 20:46:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) 20:46:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000240)={0x0, {0x0, 0x7}}) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r3 = accept$alg(r0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L+', 0x6}, 0x28, 0x2) sendmmsg$alg(r3, &(0x7f0000001100)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ace8659f062fed2a386199fa5ee56c93", 0x10}], 0x1, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000280)={0x0, {0x200, 0x9}}) recvmmsg(r3, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 20:46:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:45 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:45 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x0, 0x0, 0x68}}) 20:46:45 executing program 2: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = socket$inet6(0xa, 0x802, 0x73) mount$9p_tcp(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x200000, &(0x7f0000000280)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@nodevmap='nodevmap'}, {@privport='privport'}, {@version_u='version=9p2000.u'}, {@access_user='access=user'}, {@cache_mmap='cache=mmap'}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@smackfshat={'smackfshat', 0x3d, 'syzkaller\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syzkaller\x00'}}, {@uid_lt={'uid<', r0}}, {@obj_type={'obj_type', 0x3d, 'ppp0'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'trusted&vboxnet0('}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}]}}) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000180)={0x8, {0x4, 0x7fff, 0x80000000, 0x0, 0x9, 0x400}}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x400000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r3, &(0x7f0000000400)="4dd0084781da47a7e66b0259064737ae22812295cce8375c397602caa735e591e21a4834f821cf7f3ec24d8fb49a6cdab04194ec8ea62aa1eecb6beecb440d5096d762d31d34918c33cfa6e113c11671910c1cc556e8381f28788e70bca5732c8017412b49374d407f81af56", &(0x7f0000000480)="0b609f7fa155263c3834f1e2dbaec64d62ffa3632095bdae61f8af51dad0235fc579c4c6540d03055e8f36a35330963a34efdb831ef731791dd1c764463740fbb21755805802b01d539355a17a7b987acdada5552cd38b0b509fa14dd01c9b7cba58786531c7502a7589444812202d928e22a816546b173489f2", 0x1}, 0x20) getsockname$inet6(r3, 0x0, &(0x7f00000000c0)=0xd6649a8adf18094e) 20:46:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 20:46:45 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0xffffff96) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000040)={0x1f, 0x0, 0x1009, 0x800, 0x5, {0x7, 0x10000}}) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@delrng={0x10, 0x14, 0x200, 0x70bd25, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x4) sendmmsg$alg(r3, &(0x7f0000008040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1, 0x0, 0x6}, 0x0) 20:46:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 20:46:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x29c8, 0x6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x8}, 0x8) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4068aea3, &(0x7f0000000080)={0x324f01d6b5419a2f, 0x0, [0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffffe]}) 20:46:45 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x0, 0x0, 0x68}}) 20:46:45 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 196.454708][T10881] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 20:46:45 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9}}) 20:46:45 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') getrandom(&(0x7f0000000240)=""/65, 0x41, 0x1) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xd4, r2, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x10}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffff}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4e}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x80}, 0x4001) 20:46:45 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0xc2604110, &(0x7f0000000000)) 20:46:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:45 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9}}) 20:46:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 20:46:45 executing program 5: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-avx\x00'}, 0x58) vmsplice(r1, &(0x7f0000000300)=[{&(0x7f0000000280)="a0", 0x1}], 0x1, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="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", 0xff}, {&(0x7f0000000200)="976fb28edaccb27880be63a84badf0aaffd295c08288dd3da99b2ffa4b42e00980da3696b47e17c3ac8f9334ee48e2c7f76eeaaac916c916438571e4cb09c993a67ee48c7795de5eca4bc26bcdbe9f198940bdbe8d56066dd24a40c976b6e2f2e0953f8bd7bb3883486aa3387cb676cfa634b8f64697d9bcbd21f8c59a49391b", 0x80}], 0x2, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 20:46:45 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)={0x4, 0x0, [{0x6000, 0xe0, &(0x7f0000000000)=""/224}, {0x6000, 0xa, &(0x7f0000000100)=""/10}, {0x4, 0x6c, &(0x7f0000000180)=""/108}, {0x4, 0x47, &(0x7f0000000280)=""/71}]}) sendfile(r0, r1, 0x0, 0x10000) 20:46:45 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0xc2604110, &(0x7f0000000000)) 20:46:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:46 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9}}) 20:46:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 20:46:46 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) modify_ldt$write2(0x11, &(0x7f0000000080)={0x10001, 0x0, 0x400, 0xfffffffffffffff8, 0x5, 0x2ebda593, 0x9d8f, 0x3, 0x5, 0x6}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) recvfrom$rxrpc(r1, &(0x7f00000001c0)=""/144, 0x90, 0x0, 0x0, 0x105) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0x7, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) 20:46:46 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0xc2604110, &(0x7f0000000000)) [ 197.032253][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 197.032267][ T26] audit: type=1800 audit(1565642806.096:31): pid=10923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16584 res=0 20:46:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) [ 197.156361][ T26] audit: type=1804 audit(1565642806.136:32): pid=10923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir825890377/syzkaller.Hp6UYY/28/file0" dev="sda1" ino=16584 res=1 20:46:46 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:46 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) 20:46:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 20:46:46 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 197.325936][T10941] FAULT_INJECTION: forcing a failure. [ 197.325936][T10941] name failslab, interval 1, probability 0, space 0, times 1 [ 197.507489][T10941] CPU: 1 PID: 10941 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 197.516726][T10941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.526801][T10941] Call Trace: [ 197.530116][T10941] dump_stack+0x172/0x1f0 [ 197.534464][T10941] should_fail.cold+0xa/0x15 [ 197.539082][T10941] ? fault_create_debugfs_attr+0x180/0x180 [ 197.544891][T10941] ? ___might_sleep+0x163/0x280 [ 197.549750][T10941] __should_failslab+0x121/0x190 [ 197.554727][T10941] should_failslab+0x9/0x14 [ 197.559237][T10941] __kmalloc+0x2e0/0x770 [ 197.563483][T10941] ? mark_held_locks+0xf0/0xf0 [ 197.568246][T10941] ? _parse_integer+0x190/0x190 [ 197.573099][T10941] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 197.578817][T10941] tomoyo_realpath_from_path+0xcd/0x7b0 [ 197.584391][T10941] ? tomoyo_path_number_perm+0x193/0x520 [ 197.590017][T10941] tomoyo_path_number_perm+0x1dd/0x520 [ 197.595462][T10941] ? tomoyo_path_number_perm+0x193/0x520 [ 197.601097][T10941] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 197.606895][T10941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.613131][T10941] ? __kasan_check_read+0x11/0x20 [ 197.618153][T10941] ? __fget+0x384/0x560 [ 197.622301][T10941] ? ksys_dup3+0x3e0/0x3e0 [ 197.626711][T10941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 197.632960][T10941] ? fput_many+0x12c/0x1a0 [ 197.637373][T10941] tomoyo_file_ioctl+0x23/0x30 [ 197.642134][T10941] security_file_ioctl+0x77/0xc0 [ 197.647073][T10941] ksys_ioctl+0x57/0xd0 [ 197.651231][T10941] __x64_sys_ioctl+0x73/0xb0 [ 197.655864][T10941] do_syscall_64+0xfa/0x760 [ 197.660371][T10941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.666280][T10941] RIP: 0033:0x459829 [ 197.670168][T10941] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.689774][T10941] RSP: 002b:00007f05b77aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 197.698191][T10941] RAX: ffffffffffffffda RBX: 00007f05b77aec90 RCX: 0000000000459829 [ 197.706151][T10941] RDX: 0000000020000040 RSI: 00000000000089f0 RDI: 0000000000000003 [ 197.714110][T10941] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.722081][T10941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05b77af6d4 [ 197.730053][T10941] R13: 00000000004c52f5 R14: 00000000004d97c0 R15: 0000000000000004 [ 197.869027][T10941] ERROR: Out of memory at tomoyo_realpath_from_path. 20:46:47 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)={0x4, 0x0, [{0x6000, 0xe0, &(0x7f0000000000)=""/224}, {0x6000, 0xa, &(0x7f0000000100)=""/10}, {0x4, 0x6c, &(0x7f0000000180)=""/108}, {0x4, 0x47, &(0x7f0000000280)=""/71}]}) sendfile(r0, r1, 0x0, 0x10000) 20:46:47 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:47 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000000000003, 0x3) r1 = dup(r0) socket$alg(0x26, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x12, 0x4, 0x0, 0x0) 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:47 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:47 executing program 3 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 197.972521][T10965] FAULT_INJECTION: forcing a failure. [ 197.972521][T10965] name failslab, interval 1, probability 0, space 0, times 0 [ 197.987985][T10968] FAULT_INJECTION: forcing a failure. [ 197.987985][T10968] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 198.001208][T10968] CPU: 1 PID: 10968 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 198.010400][T10968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.020455][T10968] Call Trace: [ 198.023768][T10968] dump_stack+0x172/0x1f0 [ 198.028117][T10968] should_fail.cold+0xa/0x15 [ 198.032753][T10968] ? fault_create_debugfs_attr+0x180/0x180 [ 198.038569][T10968] ? lock_downgrade+0x920/0x920 [ 198.043437][T10968] should_fail_alloc_page+0x50/0x60 [ 198.048650][T10968] __alloc_pages_nodemask+0x1a1/0x900 [ 198.054021][T10968] ? __alloc_pages_slowpath+0x2530/0x2530 [ 198.059761][T10968] ? kernel_text_address+0x73/0xf0 [ 198.064890][T10968] ? unwind_get_return_address+0x61/0xa0 [ 198.070529][T10968] ? profile_setup.cold+0xbb/0xbb [ 198.070547][T10968] ? fault_create_debugfs_attr+0x180/0x180 [ 198.070572][T10968] cache_grow_begin+0x90/0xd20 [ 198.086126][T10968] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 198.091863][T10968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.098103][T10968] __kmalloc+0x6b2/0x770 [ 198.102355][T10968] ? mark_held_locks+0xf0/0xf0 [ 198.107112][T10968] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 198.112819][T10968] tomoyo_realpath_from_path+0xcd/0x7b0 [ 198.118376][T10968] ? tomoyo_path_number_perm+0x193/0x520 [ 198.124001][T10968] tomoyo_path_number_perm+0x1dd/0x520 [ 198.129449][T10968] ? tomoyo_path_number_perm+0x193/0x520 [ 198.135070][T10968] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 198.140876][T10968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.147115][T10968] ? __kasan_check_read+0x11/0x20 [ 198.152140][T10968] ? __fget+0x384/0x560 [ 198.156288][T10968] ? ksys_dup3+0x3e0/0x3e0 [ 198.160733][T10968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 198.166981][T10968] ? fput_many+0x12c/0x1a0 [ 198.171394][T10968] tomoyo_file_ioctl+0x23/0x30 [ 198.176197][T10968] security_file_ioctl+0x77/0xc0 [ 198.181143][T10968] ksys_ioctl+0x57/0xd0 [ 198.185292][T10968] __x64_sys_ioctl+0x73/0xb0 [ 198.189875][T10968] do_syscall_64+0xfa/0x760 [ 198.194384][T10968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.200264][T10968] RIP: 0033:0x459829 [ 198.204174][T10968] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.223827][T10968] RSP: 002b:00007f05b77aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 198.232239][T10968] RAX: ffffffffffffffda RBX: 00007f05b77aec90 RCX: 0000000000459829 [ 198.240214][T10968] RDX: 0000000020000040 RSI: 00000000000089f0 RDI: 0000000000000003 [ 198.248175][T10968] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.256144][T10968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05b77af6d4 [ 198.264119][T10968] R13: 00000000004c52f5 R14: 00000000004d97c0 R15: 0000000000000004 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:47 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 198.273500][ T26] audit: type=1800 audit(1565642807.046:33): pid=10971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16604 res=0 [ 198.322482][ T26] audit: type=1804 audit(1565642807.046:34): pid=10971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir825890377/syzkaller.Hp6UYY/29/file0" dev="sda1" ino=16604 res=1 [ 198.352523][T10965] CPU: 1 PID: 10965 Comm: syz-executor.3 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 198.361728][T10965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.371788][T10965] Call Trace: [ 198.375084][T10965] dump_stack+0x172/0x1f0 [ 198.379418][T10965] should_fail.cold+0xa/0x15 [ 198.384007][T10965] ? fault_create_debugfs_attr+0x180/0x180 [ 198.384027][T10965] ? page_to_nid.part.0+0x20/0x20 [ 198.384049][T10965] ? ___might_sleep+0x163/0x280 [ 198.399703][T10965] __should_failslab+0x121/0x190 [ 198.404665][T10965] should_failslab+0x9/0x14 [ 198.409181][T10965] kmem_cache_alloc_trace+0x2d3/0x790 [ 198.414563][T10965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.420819][T10965] ? refcount_sub_and_test_checked+0x154/0x200 [ 198.426975][T10965] btf_new_fd+0x1e1/0x3150 [ 198.431387][T10965] ? __kasan_check_read+0x11/0x20 [ 198.431406][T10965] ? refcount_dec_and_test_checked+0x1b/0x20 [ 198.431421][T10965] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 198.431443][T10965] ? apparmor_capable+0x2ed/0x630 [ 198.453650][T10965] ? cap_capable+0x205/0x270 [ 198.458254][T10965] ? btf_type_seq_show+0x1b0/0x1b0 [ 198.463390][T10965] ? security_capable+0x95/0xc0 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:47 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) [ 198.468253][T10965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.474528][T10965] ? ns_capable_common+0x93/0x100 [ 198.479558][T10965] __do_sys_bpf+0x1096/0x3460 [ 198.484241][T10965] ? bpf_prog_load+0x1670/0x1670 [ 198.489195][T10965] ? __kasan_check_write+0x14/0x20 [ 198.494327][T10965] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 198.499899][T10965] ? wait_for_completion+0x440/0x440 [ 198.505203][T10965] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 198.511461][T10965] ? fput_many+0x12c/0x1a0 [ 198.515899][T10965] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 198.521990][T10965] __x64_sys_bpf+0x73/0xb0 [ 198.526454][T10965] do_syscall_64+0xfa/0x760 [ 198.530976][T10965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.536876][T10965] RIP: 0033:0x459829 [ 198.540775][T10965] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.558388][T10985] FAULT_INJECTION: forcing a failure. [ 198.558388][T10985] name failslab, interval 1, probability 0, space 0, times 0 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) [ 198.560379][T10965] RSP: 002b:00007f6e002d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.560393][T10965] RAX: ffffffffffffffda RBX: 00007f6e002d3c90 RCX: 0000000000459829 [ 198.560401][T10965] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 198.560409][T10965] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.560416][T10965] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6e002d46d4 [ 198.560424][T10965] R13: 00000000004bfa8f R14: 00000000004d16c0 R15: 0000000000000003 [ 198.637842][T10985] CPU: 1 PID: 10985 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 198.647046][T10985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.657093][T10985] Call Trace: [ 198.660403][T10985] dump_stack+0x172/0x1f0 [ 198.664783][T10985] should_fail.cold+0xa/0x15 [ 198.669381][T10985] ? fault_create_debugfs_attr+0x180/0x180 [ 198.675190][T10985] ? ___might_sleep+0x163/0x280 [ 198.680045][T10985] __should_failslab+0x121/0x190 [ 198.684994][T10985] should_failslab+0x9/0x14 [ 198.689506][T10985] __kmalloc+0x2e0/0x770 [ 198.694085][T10985] ? snprintf+0xbb/0xf0 [ 198.698235][T10985] ? vsprintf+0x40/0x40 [ 198.702392][T10985] ? tomoyo_encode2.part.0+0xf5/0x400 [ 198.707757][T10985] tomoyo_encode2.part.0+0xf5/0x400 [ 198.712937][T10985] tomoyo_encode+0x2b/0x50 [ 198.717331][T10985] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 198.724765][T10985] ? tomoyo_path_number_perm+0x193/0x520 [ 198.730382][T10985] tomoyo_path_number_perm+0x1dd/0x520 [ 198.735827][T10985] ? tomoyo_path_number_perm+0x193/0x520 [ 198.741436][T10985] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 198.747217][T10985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.753437][T10985] ? __kasan_check_read+0x11/0x20 [ 198.758452][T10985] ? __fget+0x384/0x560 [ 198.762612][T10985] ? ksys_dup3+0x3e0/0x3e0 [ 198.767002][T10985] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 198.773217][T10985] ? fput_many+0x12c/0x1a0 [ 198.777649][T10985] tomoyo_file_ioctl+0x23/0x30 [ 198.782395][T10985] security_file_ioctl+0x77/0xc0 [ 198.787313][T10985] ksys_ioctl+0x57/0xd0 [ 198.791446][T10985] __x64_sys_ioctl+0x73/0xb0 [ 198.796024][T10985] do_syscall_64+0xfa/0x760 [ 198.800517][T10985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.806417][T10985] RIP: 0033:0x459829 [ 198.810297][T10985] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.829897][T10985] RSP: 002b:00007f05b77aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 198.838303][T10985] RAX: ffffffffffffffda RBX: 00007f05b77aec90 RCX: 0000000000459829 [ 198.846247][T10985] RDX: 0000000020000040 RSI: 00000000000089f0 RDI: 0000000000000003 [ 198.854194][T10985] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.862142][T10985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05b77af6d4 [ 198.870106][T10985] R13: 00000000004c52f5 R14: 00000000004d97c0 R15: 0000000000000004 20:46:48 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:48 executing program 4 (fault-call:1 fault-nth:3): r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:48 executing program 5: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSACCEPT(r0, 0x89e3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040), 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80), 0x0, 0x0, 0x0) 20:46:48 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)={0x4, 0x0, [{0x6000, 0xe0, &(0x7f0000000000)=""/224}, {0x6000, 0xa, &(0x7f0000000100)=""/10}, {0x4, 0x6c, &(0x7f0000000180)=""/108}, {0x4, 0x47, &(0x7f0000000280)=""/71}]}) sendfile(r0, r1, 0x0, 0x10000) 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:48 executing program 3 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 198.911664][T10985] ERROR: Out of memory at tomoyo_realpath_from_path. [ 198.989524][T11002] FAULT_INJECTION: forcing a failure. [ 198.989524][T11002] name failslab, interval 1, probability 0, space 0, times 0 [ 199.012218][T11001] FAULT_INJECTION: forcing a failure. [ 199.012218][T11001] name failslab, interval 1, probability 0, space 0, times 0 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:48 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 199.049417][ T26] audit: type=1800 audit(1565642808.106:35): pid=11008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16604 res=0 20:46:48 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 199.127097][T11002] CPU: 0 PID: 11002 Comm: syz-executor.3 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 199.136331][T11002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.146392][T11002] Call Trace: [ 199.149700][T11002] dump_stack+0x172/0x1f0 [ 199.154041][T11002] should_fail.cold+0xa/0x15 [ 199.158646][T11002] ? fault_create_debugfs_attr+0x180/0x180 [ 199.164466][T11002] ? page_to_nid.part.0+0x20/0x20 [ 199.169495][T11002] ? ___might_sleep+0x163/0x280 [ 199.171135][ T26] audit: type=1804 audit(1565642808.156:36): pid=11008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir825890377/syzkaller.Hp6UYY/30/file0" dev="sda1" ino=16604 res=1 [ 199.174362][T11002] __should_failslab+0x121/0x190 [ 199.174381][T11002] should_failslab+0x9/0x14 [ 199.174394][T11002] kmem_cache_alloc_trace+0x2d3/0x790 [ 199.174413][T11002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.174429][T11002] btf_new_fd+0x430/0x3150 [ 199.174442][T11002] ? __kasan_check_read+0x11/0x20 [ 199.174466][T11002] ? refcount_dec_and_test_checked+0x1b/0x20 [ 199.224353][T11002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 199.235343][T11002] ? apparmor_capable+0x2ed/0x630 [ 199.235356][T11002] ? cap_capable+0x205/0x270 [ 199.235371][T11002] ? btf_type_seq_show+0x1b0/0x1b0 [ 199.235385][T11002] ? security_capable+0x95/0xc0 [ 199.235407][T11002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.267367][T11002] ? ns_capable_common+0x93/0x100 [ 199.272404][T11002] __do_sys_bpf+0x1096/0x3460 [ 199.277082][T11002] ? bpf_prog_load+0x1670/0x1670 [ 199.282024][T11002] ? __kasan_check_write+0x14/0x20 [ 199.287144][T11002] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 199.292697][T11002] ? wait_for_completion+0x440/0x440 [ 199.297993][T11002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 199.304245][T11002] ? fput_many+0x12c/0x1a0 [ 199.308674][T11002] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 199.314745][T11002] __x64_sys_bpf+0x73/0xb0 [ 199.319171][T11002] do_syscall_64+0xfa/0x760 20:46:48 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 199.323716][T11002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.329606][T11002] RIP: 0033:0x459829 [ 199.333507][T11002] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.353114][T11002] RSP: 002b:00007f6e002d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.361527][T11002] RAX: ffffffffffffffda RBX: 00007f6e002d3c90 RCX: 0000000000459829 [ 199.369502][T11002] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 20:46:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2000000001e) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) getsockopt$inet6_buf(r0, 0x29, 0xd3, 0x0, 0x0) [ 199.377479][T11002] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.385482][T11002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6e002d46d4 [ 199.393453][T11002] R13: 00000000004bfa8f R14: 00000000004d16c0 R15: 0000000000000003 [ 199.405586][T11001] CPU: 0 PID: 11001 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 199.414782][T11001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.424844][T11001] Call Trace: [ 199.428142][T11001] dump_stack+0x172/0x1f0 [ 199.432474][T11001] should_fail.cold+0xa/0x15 [ 199.437066][T11001] ? fault_create_debugfs_attr+0x180/0x180 [ 199.442883][T11001] ? page_to_nid.part.0+0x20/0x20 [ 199.447915][T11001] ? ___might_sleep+0x163/0x280 [ 199.452777][T11001] __should_failslab+0x121/0x190 [ 199.457720][T11001] should_failslab+0x9/0x14 [ 199.462219][T11001] kmem_cache_alloc_node+0x268/0x740 [ 199.467521][T11001] ? br_get_link_af_size_filtered+0x289/0xa00 [ 199.473594][T11001] __alloc_skb+0xd5/0x5e0 20:46:48 executing program 3 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 199.477931][T11001] ? netdev_alloc_frag+0x1b0/0x1b0 [ 199.483049][T11001] ? if_nlmsg_size+0x4ad/0x9f0 [ 199.487820][T11001] rtmsg_ifinfo_build_skb+0x74/0x190 [ 199.493113][T11001] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 199.498586][T11001] rtmsg_ifinfo+0x8d/0xa0 [ 199.502932][T11001] netdev_state_change+0x121/0x140 [ 199.508036][T11001] ? arch_local_irq_restore+0x60/0x60 [ 199.513401][T11001] ? br_set_hello_time+0xdc/0x110 [ 199.518427][T11001] ? __local_bh_enable_ip+0x15a/0x270 [ 199.523796][T11001] ? _raw_spin_unlock_bh+0x31/0x40 [ 199.528903][T11001] ? br_set_hello_time+0xe1/0x110 [ 199.533919][T11001] old_dev_ioctl.isra.0+0x953/0x15d0 [ 199.539204][T11001] ? tomoyo_file_ioctl+0x23/0x30 [ 199.544133][T11001] ? security_file_ioctl+0x77/0xc0 [ 199.549252][T11001] ? add_del_if+0x150/0x150 [ 199.553743][T11001] ? lock_acquire+0x190/0x410 [ 199.558402][T11001] ? rtnl_lock+0x17/0x20 [ 199.562642][T11001] ? __mutex_lock+0x45d/0x13c0 [ 199.567411][T11001] ? rtnl_lock+0x17/0x20 [ 199.571675][T11001] ? mutex_lock_io_nested+0x1260/0x1260 [ 199.577234][T11001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.583510][T11001] ? full_name_hash+0xc0/0x100 [ 199.588287][T11001] br_dev_ioctl+0x71/0x110 [ 199.592711][T11001] dev_ifsioc+0x743/0xa00 [ 199.597030][T11001] ? register_gifconf+0x70/0x70 [ 199.601876][T11001] dev_ioctl+0x280/0xc68 [ 199.606110][T11001] sock_ioctl+0x5d2/0x780 [ 199.610443][T11001] ? dlci_ioctl_set+0x40/0x40 [ 199.615142][T11001] ? dlci_ioctl_set+0x40/0x40 [ 199.619814][T11001] do_vfs_ioctl+0xdb6/0x13e0 [ 199.624395][T11001] ? ioctl_preallocate+0x210/0x210 [ 199.629517][T11001] ? __fget+0x384/0x560 [ 199.633666][T11001] ? ksys_dup3+0x3e0/0x3e0 [ 199.638081][T11001] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 199.644319][T11001] ? fput_many+0x12c/0x1a0 [ 199.648729][T11001] ? tomoyo_file_ioctl+0x23/0x30 [ 199.653657][T11001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.660076][T11001] ? security_file_ioctl+0x8d/0xc0 [ 199.665217][T11001] ksys_ioctl+0xab/0xd0 [ 199.669377][T11001] __x64_sys_ioctl+0x73/0xb0 [ 199.673962][T11001] do_syscall_64+0xfa/0x760 [ 199.678453][T11001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.684333][T11001] RIP: 0033:0x459829 [ 199.688226][T11001] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.707837][T11001] RSP: 002b:00007f05b77aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 199.716256][T11001] RAX: ffffffffffffffda RBX: 00007f05b77aec90 RCX: 0000000000459829 [ 199.724228][T11001] RDX: 0000000020000040 RSI: 00000000000089f0 RDI: 0000000000000003 [ 199.732204][T11001] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.740166][T11001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05b77af6d4 [ 199.748155][T11001] R13: 00000000004c52f5 R14: 00000000004d97c0 R15: 0000000000000004 [ 199.803339][T11030] FAULT_INJECTION: forcing a failure. [ 199.803339][T11030] name failslab, interval 1, probability 0, space 0, times 0 [ 199.862530][T11030] CPU: 0 PID: 11030 Comm: syz-executor.3 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 199.871761][T11030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.871768][T11030] Call Trace: [ 199.871812][T11030] dump_stack+0x172/0x1f0 [ 199.871853][T11030] should_fail.cold+0xa/0x15 [ 199.889518][T11030] ? kernel_text_address+0x73/0xf0 [ 199.899183][T11030] ? fault_create_debugfs_attr+0x180/0x180 [ 199.904992][T11030] ? page_to_nid.part.0+0x20/0x20 [ 199.910012][T11030] ? ___might_sleep+0x163/0x280 [ 199.914859][T11030] __should_failslab+0x121/0x190 [ 199.919794][T11030] should_failslab+0x9/0x14 [ 199.924291][T11030] kmem_cache_alloc_node_trace+0x274/0x750 [ 199.930091][T11030] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 199.935907][T11030] __kmalloc_node+0x3d/0x70 [ 199.940404][T11030] kvmalloc_node+0x68/0x100 [ 199.944913][T11030] btf_new_fd+0x47f/0x3150 [ 199.949321][T11030] ? __kasan_check_read+0x11/0x20 [ 199.954352][T11030] ? refcount_dec_and_test_checked+0x1b/0x20 [ 199.960328][T11030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 199.966574][T11030] ? apparmor_capable+0x2ed/0x630 [ 199.971604][T11030] ? cap_capable+0x205/0x270 [ 199.976186][T11030] ? btf_type_seq_show+0x1b0/0x1b0 [ 199.981294][T11030] ? security_capable+0x95/0xc0 [ 199.986141][T11030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.992369][T11030] ? ns_capable_common+0x93/0x100 [ 199.997385][T11030] __do_sys_bpf+0x1096/0x3460 [ 200.002085][T11030] ? bpf_prog_load+0x1670/0x1670 [ 200.007013][T11030] ? __kasan_check_write+0x14/0x20 [ 200.012122][T11030] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 200.017658][T11030] ? wait_for_completion+0x440/0x440 [ 200.022937][T11030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 200.029168][T11030] ? fput_many+0x12c/0x1a0 [ 200.033585][T11030] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 200.039652][T11030] __x64_sys_bpf+0x73/0xb0 [ 200.044062][T11030] do_syscall_64+0xfa/0x760 [ 200.048558][T11030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.054438][T11030] RIP: 0033:0x459829 [ 200.058326][T11030] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.077917][T11030] RSP: 002b:00007f6e002d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.086314][T11030] RAX: ffffffffffffffda RBX: 00007f6e002d3c90 RCX: 0000000000459829 [ 200.094278][T11030] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 200.102245][T11030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:46:49 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000180)) r1 = socket$caif_stream(0x25, 0x1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) rt_sigtimedwait(&(0x7f0000000080)={0x7}, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000040)={0x0, 0x0, 0x100, 0x1, {0x9, 0x4, 0x0, 0x80}}) recvmsg(r1, &(0x7f00000047c0)={0x0, 0x0, 0x0}, 0x100) 20:46:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r0) r2 = accept(r1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000100)={r3, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x64b2, 0x206f, 0x1000, 0xffffffffffffff7f, 0xe7200000000}, &(0x7f00000001c0)=0x98) 20:46:49 executing program 4 (fault-call:1 fault-nth:4): r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:49 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 200.110207][T11030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6e002d46d4 [ 200.118173][T11030] R13: 00000000004bfa8f R14: 00000000004d16c0 R15: 0000000000000003 20:46:49 executing program 3 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.216440][T11042] FAULT_INJECTION: forcing a failure. [ 200.216440][T11042] name failslab, interval 1, probability 0, space 0, times 0 [ 200.257422][T11042] CPU: 1 PID: 11042 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 200.266687][T11042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.276781][T11042] Call Trace: [ 200.280075][T11042] dump_stack+0x172/0x1f0 [ 200.284419][T11042] should_fail.cold+0xa/0x15 [ 200.289012][T11042] ? fault_create_debugfs_attr+0x180/0x180 [ 200.294824][T11042] ? page_to_nid.part.0+0x20/0x20 [ 200.299857][T11042] ? ___might_sleep+0x163/0x280 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.304713][T11042] __should_failslab+0x121/0x190 [ 200.309658][T11042] should_failslab+0x9/0x14 [ 200.314162][T11042] kmem_cache_alloc_node_trace+0x274/0x750 [ 200.319978][T11042] ? kasan_unpoison_shadow+0x35/0x50 [ 200.325281][T11042] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 200.331103][T11042] __kmalloc_node_track_caller+0x3d/0x70 [ 200.336747][T11042] __kmalloc_reserve.isra.0+0x40/0xf0 [ 200.342171][T11042] __alloc_skb+0x10b/0x5e0 [ 200.346599][T11042] ? netdev_alloc_frag+0x1b0/0x1b0 [ 200.351721][T11042] ? if_nlmsg_size+0x4ad/0x9f0 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.356493][T11042] rtmsg_ifinfo_build_skb+0x74/0x190 [ 200.361797][T11042] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 200.367252][T11042] rtmsg_ifinfo+0x8d/0xa0 [ 200.371587][T11042] netdev_state_change+0x121/0x140 [ 200.376711][T11042] ? arch_local_irq_restore+0x60/0x60 [ 200.382127][T11042] ? br_set_hello_time+0xdc/0x110 [ 200.387175][T11042] ? __local_bh_enable_ip+0x15a/0x270 [ 200.392578][T11042] ? _raw_spin_unlock_bh+0x31/0x40 [ 200.397692][T11042] ? br_set_hello_time+0xe1/0x110 [ 200.402715][T11042] old_dev_ioctl.isra.0+0x953/0x15d0 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.408016][T11042] ? tomoyo_file_ioctl+0x23/0x30 [ 200.412955][T11042] ? security_file_ioctl+0x77/0xc0 [ 200.418084][T11042] ? add_del_if+0x150/0x150 [ 200.422606][T11042] ? lock_acquire+0x190/0x410 [ 200.427286][T11042] ? rtnl_lock+0x17/0x20 [ 200.431536][T11042] ? __mutex_lock+0x45d/0x13c0 [ 200.436316][T11042] ? rtnl_lock+0x17/0x20 [ 200.440567][T11042] ? mutex_lock_io_nested+0x1260/0x1260 [ 200.446116][T11042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.452359][T11042] ? full_name_hash+0xc0/0x100 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.457129][T11042] br_dev_ioctl+0x71/0x110 [ 200.461545][T11042] dev_ifsioc+0x743/0xa00 [ 200.465907][T11042] ? register_gifconf+0x70/0x70 [ 200.470769][T11042] dev_ioctl+0x280/0xc68 [ 200.475026][T11042] sock_ioctl+0x5d2/0x780 [ 200.479371][T11042] ? dlci_ioctl_set+0x40/0x40 [ 200.484065][T11042] ? dlci_ioctl_set+0x40/0x40 [ 200.488752][T11042] do_vfs_ioctl+0xdb6/0x13e0 [ 200.493347][T11042] ? ioctl_preallocate+0x210/0x210 [ 200.498446][T11042] ? __fget+0x384/0x560 [ 200.502591][T11042] ? ksys_dup3+0x3e0/0x3e0 [ 200.507000][T11042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 200.513217][T11042] ? fput_many+0x12c/0x1a0 [ 200.517611][T11042] ? tomoyo_file_ioctl+0x23/0x30 [ 200.522557][T11042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.528800][T11042] ? security_file_ioctl+0x8d/0xc0 [ 200.533889][T11042] ksys_ioctl+0xab/0xd0 [ 200.538025][T11042] __x64_sys_ioctl+0x73/0xb0 [ 200.542615][T11042] do_syscall_64+0xfa/0x760 [ 200.547106][T11042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.552977][T11042] RIP: 0033:0x459829 [ 200.556851][T11042] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.576534][T11042] RSP: 002b:00007f05b77aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 200.584929][T11042] RAX: ffffffffffffffda RBX: 00007f05b77aec90 RCX: 0000000000459829 [ 200.592875][T11042] RDX: 0000000020000040 RSI: 00000000000089f0 RDI: 0000000000000003 [ 200.600824][T11042] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.608772][T11042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05b77af6d4 [ 200.616718][T11042] R13: 00000000004c52f5 R14: 00000000004d97c0 R15: 0000000000000004 20:46:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000140)={0x0, 0x7ffd, 0x200200000000109}, 0xc) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000080)) sendmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000001180), 0x0, &(0x7f0000002840)}}, {{&(0x7f0000001340)=@hci, 0x80, &(0x7f0000000140), 0x17b, &(0x7f0000000080)}}], 0x2, 0x0) 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:49 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, 0x0) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:49 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2004, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, &(0x7f0000000080), 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x4000) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) fchdir(r0) socket$inet6_sctp(0xa, 0x1, 0x84) 20:46:49 executing program 4 (fault-call:1 fault-nth:5): r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.797010][T11076] FAULT_INJECTION: forcing a failure. [ 200.797010][T11076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.810247][T11076] CPU: 1 PID: 11076 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 200.819432][T11076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.819445][T11076] Call Trace: [ 200.832799][T11076] dump_stack+0x172/0x1f0 [ 200.837148][T11076] should_fail.cold+0xa/0x15 20:46:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10002) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:46:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000100)) r1 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x80000000, 0x400004) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x98}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e22, 0x7, @rand_addr="417d8780d46570b4b0f177a038b82626", 0xeba8}}}, &(0x7f00000003c0)=0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0xfffffffffffffe8b, 0xfa00, {0x2, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000400), r3}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) sendto$netrom(r1, &(0x7f0000000540)="91ba99e228a804a20eeda373106962e249501e4071076612cd85dced593901bbc13de82371472b66fb82c599a56d45d54e920c5bf16d20412c54f09c05495afd15cbca3f033efb72380f0f77fb51ba360321dcf02f6b7d2edf8220d61477ef2e3eea78", 0x63, 0x4000000, &(0x7f00000005c0)={{0x3, @default}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) [ 200.841754][T11076] ? fault_create_debugfs_attr+0x180/0x180 [ 200.849210][T11076] ? save_stack+0x5c/0x90 [ 200.853540][T11076] ? save_stack+0x23/0x90 [ 200.857891][T11076] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 200.863700][T11076] ? kasan_slab_alloc+0xf/0x20 [ 200.868467][T11076] ? kmem_cache_alloc_node+0x138/0x740 [ 200.873939][T11076] ? __alloc_skb+0xd5/0x5e0 [ 200.878442][T11076] ? rtmsg_ifinfo_build_skb+0x74/0x190 [ 200.883905][T11076] should_fail_alloc_page+0x50/0x60 [ 200.883919][T11076] __alloc_pages_nodemask+0x1a1/0x900 20:46:50 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.883932][T11076] ? __x64_sys_ioctl+0x73/0xb0 [ 200.883954][T11076] ? do_syscall_64+0xfa/0x760 [ 200.903929][T11076] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.909998][T11076] ? __alloc_pages_slowpath+0x2530/0x2530 [ 200.915736][T11076] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 200.921383][T11076] ? __kasan_check_read+0x11/0x20 [ 200.926415][T11076] ? fault_create_debugfs_attr+0x180/0x180 [ 200.932228][T11076] cache_grow_begin+0x90/0xd20 [ 200.937007][T11076] ? __kmalloc_node_track_caller+0x3d/0x70 [ 200.942818][T11076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.949067][T11076] kmem_cache_alloc_node_trace+0x689/0x750 [ 200.954879][T11076] ? kasan_unpoison_shadow+0x35/0x50 [ 200.960172][T11076] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 200.965991][T11076] __kmalloc_node_track_caller+0x3d/0x70 [ 200.971634][T11076] __kmalloc_reserve.isra.0+0x40/0xf0 [ 200.977015][T11076] __alloc_skb+0x10b/0x5e0 [ 200.981435][T11076] ? netdev_alloc_frag+0x1b0/0x1b0 [ 200.986556][T11076] ? if_nlmsg_size+0x4ad/0x9f0 [ 200.991331][T11076] rtmsg_ifinfo_build_skb+0x74/0x190 [ 200.996632][T11076] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 201.002099][T11076] rtmsg_ifinfo+0x8d/0xa0 [ 201.006425][T11076] netdev_state_change+0x121/0x140 [ 201.011541][T11076] ? arch_local_irq_restore+0x60/0x60 [ 201.016915][T11076] ? br_set_hello_time+0xdc/0x110 [ 201.021931][T11076] ? __local_bh_enable_ip+0x15a/0x270 [ 201.027296][T11076] ? _raw_spin_unlock_bh+0x31/0x40 [ 201.032402][T11076] ? br_set_hello_time+0xe1/0x110 [ 201.037420][T11076] old_dev_ioctl.isra.0+0x953/0x15d0 [ 201.042697][T11076] ? tomoyo_file_ioctl+0x23/0x30 [ 201.047627][T11076] ? security_file_ioctl+0x77/0xc0 [ 201.052764][T11076] ? add_del_if+0x150/0x150 [ 201.057282][T11076] ? lock_acquire+0x190/0x410 [ 201.061950][T11076] ? rtnl_lock+0x17/0x20 [ 201.066212][T11076] ? __mutex_lock+0x45d/0x13c0 [ 201.070965][T11076] ? rtnl_lock+0x17/0x20 [ 201.075217][T11076] ? mutex_lock_io_nested+0x1260/0x1260 [ 201.080759][T11076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.087009][T11076] ? full_name_hash+0xc0/0x100 [ 201.091790][T11076] br_dev_ioctl+0x71/0x110 [ 201.096204][T11076] dev_ifsioc+0x743/0xa00 [ 201.100528][T11076] ? register_gifconf+0x70/0x70 [ 201.105374][T11076] dev_ioctl+0x280/0xc68 [ 201.109608][T11076] sock_ioctl+0x5d2/0x780 [ 201.113928][T11076] ? dlci_ioctl_set+0x40/0x40 [ 201.118616][T11076] ? dlci_ioctl_set+0x40/0x40 [ 201.123286][T11076] do_vfs_ioctl+0xdb6/0x13e0 [ 201.127870][T11076] ? ioctl_preallocate+0x210/0x210 [ 201.132973][T11076] ? __fget+0x384/0x560 [ 201.137132][T11076] ? ksys_dup3+0x3e0/0x3e0 [ 201.141557][T11076] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 201.147787][T11076] ? fput_many+0x12c/0x1a0 [ 201.152203][T11076] ? tomoyo_file_ioctl+0x23/0x30 [ 201.157145][T11076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.163378][T11076] ? security_file_ioctl+0x8d/0xc0 [ 201.168479][T11076] ksys_ioctl+0xab/0xd0 [ 201.172631][T11076] __x64_sys_ioctl+0x73/0xb0 [ 201.177221][T11076] do_syscall_64+0xfa/0x760 [ 201.181719][T11076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.187604][T11076] RIP: 0033:0x459829 [ 201.191490][T11076] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.211084][T11076] RSP: 002b:00007f05b77aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.219495][T11076] RAX: ffffffffffffffda RBX: 00007f05b77aec90 RCX: 0000000000459829 [ 201.227451][T11076] RDX: 0000000020000040 RSI: 00000000000089f0 RDI: 0000000000000003 [ 201.235407][T11076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:46:50 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {0x0}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, 0x0) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) [ 201.243381][T11076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05b77af6d4 [ 201.251355][T11076] R13: 00000000004c52f5 R14: 00000000004d97c0 R15: 0000000000000004 20:46:50 executing program 4 (fault-call:1 fault-nth:6): r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x80000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) 20:46:50 executing program 3: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:50 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {0x0}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, 0x0) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:50 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000140), 0x0, 0x2, &(0x7f0000000240)={&(0x7f0000000080)={'sha512-generic\x00'}}) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) 20:46:50 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:50 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:50 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {0x0}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:50 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x69) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000880)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@dev={0xfe, 0x80, [], 0x2b}, @in=@multicast1, 0x4e23, 0x4, 0x4e23, 0x7, 0xa, 0x80, 0x80, 0x3b, r1, r2}, {0x9, 0x3, 0x8001, 0x5, 0xffffffffffffffff, 0x784f, 0x10001, 0xfffffffffffffffb}, {0x4, 0xa83, 0x2, 0x9}, 0x8000, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in6=@empty, 0x4d3, 0x2b}, 0x2, @in6=@loopback, 0x3505, 0x1, 0x0, 0x6, 0x20, 0x2, 0x80000000}}, 0xe8) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x1) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r3, 0xc008551c, &(0x7f0000000080)=ANY=[@ANYBLOB="060000001c00000003000000ffff8000000100000003000000"]) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r3, 0x28, &(0x7f00000000c0)}, 0x10) 20:46:50 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x2, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:50 executing program 5: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x4040) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x201) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getegid() write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x2, {0x8301b694486c1063, {0x0, 0x7fffffff, 0x6}, 0x80, r2, r3, 0x7fffffff, 0x0, 0x200, 0x80000000, 0xffffffff00000001, 0xd341, 0x0, 0x1, 0x6, 0x4, 0x3, 0x100000000, 0xfffffffffffffffb, 0x4, 0x20000000000000}}, 0xa0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1/file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x2) 20:46:50 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:50 executing program 3: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:50 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4ffc6a4f5f35014b, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180)={0x9}, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'bond0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0300000065e9e94420f4a373495d07bb048b457bf579148ee97e0dee77fdb037f98413cd7fea12854c4af9f2c7af4c22cd31265b9cf2e73be676c750e448a7b933ac495317a9e45b2d528409cff728ab7340461b58568c61487c9d6379553ecc382277c1b12df67bf6b82b9a78f076f0b7f8e6ee050cd1ca2399577ace272eab27a0ceb1754709ca1309aedd5bb8e90d714bba3d74b09c186572d18e084d42e1a78735d2f35fa0338af0d2a15576d6070000000000000000000000000000000000000000fec6f973f5ebc5d4821739aea7a817f468e719bdb0db99ac84fa257bca4909cfb3f423b2"]}) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) 20:46:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x10, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:51 executing program 3: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:51 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:51 executing program 5: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x4040) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x201) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getegid() write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x2, {0x8301b694486c1063, {0x0, 0x7fffffff, 0x6}, 0x80, r2, r3, 0x7fffffff, 0x0, 0x200, 0x80000000, 0xffffffff00000001, 0xd341, 0x0, 0x1, 0x6, 0x4, 0x3, 0x100000000, 0xfffffffffffffffb, 0x4, 0x20000000000000}}, 0xa0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file1/file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x2) 20:46:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x18, 0x249e1e, 0x8000000001}, 0x2c) r2 = semget$private(0x0, 0x1, 0x2c5) semctl$IPC_INFO(r2, 0x0, 0x3, &(0x7f0000000080)=""/77) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa00, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000003c0), 0x0}, 0x18) 20:46:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4c01, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:51 executing program 3: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:51 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:51 executing program 5: socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x400000000000002e, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='reno\x00\xce\xbfE\x1dq\r\x93\x85^\xe5\x13\xf6>*<\xc2N\x87h\x82\xf2\xd9\xd6W]\x10\x17\x95ty\xf4\x1a\x12\xf1a\xc8\xeay\x18\f?\x02 =\xee\xde\xc3\x00\x00\x00\x00\x9c\xa20\xf2\x18\n\xa5\xb7u\xbd*\x8c\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1am\xdd\xa7s\xee\xac\xdfl\a\xfe\xe2\xc0\x85J\xbc\xad\xca.\xab\xed\xf7=\xbfV\x15\xd1\xc4\x00\x00\x00\x00\x00\x00\x00\x00\x05\xca\x13\x04\x06\xb39f6\xae\xb5\xd7\x96\xc5,\xe6\x12\xa3PxA\xce\x0e\xc4X\xe7\x9b\xb7\xf8\xd5\xb7n\xe86\x86\x00'/160, 0xa0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x7, &(0x7f00000000c0)={0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={r3}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 20:46:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/161, 0xa1}], 0x7) 20:46:51 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10040, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0xffffffff, 0xfbf}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003700000bfa300000000000007020000fff8ffffff79a4f0ff00000000b7060000000000012d640500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 20:46:51 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:51 executing program 3: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, 0x0, 0x0) 20:46:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:51 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400042, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x3ff, @local, 0x9}, 0x1c) 20:46:51 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:51 executing program 3: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5450, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:51 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, &(0x7f00000003c0), 0x8) r2 = semget(0x2, 0x4, 0x135) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000004c0)=""/74) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x2000, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000080)={@empty}, &(0x7f0000000100)=0x227) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000002c0)={0x26b7, {{0xa, 0x4e24, 0x4b, @ipv4={[], [], @dev}}}}, 0x88) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r5, r6, 0x0, 0x8000fffffffe) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./bus\x00', 0x0, 0x18}, 0x10) [ 202.780288][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 202.786603][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 202.818274][T11229] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 202.892339][ T26] audit: type=1804 audit(1565642811.956:37): pid=11232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir825890377/syzkaller.Hp6UYY/40/bus" dev="sda1" ino=16617 res=1 [ 202.947107][ T26] audit: type=1804 audit(1565642811.996:38): pid=11229 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir825890377/syzkaller.Hp6UYY/40/bus" dev="sda1" ino=16617 res=1 20:46:52 executing program 5: socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x400000000000002e, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='reno\x00\xce\xbfE\x1dq\r\x93\x85^\xe5\x13\xf6>*<\xc2N\x87h\x82\xf2\xd9\xd6W]\x10\x17\x95ty\xf4\x1a\x12\xf1a\xc8\xeay\x18\f?\x02 =\xee\xde\xc3\x00\x00\x00\x00\x9c\xa20\xf2\x18\n\xa5\xb7u\xbd*\x8c\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1am\xdd\xa7s\xee\xac\xdfl\a\xfe\xe2\xc0\x85J\xbc\xad\xca.\xab\xed\xf7=\xbfV\x15\xd1\xc4\x00\x00\x00\x00\x00\x00\x00\x00\x05\xca\x13\x04\x06\xb39f6\xae\xb5\xd7\x96\xc5,\xe6\x12\xa3PxA\xce\x0e\xc4X\xe7\x9b\xb7\xf8\xd5\xb7n\xe86\x86\x00'/160, 0xa0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x7, &(0x7f00000000c0)={0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={r3}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 20:46:52 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001940)=' \x00') 20:46:52 executing program 3: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:52 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:52 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5451, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, 0x0, 0x0) 20:46:52 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:52 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5452, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, 0x0, 0x0) 20:46:52 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0xd3, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) r3 = syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x0, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000400)=0x418000000000000, 0x4) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000000280)={0x78, 0x0, 0x8, {0x7, 0xb5, 0x0, {0x4, 0x7a0, 0x4, 0x33c92322, 0xfffffffffffffff8, 0x19b, 0x811, 0x7, 0x9, 0x5, 0xffff, r2, r4, 0x67cc, 0x7}}}, 0x78) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000300)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000340)={{0x2, 0x0, 0x80000000, 0xf31cd8f0607afca3, 0x4}, 0xee2f, 0x4078000000000000, 0x1ff}) 20:46:52 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 203.980305][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 203.986503][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 204.230332][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 204.236862][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 204.242689][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 204.248436][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 204.254288][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 204.260297][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:46:53 executing program 5: socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x400000000000002e, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='reno\x00\xce\xbfE\x1dq\r\x93\x85^\xe5\x13\xf6>*<\xc2N\x87h\x82\xf2\xd9\xd6W]\x10\x17\x95ty\xf4\x1a\x12\xf1a\xc8\xeay\x18\f?\x02 =\xee\xde\xc3\x00\x00\x00\x00\x9c\xa20\xf2\x18\n\xa5\xb7u\xbd*\x8c\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1am\xdd\xa7s\xee\xac\xdfl\a\xfe\xe2\xc0\x85J\xbc\xad\xca.\xab\xed\xf7=\xbfV\x15\xd1\xc4\x00\x00\x00\x00\x00\x00\x00\x00\x05\xca\x13\x04\x06\xb39f6\xae\xb5\xd7\x96\xc5,\xe6\x12\xa3PxA\xce\x0e\xc4X\xe7\x9b\xb7\xf8\xd5\xb7n\xe86\x86\x00'/160, 0xa0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x7, &(0x7f00000000c0)={0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={r3}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 20:46:53 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5460, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:53 executing program 3: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:53 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:53 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8000, 0x0) accept$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x1c) ioctl(r1, 0x1000008912, &(0x7f0000000440)="11dca50d5e0bcfe47bf070") getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@dev, @broadcast}, &(0x7f0000000040)=0x8) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 20:46:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/221, 0xdd}], 0x6) 20:46:53 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:53 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x6364, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:53 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}], 0x5) 20:46:53 executing program 3: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:53 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8910, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:54 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:54 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8911, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000200)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d77fa09967cb8c63e84236b1049c554e8f84d6125e478b1f5bf3090641f20b2d63393ee4520f0809bc3ee6e3b063a26a7a157ea4c447be536089d9b4c0a6e9568e04e01faf51dddcfc49a5", 0x4b}], 0x1, &(0x7f0000000280)=[{0x10, 0x111, 0x6}, {0x38, 0x10c, 0xbd4, "37625383b1f375ddc1445e0f8e532bc1e19f55c1ac074f3b6df53d120360e64525c51e5f"}], 0x48}, 0x40080) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="740000000000000000edffffff0000000000d6673ae1920983e39c6c65087ce1365333756f014ec01a3a382acefb033f81caf3a2462bb45a5b12b49df8b4d0fcb149f18faeef205c6d8ab0d5d5ce13483f14f240fa9847b059a2a90b080f913ec97dfa629ce3390ac0cfb4dc4b844c7969682ddb4cb05b05c9a57203752af0152d86561f0d4571d5dfa1f6de3025fd143953b18695f07c9dd99921089bfc17fece8922ab5dbdae8b5cfe44c8ca38548cabe80b34c96a9e23a263dfb7ad85d7fc0f2891c5d87b4795a5f1c82b1b2d", @ANYRES32=r3, @ANYBLOB="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"/514], 0x74}}, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000940)={"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"}) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:46:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/173, 0xad}], 0x5) 20:46:54 executing program 5: socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x400000000000002e, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='reno\x00\xce\xbfE\x1dq\r\x93\x85^\xe5\x13\xf6>*<\xc2N\x87h\x82\xf2\xd9\xd6W]\x10\x17\x95ty\xf4\x1a\x12\xf1a\xc8\xeay\x18\f?\x02 =\xee\xde\xc3\x00\x00\x00\x00\x9c\xa20\xf2\x18\n\xa5\xb7u\xbd*\x8c\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1am\xdd\xa7s\xee\xac\xdfl\a\xfe\xe2\xc0\x85J\xbc\xad\xca.\xab\xed\xf7=\xbfV\x15\xd1\xc4\x00\x00\x00\x00\x00\x00\x00\x00\x05\xca\x13\x04\x06\xb39f6\xae\xb5\xd7\x96\xc5,\xe6\x12\xa3PxA\xce\x0e\xc4X\xe7\x9b\xb7\xf8\xd5\xb7n\xe86\x86\x00'/160, 0xa0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x7, &(0x7f00000000c0)={0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={r3}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 20:46:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0xffffff1f, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:54 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:54 executing program 2: getpriority(0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x2400) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000040)={0x2, 0x1, [0xa1, 0x1c3e, 0x0, 0x5, 0x401, 0x4, 0x6b3, 0x4]}) 20:46:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/183, 0xb7}], 0x4) 20:46:54 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8913, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:54 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x3) 20:46:54 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0x3f80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000800)) chdir(0x0) ioperm(0x8, 0xfffffffffffffff7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000200)=@req={0x28, &(0x7f0000000180)={'gretap0\x00', @ifru_ivalue}}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x1, 0x0) fspick(r1, &(0x7f0000000280)='./file0\x00', 0x1) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 205.800299][T11369] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.808226][T11369] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.007169][T11376] FS-Cache: Duplicate cookie detected [ 206.012797][T11376] FS-Cache: O-cookie c=00000000a5b8120b [p=0000000053566b72 fl=222 nc=0 na=1] [ 206.021729][T11376] FS-Cache: O-cookie d=00000000d2cb9b22 n=000000000baeb1dc [ 206.028943][T11376] FS-Cache: O-key=[10] '02000200000002000000' [ 206.035105][T11376] FS-Cache: N-cookie c=00000000aced178b [p=0000000053566b72 fl=2 nc=0 na=1] [ 206.043825][T11376] FS-Cache: N-cookie d=00000000d2cb9b22 n=00000000a5ce6019 [ 206.051075][T11376] FS-Cache: N-key=[10] '02000200000002000000' 20:46:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000040), 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xe000000000, 0x400800) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x100000000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9284}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x2, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1ff}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x3) 20:46:55 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x891d, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2800, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1}) 20:46:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:55 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x4, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}], 0x2) 20:46:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x402300, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000080)={0x8}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f00000000c0)=0x40) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) set_mempolicy(0x1, &(0x7f0000000040)=0xfdfffffffffffffc, 0x9) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) 20:46:55 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3d, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100000000, 0x200) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x3) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}], 0x2) 20:46:55 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x891f, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:55 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x4000) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x200) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000100)='\x00', 0x0, r0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x11, 0x1}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xd0, &(0x7f0000000200)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x12}}, @in6={0xa, 0x4e24, 0x1000, @local, 0x5}, @in6={0xa, 0x4e23, 0x10001, @empty, 0xffff}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e20, 0x8, @ipv4={[], [], @loopback}, 0x3}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}, 0x100000001}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={r4, 0x8}, &(0x7f00000003c0)=0x8) pipe(&(0x7f0000000140)) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) 20:46:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8920, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1800, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 20:46:55 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}], 0x2) 20:46:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gi>\x86B\xd4p\x00') write$FUSE_LK(r0, 0x0, 0xfe36) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x2) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f00000000c0)=""/251, &(0x7f0000000000)=0xfb) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001540)={@rand_addr, 0x0}, &(0x7f0000001580)=0x14) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000001240)) sendmsg$inet(r1, &(0x7f0000001600)={&(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000200)="c9f1", 0x2}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)}, {&(0x7f0000001280)="dceddaef00916e8d396ac3d8f7147741f805d4df686a709989ac9ae2449c5b4c439842c48185", 0x26}, {&(0x7f00000012c0)="08dc13ec4be06986ef6a9dc0bff772d3ca7ce28abb4681fc5aafb0ef6644bbd9f5ab27cc9321ad2d3b15caaa5767eb9132275bee7549c0c24ed8032840ead58b5926db8f859967a3144e7d34dc8fdf54e2f0efafda16ad1ead3cd349d3b4ca5b88ba6163a06838fefa2759aa3d739cd19bd748c2c5361771d03aed999f2fbe7eb60775cc14d01d41b47fa6cd419298027298ec0235834f71de42577cd9dc4222ffae5cdd652c17017ce8b6b76a082ec530c31c714e90bbeb7f343406a8489354430bf2ba3712279237b73b8ddfbf7afa29ca7100e4e29b0601ff45e9d85363674df2e6fdb91f8e83123a737cc77a2b83aa9b397eff1220c7", 0xf8}, {&(0x7f00000013c0)="fb84e19011bcb5a8c0d3090161ae7b15d336521bcdfec44971418e930743dd938d4e58d0f41de5872e3d76027178cacafc93d5f055c1068056f69712894c31a549a7773be7e7545ee3d7c35a2b9b435ce851c5083e02d64016ca5d8a1775ed6a44475654c49bcdbb280621dd8530a8d85087f3f0a6ca7b1d1ea750c672181a346b8e157053ec806198d3083211d5e505861ae434da774c926cababc47ef1f67f29feba61f6154d45edb8099dc83d01fb3dabb6a2", 0xb4}, {&(0x7f0000001480)="ec09cf5119591d2b0f0178ea97c245f8cb0d6c27074d6e", 0x17}], 0x7, &(0x7f00000015c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x80000000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x38}, 0x1) 20:46:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1a00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8921, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:56 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {0x0}], 0x3) 20:46:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:56 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x400, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r1, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@x25={0x9, @null=' \x00'}, 0x258, &(0x7f0000000500)=[{&(0x7f0000000200)="12f57aa3e70f98457c3a4a5a30a8ade350072389714976db0ad830860f3fe1367896771e37a5c156747e06e829ee", 0x2e}], 0x1}}], 0x3ffffffffffff37, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000200)={0x100000001, 0x0, 0x9, 0x0, 0x19, 0x1, 0x7, 0x4, 0x3, 0x0, 0x4, 0x612}) syz_open_dev$loop(0x0, 0x80, 0x0) msgget$private(0x0, 0x19) msgget(0x0, 0x400) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, 0x0) msgctl$IPC_RMID(0x0, 0x0) r3 = syz_open_dev$mouse(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x0, @ipv4={[], [], @empty}}}}, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/151) fcntl$setpipe(r2, 0x407, 0x10000) prctl$PR_SET_KEEPCAPS(0x8, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000280)={&(0x7f0000000100), 0x10, &(0x7f00000001c0)={&(0x7f0000000140)={0x7, 0x80, 0x6, {0x77359400}, {0x77359400}, {0x3, 0x0, 0x4, 0x8}, 0x1, @can={{0x0, 0x1ff, 0x3, 0x4000000000000000}, 0x5, 0x3, 0x0, 0x0, "de979f16d42f5899"}}, 0x48}, 0x1, 0x0, 0x0, 0x424f386eeed0823c}, 0x4000000) 20:46:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:56 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {0x0}], 0x3) 20:46:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000140)=""/132, 0x84}, {0x0}], 0x3) 20:46:56 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:46:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8924, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlockall(0x2) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 20:46:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 20:46:56 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8927, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:46:57 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:46:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x18000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:57 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8929, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1a000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:57 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8930, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlockall(0x2) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {0x0}, {&(0x7f0000000200)=""/241, 0xf1}], 0x3) 20:46:57 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 20:46:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x40000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:57 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:58 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {0x0}, {&(0x7f0000000200)=""/241, 0xf1}], 0x3) 20:46:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xffff0000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x80, 0x600400) write$P9_RLOCK(r1, &(0x7f0000000200)={0x8, 0x35, 0x1, 0x2}, 0x8) listen(r0, 0x5) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) write$9p(r1, &(0x7f0000000240)="cb6e03d3983e2486b44077048c159f8c4453c53297d5189f65bf92bf04907458b5fc3f6155d71b8a0631fbfc2f4bd473778cda83f0dd50832f5c62886c6470253a15b8908c9bfe40120fab0826410735335dcb2df3f5d9c7c8e8b0a38e7c2b2a10964e9e64765416e58df08d6a879ddb3bcb4b045d757e7f0b873f5cf259843536305a86c9182049b455f0419087fa15fb7b25251e4ed13dddd11cbe75c15fd9d9fab931b52d36144c1592d7ea1257ce1f90ec54caf5", 0xb6) 20:46:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlockall(0x2) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 20:46:58 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x100000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/99, 0x63}, {0x0}, {&(0x7f0000000200)=""/241, 0xf1}], 0x3) 20:46:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8937, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:58 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x200000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:58 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:58 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8942, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:46:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x800000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:59 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000080)) pwritev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="f1ff51ff9c2b896c044186b56d83342b34"}], 0x33c, 0x0) 20:46:59 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:46:59 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8943, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1800000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:46:59 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0xc2604110, &(0x7f0000000000)) 20:46:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:46:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1a00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:46:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="4f9fce194660138c04797422afdc989af6f6e48b4f687786c2ad7da81ba3fea64e36aa27548b303e0fda1d1e7a46ffa348c6f93e46c81cfd642a8016b4b8dae0ab2db70faa0017fab5d160237bbcb1c12858a5725ac9f1590f7a1a40bfdf25bc52abb45bf4513921fd31134952d60ecac958d40168b5dccada2715bf00ec91736a6cb66eafec444f38f8c6533f70760ea087f61aa103732c69ed4f6269", 0x9d) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_targets\x00') r2 = socket$bt_hidp(0x1f, 0x3, 0x6) sendfile(r1, r2, 0x0, 0x50000000000443) 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:46:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000100)=""/198, &(0x7f0000000000)=0xc6) ioctl$int_in(0xffffffffffffffff, 0x2080080080045005, &(0x7f00000000c0)) 20:47:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4000000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:00 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:00 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0xc2604110, &(0x7f0000000000)) 20:47:00 executing program 5: mkdir(&(0x7f0000000080)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x5, 0x4) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) 20:47:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:00 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$peek(0x1, r0, &(0x7f0000000040)) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 20:47:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xffff000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:00 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x66, 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)="2f7b56f4d7bf93abce238c6c0767f8876287f38067ee5bf12f902e21c1a1f81389a98ec0c0bef4f12bf564eabcd20dc18fdcb5235079d1a11a0f8ab10acd06b4fb33670fd6f2876f1bf3c479b052a99978ced5964c1ce6f2d3d386123a5dea19df4609bf309abc581d50de2e8360f016c1d84469840a57f045e952f8f4589f01adb53799121b8adf40b0813f64f613fad647dc991c76e7de90e553cddf7257b53e5cb86b471af9e1ad7ab22d53aaa8ae2955cf89cffe9700b03d51b4ef42f1c9e1f69ac919f71b50b474730e7fe3cc0b744fb397a223c7447b619c4a1b8f5d9c840fa1f06af5fe0e2cf4", 0xea}, {&(0x7f00000001c0)="d3c7868dea6779b0a870511fe14d0d648e5f6898d4f591e5befdd497", 0x1c}, {&(0x7f0000000200)="4e4d31530a7930ace418501aa6e41f08912c864758a064c49c26641c50086a28daf357264a9df6a45298a90749f914f4d6119d03eb4937d4bc68c9b9ff38a8b0c768a8e405f1ca429d9064dc6115e1ff23c9eb188085b4bb61618d8bbc41525d47a1c2cc", 0x64}, {&(0x7f0000000280)="fd658116817ac8f4bfde92ccebaf", 0xe}, {&(0x7f00000002c0)="61ade9fb4fb723169abee93d514d8351e0722e17e3b925", 0x17}, {&(0x7f0000000300)="8fadf1cd2c68e885ee6da13e62fce98371fd037506dfc0d34b38f18898d1a799aa4cf6f04f0ecf981b9565dabe6868a81dd1750fadaa731a0e160685d497893c", 0x40}, {&(0x7f0000000340)="cdf526f26b142054f57cdd0afbb51aee30c4fce5bb2f1f0b5e08c6aff3e2924fe6bf69e166853a2c47f60d0d501fd3d2058b6340", 0x34}], 0x7, 0x0, 0x0, 0x800}], 0x1, 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385725, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000440)) 20:47:00 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:00 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8948, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:00 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0xc2604110, &(0x7f0000000000)) 20:47:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x301000) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) mount$fuse(0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 20:47:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xb, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:00 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) [ 211.407289][T11696] FAULT_INJECTION: forcing a failure. [ 211.407289][T11696] name failslab, interval 1, probability 0, space 0, times 0 [ 211.473229][T11696] CPU: 1 PID: 11696 Comm: syz-executor.0 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 211.482733][T11696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.492819][T11696] Call Trace: [ 211.496155][T11696] dump_stack+0x172/0x1f0 [ 211.500530][T11696] should_fail.cold+0xa/0x15 [ 211.505157][T11696] ? fault_create_debugfs_attr+0x180/0x180 [ 211.510988][T11696] ? page_to_nid.part.0+0x20/0x20 [ 211.516044][T11696] ? ___might_sleep+0x163/0x280 [ 211.520919][T11696] __should_failslab+0x121/0x190 [ 211.525890][T11696] should_failslab+0x9/0x14 [ 211.530426][T11696] kmem_cache_alloc_node_trace+0x274/0x750 [ 211.536258][T11696] ? is_bpf_text_address+0xd3/0x170 [ 211.541494][T11696] __kmalloc_node+0x3d/0x70 [ 211.546022][T11696] kvmalloc_node+0x68/0x100 [ 211.550547][T11696] ? seq_dentry+0x2d0/0x2d0 [ 211.550559][T11696] seq_read+0x817/0x1110 [ 211.550615][T11696] ? _copy_from_user+0x12c/0x1a0 [ 211.564308][T11696] ? seq_dentry+0x2d0/0x2d0 [ 211.564329][T11696] proc_reg_read+0x1fc/0x2c0 [ 211.573966][T11696] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 211.579533][T11696] ? rw_verify_area+0x126/0x360 [ 211.584589][T11696] do_iter_read+0x4a4/0x660 [ 211.589125][T11696] ? dup_iter+0x250/0x250 [ 211.593498][T11696] vfs_readv+0xf0/0x160 [ 211.597671][T11696] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 211.603785][T11696] ? ksys_dup3+0x3e0/0x3e0 [ 211.608251][T11696] ? finish_task_switch+0x119/0x720 [ 211.613604][T11696] ? mutex_lock_nested+0x16/0x20 [ 211.618581][T11696] do_readv+0x15b/0x330 [ 211.622780][T11696] ? vfs_readv+0x160/0x160 [ 211.627347][T11696] ? switch_fpu_return+0x1fa/0x4f0 [ 211.632604][T11696] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 211.638692][T11696] __x64_sys_readv+0x75/0xb0 [ 211.643308][T11696] do_syscall_64+0xfa/0x760 [ 211.647961][T11696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.653866][T11696] RIP: 0033:0x459829 20:47:00 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x185, @time={0x0, 0x989680}, 0x80000001, {0x800, 0x3}, 0x200, 0x2, 0x6}) 20:47:00 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) 20:47:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x44) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000240)) mkdir(&(0x7f0000000140)='./file0\x00', 0x100) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000080000002500000000000000950a000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe75}, 0x48) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000200)='./file0/file0\x00', r2}, 0x10) [ 211.657784][T11696] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.677414][T11696] RSP: 002b:00007fe61400fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 211.677429][T11696] RAX: ffffffffffffffda RBX: 00007fe61400fc90 RCX: 0000000000459829 [ 211.677436][T11696] RDX: 0000000000000002 RSI: 0000000020000740 RDI: 0000000000000004 [ 211.677441][T11696] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.677449][T11696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe6140106d4 20:47:00 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8949, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x57}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000440)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 211.677455][T11696] R13: 00000000004c6b54 R14: 00000000004dc028 R15: 0000000000000005 20:47:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xc, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:00 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:00 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) 20:47:00 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x10034b}, 0x4a) [ 211.873088][T11723] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 20:47:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x894a, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:01 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, 0x0) [ 212.071110][T11723] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 20:47:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x200) r1 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @tid=r1}, &(0x7f00000000c0)) socket$nl_generic(0x10, 0x3, 0x10) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x101200, 0x0) 20:47:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8970, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:01 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x43d, 0x490441) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x804) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x4001) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000200)={0xa20000, 0xfff, 0x4, [], &(0x7f00000001c0)={0x9909da, 0x9f, [], @p_u16=&(0x7f0000000180)=0x8}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1ac) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xc689) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x4c, 0x0, &(0x7f00000003c0)=[@transaction_sg={0x40046304, {0x0, 0x40046304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000042c0)={'vcan0\x00', 0x0}) getpeername$packet(r2, &(0x7f0000004300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000004380)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000004480)=0xe8) sendmmsg$inet(r2, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)="64a8ee0538a2420ed9a3c587133d075667ffe96c8af6676461bd3a8bd38ac22fef3ea5fe3a5a1b5aed4e3cb48a30958c8477d53afbf9eaa744435feca7569fe1b15a8d3082c5da115b34029485973f1ba0f433520a9bb890fea6317d8e95adfd835fe68752bb800323d817a1ce6d71aa44fc180afe8932f314de08ec2bb5791d4a283902784e978b47ebe368a4acdfc05fb4697c865cde62178e65328f33f41ba498fc362e4027820dcc0f36e7638f6cd09010771641bf6972293d95182748fefdfe0585cd1b7e833580fd5afee94ac5e9c18ca1bd3681db5249b22bca23e655e6c0a1d57990733f549c8188", 0xec}, {&(0x7f0000000480)="4b2a04c85345c7a75a2a1aa3ac6b3b397f8a4aefc1db55b146cecf764ba0694aecba840848bc6cd16a3c61ba9b279f2734810f35467e341381147a484c29ca53ec22db349497199396b3a1816822a232e864e4d3bbdbfd2a27da4332e1d50d72ef2e52ce924d2c822dce771e65a883d7f46716dbd720c6f52cd17584e42e208101594ac48439e3eecf072eb180cfb20de48eb5b5756441f1143d1f863ac2214e5325c6ee9d7bfd1e104d88133306fd807c11a3c19eb300d90acca05e1b4ec0cba487c9d3560a", 0xc6}, {&(0x7f0000000580)="e38c83e2e9a86b3938573db937dc3fb9b83ab003cfa7c37e6ad20f6b976af4c8283b28c0b64e4bfbb9606828acd5151eb8ec073d863b7b8862cddf1164e108da75cc1a7c6ec3a5e04cf47196f8a023ca11ea9c41b8d3ab04b71af118d3496ade4eacf0549ab0391e489745590d699f0ebe5f652d8f9af398ee9820e454394e83bca6e1e1c2552185afeabdba6aeef7a0aad38718e2dfec8945b574db85954e7509f26229f4e9fad7971c5706348f3a5c", 0xb0}, {&(0x7f0000000640)="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", 0xff}, {&(0x7f0000000740)="3fd6b45ba065137305f977bd8b2f26d1c9e35b4e2a97019ae10a40d132582a22c2dc734c7493e01872ebf17d9eab05dee44da4762f20cbad9a76c4798a7ee13c035131527c45449de583ddf163b4c51ca33a81364d1c16932e98624d35e14b0d33fd1899c7f38a0a005a52b93a7bfd045d3ee165eac6c57d337e0d741efbe9fd069cead496414f85d93f43c4c73faacaee13", 0x92}], 0x5, &(0x7f0000000880)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1ff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x30}}, {{&(0x7f00000008c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000940)=[{&(0x7f0000000900)="a4641871c2d0a4514f5b2d7f3d7b1228372a291af5", 0x15}], 0x1, &(0x7f0000000980)=[@ip_retopts={{0xc0, 0x0, 0x7, {[@cipso={0x86, 0x20, 0xa000000000000000, [{0x1, 0x6, "116accfe"}, {0x0, 0x8, "7da3ee6e39ba"}, {0x0, 0xc, "fb0e36a2a5dc5a0c578f"}]}, @cipso={0x86, 0x2e, 0x6, [{0x6, 0xa, "2ac935d4d8b3cc5e"}, {0x0, 0x2}, {0x7, 0xd, "bec0c462d2f36f0eeb3ae8"}, {0x0, 0xd, "8044488c5d0a2ffdce0f12"}, {0x0, 0x2}]}, @ssrr={0x89, 0x23, 0x8000000000, [@rand_addr=0xff, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x3, @multicast2, @empty, @empty, @multicast1, @local]}, @ra={0x94, 0x6, 0x1}, @end, @lsrr={0x83, 0x1f, 0x6, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @remote, @local, @empty]}, @ssrr={0x89, 0x17, 0x7, [@remote, @rand_addr=0x100000000, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @rand_addr=0x2ca6]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0xa4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x47a0}}], 0x108}}, {{&(0x7f0000000ac0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000dc0)=[{&(0x7f0000000b00)="203b26e14f9be3662065ce017e547a544d3490525f37837010d05b1bfdf71f8cc1ed1fb1ab45f25edf944a73713b9a9b4aa4da4bac83e7eeac3cd0a88d0bf93999a723d33085819b653a7377d12513bd2aee3ff484a48802c2056c2862520a35b19dba61610982b3b48b840314089ca42190d2049b0cb10f1731cde345f70baa434240c7d0393bdd3d1954fff4df46b3a1ea3689b3bdf77f", 0x98}, {&(0x7f0000000bc0)="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", 0xff}, {&(0x7f0000000cc0)="cc921312c036d782273a0a938627229a5fd82a822b46a06754f6372f6fe609c8e2f8f45aa42ffbe2a891ef5760ff5ecdcf87207e41414fd40c8146e00ae2bf159c2cbe69877f034b5ce57ccc7fe3347c9e1c72915837ff866bfb91af164fd00b337065c2a44608b012a36da36b899977eb31c5031f23b6f3b708cef564eb60730a2d7e177fa8dcc3c845b50f2af60bf54c180378edd4c9400feba4164e16866040d367e8ceeb112f2d533cef626809f191a3e1e0406ca073b95f1b6c69f305f504758861dfb872d0dfcecf10845c944effe3b1d1", 0xd4}], 0x3, &(0x7f0000000e00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_retopts={{0x48, 0x0, 0x7, {[@rr={0x7, 0x13, 0x2, [@remote, @multicast2, @multicast2, @remote]}, @noop, @cipso={0x86, 0x1c, 0x7, [{0x5, 0x10, "5b94bb1aca306cb757b2ed2d048b"}, {0x2, 0x6, "b4afe88a"}]}, @ra={0x94, 0x6, 0x3}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_retopts={{0x94, 0x0, 0x7, {[@generic={0x44, 0x10, "aac2b373fb12658619852da9cb07"}, @ssrr={0x89, 0x17, 0x10, [@rand_addr=0x100000000, @empty, @remote, @broadcast, @dev={0xac, 0x14, 0x14, 0xb}]}, @ssrr={0x89, 0xb, 0x4, [@multicast1, @broadcast]}, @end, @cipso={0x86, 0x1a, 0x20000, [{0x6, 0x2}, {0x6, 0x3, "88"}, {0x7, 0xf, "a6fd82ca3bccfce1ad68e98ad6"}]}, @rr={0x7, 0x17, 0x2e, [@dev={0xac, 0x14, 0x14, 0x29}, @multicast2, @empty, @multicast2, @multicast2]}, @end, @lsrr={0x83, 0x1f, 0x8, [@rand_addr=0x5, @rand_addr=0x579f7d07, @loopback, @rand_addr=0xe30, @multicast2, @loopback, @empty]}]}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0x0, [@rand_addr=0x140b, @loopback, @dev={0xac, 0x14, 0x14, 0xf}, @multicast1, @rand_addr=0x1, @multicast2]}]}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@noop, @end, @end, @lsrr={0x83, 0x27, 0x100000, [@multicast2, @multicast1, @empty, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @multicast1, @multicast2, @multicast2]}, @end, @noop, @noop, @lsrr={0x83, 0xb, 0x80, [@dev={0xac, 0x14, 0x14, 0xb}, @empty]}, @ra={0x94, 0x6, 0xfc4}]}}}, @ip_retopts={{0xbc, 0x0, 0x7, {[@ssrr={0x89, 0x3, 0x2}, @noop, @timestamp={0x44, 0xc, 0x0, 0x1, 0x6, [{[@local], 0x7}]}, @generic={0x83, 0x2}, @ssrr={0x89, 0x2b, 0x248, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @loopback, @remote, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @local]}, @noop, @cipso={0x86, 0x1a, 0x9, [{0x6, 0x11, "19f5b00b6513770f94f840b0a02d66"}, {0x1, 0x3, "ce"}]}, @cipso={0x86, 0x41, 0x3f, [{0x5, 0x11, "689edc98dcb1eeba03522f7492e7d3"}, {0x600de00bc47058e1, 0x5, "e48c9a"}, {0x1, 0x3, "e7"}, {0x7, 0xa, "cb21dedd17693d7a"}, {0x1, 0x8, "110a37aa48e2"}, {0x7, 0x7, "5147ad047d"}, {0x0, 0x9, "60a457a7ab9f29"}]}, @ra={0x94, 0x6, 0x1}, @generic={0x86, 0xd, "886e30b920d372207a397a"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x298}}, {{&(0x7f00000010c0)={0x2, 0x4e23, @rand_addr=0x8}, 0x10, &(0x7f0000002340)=[{&(0x7f0000001100)="a726181d21f44fe648f4093b0952f1f1bab06227c45656c445971ffd8535e798d48f79fdb1401b43fd69866f947e0063266b89faa0a07d85d34db75e127e5f34287a23796c9531523a50b4e395f74206f86ec72eed71b3449af29e85f75b70e87c63a079add6802eb30d04fe5bce19877222f97e5a35cdd732b6cc51069fd411eab128128d4f392c0142cc7f16e39da8b3363802bc64a3626234d4c387afeb4f90d3719b44a94e4d42781af7c536ed61eab19273b402d535cfe3f994e96895", 0xbf}, {&(0x7f00000011c0)="a60eece513316ccec92d30a214175c6f0017dfa39e71c83bc8f7c7cffeb166f882e617da9ff8494583082b0d07fcb3dc3ad15b1148333483eb3f44417cf41bae7a29937e5ff87915c0bb1ab1b31b328e9b2dc7b566ebc25ae6a5b03d8c0c8f781ecb72e3ac8585057c76df28cf5aca21a3caaacfdb8360a73d279e204a1753ee49c61abf81f042a187b27fde208f49d013b6e99a6a557ca68af651291da36a3c814c5605e58cedbeead660b44e3c6c79951c413ae3b0bf8f3dee5ea88a8bb820", 0xc0}, {&(0x7f0000001280)="848bc994cf6db7f421fd1ec8acc60b56b285fe", 0x13}, {&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000022c0)="6696d809f3ba38741c8e81a11e181970bfe85ded911578050afed73c597e887da8786c32364eba1b9211ddb5dc846b5de450d59008bdbf70daf7a879b76a30c4e393e52d0bc3f2478c8687734120fb51897d4717e246e8e834d0c2374284d94361856e4b1717957bf5d05f0c2e1138b211be6d68c25762f0541983", 0x7b}], 0x5, &(0x7f00000023c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x483}}], 0x18}}, {{&(0x7f0000002400)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002880)=[{&(0x7f0000002440)="6e2d3b470826afc609911b52bdfdb9c354f5ddce3afda238ebd353ef706db71c43dae2800eac49cd5306701341e06efeffef2898675efa05b32a229e6591c0c9e766ad492d2603b542b00b2467e497d9df22c1974647b832b32628663ee2e793812f1a9deb946a578e4d155b57a2eb9057154886d7d43e42a15988fa320c216a3fcde9c300cfc989e013dfb751ffd1876a1f069903a3396585d2bf36d02e84b113ae8c03ae169781192b599588e5a9287942eae61edd6048a7c1691e310338b2afdd2f863c67e01bc92738ade1e9744d9207819504aaab415c", 0xd9}, {&(0x7f0000002540)="3bf00b35da76a605a369b681fd7f9540eb61269cfea16929d44edf65407e1c5f440c13ba7dabbfa442c09f3523f2bd9a3cb428b8ae61a34fd04c0a2f2febd461afc2c734f9490eeecc766083ee1d4087b32280d97df8412ba0f049be6dca2ebbb021c91993aa3206a4cce83ea805d3376b80490d6b1933d49b8c6c91e62b29396b45bfed370639601ff06fe797a993c843a4f5931e50dc39b54a53e082bab686a68c790224ede6124c494a6a56ee", 0xae}, {&(0x7f0000002600)="95bca29ce63dcd26ce8ff854f044c3c5f9439fe1b03958c635709a064a09db8ff7f1e15e8eab79de3a19143e3548cf43531f09bfa076e6f123e762c30d58412824be7127cc6cb0275b80f9", 0x4b}, {&(0x7f0000002680)="959b72ffed529d0558d15e2934be05", 0xf}, {&(0x7f00000026c0)="723ec6506c8783ba80ed22dfe1cf6ad1f31ee60dd89911a28cb8102a2312018c4fcf05020932461784e19a87ac7005b11efa10a1e231658613d1e372907042adc7da5cb0ee196efbfb87983500dbaeef7579e2c9d212c4a52056f4de55904c26e99246e6b45e19fd87dbfb71bdb15e7a9c59b83ba7603cfb4a537523027ee637250813e314d5745dc1295bbbea980336fbc0386d00d0ebe6fe17a7e7f2cdf867158b78f24d854d71464ffd95788d88f60b5ea3094a306bf42a84d1a86014aca85cd222c2a3487f9f7f6823c02fb148bd778b7210792c970d4991a76254909f712e", 0xe1}, {&(0x7f00000027c0)="07264dba306588bb4c088b4e498efe3e108f6c80f0e4610d6b4060946cf9", 0x1e}, {&(0x7f0000002800)="3608fc0bc4af077d3c331d66235275dc70369a5201074d3977584f7a1c9828f7beb7ee02d460d193424305c5027fe332906eaef79faac2bf5951ef266c8d182377361032542ecef43fac32b8fcb4d356f4bdd8b27d8418ca40", 0x59}], 0x7, &(0x7f0000002900)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@noop, @rr={0x7, 0x1b, 0x2, [@multicast2, @broadcast, @local, @empty, @dev={0xac, 0x14, 0x14, 0x18}, @multicast1]}]}}}], 0x60}}, {{&(0x7f0000002980)={0x2, 0x4e22, @local}, 0x10, &(0x7f00000029c0), 0x0, &(0x7f0000002a00)=[@ip_retopts={{0x9c, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x1f, [@remote, @loopback]}, @ssrr={0x89, 0xb, 0x3, [@empty, @broadcast]}, @cipso={0x86, 0x9, 0x3ff, [{0x7, 0x3, '$'}]}, @ra={0x94, 0x6, 0x6}, @ssrr={0x89, 0xf, 0x5, [@loopback, @multicast1, @dev={0xac, 0x14, 0x14, 0x12}]}, @lsrr={0x83, 0x2b, 0xa, [@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @loopback, @local, @local, @loopback, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @remote]}, @timestamp={0x44, 0x14, 0x401, 0x3, 0x821, [{[], 0x68d}, {[@multicast1], 0x100000000000000}, {[], 0x1}]}, @ssrr={0x89, 0x17, 0x3, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x5, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x1be]}, @end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfffffffffffffffb}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}], 0xd0}}, {{&(0x7f0000002b00)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000003f00)=[{&(0x7f0000002b40)="31e3211e717f4d215bdaaf3dc5d45d66e73511ba2efb1f501e449e73cb95afba86fc4124283fa71923ec7024ba3744ab5e3409", 0x33}, {&(0x7f0000002b80)="f7ea4c437d455aeaed12d23a11f6835b0af17660fe9d71567b1754ab61c29f999e104473d19132249cdb0262d467ab7615d3813d51b1f555f7b5b4c72a9562f854711d791a154bd7df6c7cb8d1a5f97b2d1efe6f61299a6a22e965572ef0aceb78aa94d89ae0f90811062f11424cb7632355e8528bb9e60230350566a85f7fadf57514e7d2e1bfe1919a66fdd7632cfbce7d62c5517da69065faab591643b68158fc0cb86398015ac995cd357ae990e4a2e25f", 0xb3}, {&(0x7f0000002c40)="415e21e576b623b4f6c2753adabc63a8ae8ffe967232e961bc581f186125775358e86e907064008742c3f42a929174013fcd2296dd40848cd7c723170fd533a0472c6742fdc9010727a723d9a9929a67c464f90405af242f799acc1a618253af9a88b8e1527e6ccaf2382f61e53438b01af66e45581bba77d4171ed10c2b865616c9989790d6bb0e0cbb68ba2c2217ee6ef443260da2dacdea691232684f022090cd38d7d0aa61cf00fcd81f21a05a1f6eb1e21f5bb17de5c4ea1c27d604b4ca9e7e7927b5ad2b727bd68748a8126ce53fdf0599e5fe6fe8784a6a3294dfdf339d", 0xe1}, {&(0x7f0000002d40)="34e6ee3ead3624ca81ca3660e4a55db9f2a045c94e604446afee99c5c215bce3700461651a9848a8fcd2839c7cfdd6ff97cad62da021a6f11891f77291e7e14fc5798cc26e977366ca5e64e4f823e27fe93c900fcfc4a41580e1012768800ab89f97ec", 0x63}, {&(0x7f0000002dc0)="ffc2f5c0b00906e09a92176831c53e51f372bc615bc958ef97cb58fa73124238c5e995aa178d16adbce9c5739dde49405a8a3c9471fe84785c567a69d6e973f4683c15aa9e52ebc6831e93d2fbe44db4d48ca79c47d126b3a0a25b16b0e881e1535e75e5945c0a7de00a11e1a0e42b0bed4e7f1f3dcb75e9c937cabd731c7f62fa609ba796e6ee3b597b8a8915d7e990a90885fac4623a3695ba600f93d1e1cdbc88abaef52b0a7c965a1c058ce8b9da5423", 0xb2}, {&(0x7f0000002e80)="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", 0x1000}, {&(0x7f0000003e80)="8b86ea7a33ed3ce900c5a1834f90a6936b384af469ead550261da1cad8b05090f854d362f3bafd805e0a179988cbe426746cdee1724020de5dcc990df6c46c6eb1608161319a", 0x46}], 0x7, &(0x7f0000003f80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x18}}, {{&(0x7f0000003fc0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000004280)=[{&(0x7f0000004000)="ed", 0x1}, {&(0x7f0000004040)="bb662491aaca2bec74a40f24f6f4ca94f13156366f918d12f7880ae0bcf02008cd0130a75f6fe91b95c51a0849fbe56c9cc836fb8973f09d4e894d73047706c7da56e205ba4d3a3ebdccf674216406c3c77ea44cbf24e01f77a502d1bc057984f89e5a9e77d3b5b95871ecb229ad970a1084a0c5e2c41502c609233d29f7662996f02464e6a21194e976402ad6bd5a95e5223887fe13e6955fa7565baecafb1149882e694b3619caa8563a12f6d404705a70a9c5e55b9c8b0166994107b0ad5d388eb1208d512f6a581f46a113bbbdbeef48f8d0", 0xd4}, {&(0x7f0000004140)="044458a54a92016d9c81a96f5969bb8d163475deb109e605982ae69be342aad4a1b4b4ab6f8bc66f2e8335c6bb93c7da322b7486a1dde36208f8c6df8e5743b3c9c4d7e877c2ac6dff19dd073d2b6acadf59f09cefad5db19e4d82b3f1da185fbd3ba7a9001b376c7d1621ba3701e147fb0e9e969747c100b6283e8b439aacfc8ddf06ba6ae9a3cd28fb18bc8388345d94331767e65f01f348669d8d13e4da0a191a8d6fc429d64241ae8a56caf6cec7f964758ca6de26bf212938f6f1875f046f5d7c4b59f83d25f411fd1e", 0xcc}, {&(0x7f0000004240)="9258217714969ed50449821089d59b0144dfe7c1a1", 0x15}], 0x4, &(0x7f00000044c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x10001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @multicast2}}}, @ip_retopts={{0xd8, 0x0, 0x7, {[@timestamp={0x44, 0x14, 0x8000, 0x3, 0x8, [{[], 0x9403}, {[], 0x200}, {[@local], 0x7692}]}, @cipso={0x86, 0x4f, 0x2, [{0x7, 0x8, "4be08c1d271b"}, {0x1, 0xf, "085e5ebe32007e1d1dce5774d1"}, {0x5, 0x8, "d945f8a8ad6d"}, {0x0, 0xb, "a0834b3595bb1c4dd0"}, {0x1, 0x7, "ef2bb15eb4"}, {0x5, 0x5, "141547"}, {0x5, 0x7, "7f09c04a96"}, {0x5, 0xc, "df3596b9bf0f42de09e4"}]}, @timestamp={0x44, 0x18, 0x1, 0x0, 0xf71c, [{[@broadcast], 0x5}, {[@dev={0xac, 0x14, 0x14, 0x14}], 0xffffffff}, {[], 0x4}]}, @timestamp={0x44, 0x38, 0x1, 0x3, 0x4, [{[@empty], 0x1}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x5}, {[@multicast2]}, {[], 0x1}, {[@loopback], 0x80}, {[], 0x8}, {[], 0xffffffffffffff01}, {[@multicast1], 0x6}]}, @ssrr={0x89, 0x7, 0x10001, [@multicast2]}, @noop, @rr={0x7, 0xb, 0x422, [@dev={0xac, 0x14, 0x14, 0x20}, @remote]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @loopback}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x84, 0x0, 0x7, {[@cipso={0x86, 0xe, 0x641d, [{0x2, 0x8, "5fc7a3f82985"}]}, @noop, @cipso={0x86, 0x16, 0x1, [{0x0, 0x10, "3a4a8e7f777e67ad3d8e81fbdb27"}]}, @timestamp={0x44, 0x14, 0x8, 0x8204435e70739f54, 0x300000000, [{[@broadcast], 0x5}, {[@remote], 0xffffffffffff0001}]}, @timestamp={0x44, 0x20, 0x80000000, 0x3, 0x400, [{[@local], 0x1000}, {[@remote], 0x9}, {[], 0x9}, {[@dev={0xac, 0x14, 0x14, 0x24}]}]}, @ra={0x94, 0x6, 0xbb}, @lsrr={0x83, 0x7, 0x56e, [@empty]}, @generic={0x7, 0xd, "5e17a9df28d7ce540d14e5"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x401}}], 0x208}}, {{&(0x7f0000004700)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000004900)=[{&(0x7f0000004740)="2b34120af7e8e237866d221f49a2836b9add0e6325ed73d30126c8c30d7c01c3e27d842266dcdc3dcc3bf9b8c40f36b34a8a9a7a099111e975dd6ad2f6d9e2c20862a660ff268cf0b8e8dcd60c0fd8def9cdc360a77ad6d9969264fa535c530946ed732ea2", 0x65}, {&(0x7f00000047c0)="2eca6b2794e7809c4a9b5a70fb1a89364db255a9549ee3a87a02d8e9dd", 0x1d}, {&(0x7f0000004800)="aaeae70525771894deb988aa02cd43e1f1fac28b043fbb1ed5601a57757ab4fae658ab8dfdca718501ad32508fe09fdc50559c9465e7d9b863a8385c9ef5ac806cf4a81c8e494a804e535b4de85a8233a61989e128db50ab57de627361d0544a0bc07958ade42167fb2ebf66be3a6a8fc5ce99565b9c8b71d61c1db4c0263029a1f9051d5957f7ee1b7512e28b2cf2e05bd03ebe37a39e6b4849dfb7b5e08ac3a774f1c9e0779b8a22c37c1136164c58cf64c42c9165b4ad36c2b303f9f91d5eefd7f74f5a4b07f8297044fceb1536e57c395c7b10f5992c17c1f06df493ba5b4ed441d3f75824b4c46aa6a69871aaf5dc", 0xf1}], 0x3, &(0x7f0000004940)=[@ip_ttl={{0x14, 0x0, 0x2, 0xfffffffffffffffb}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xbd}}, @ip_retopts={{0x18, 0x0, 0x7, {[@noop, @ra={0x94, 0x6, 0xfffffffffffffffd}]}}}], 0x60}}], 0x9, 0x40) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000140)=0x3) 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x76}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x32, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:01 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, 0x0) 20:47:01 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3400000000000500"], 0xe) sendfile(r0, r0, &(0x7f0000000080)=0x200000000, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) [ 212.388352][T11765] debugfs: File '11759' in directory 'proc' already present! [ 212.426494][T11765] binder: 11759:11765 unknown command 0 20:47:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8971, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 212.449120][T11765] binder: 11759:11765 ioctl c0306201 20000440 returned -22 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0xf4}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:01 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, 0x0) 20:47:01 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x8000, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x8ed5f1256ed037b1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xf41e2526801da86c, 0x0, 0xfffffffffffffeb8) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0xd83eb08a43e6add6) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x40) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x2, 0x0) bind$inet(r3, 0x0, 0x394) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000040)={0x5, 0x8, 0x5eb0000000000000}) connect$bt_rfcomm(r3, &(0x7f0000000080)={0x1f, {0x5, 0x2, 0x1, 0x0, 0x0, 0x3}, 0x1}, 0xa) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000340)='\x00\x00\x00\x00\x00\viF2\b\x00\x00\x00') clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'veth0_to_bridge\x00', 0x2}) rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f00000004c0)) io_setup(0x1, &(0x7f00000003c0)=0x0) io_pgetevents(r6, 0x1b, 0x5, &(0x7f0000000400)=[{}, {}, {}, {}, {}], &(0x7f0000000540)={0x0, 0x989680}, &(0x7f00000005c0)={&(0x7f0000000580)={0x9978}, 0x8}) ptrace(0x10, r5) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0xd6, 0x1, 0x8000, 0x1, 0x81, 0x8}) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000000)) ptrace$setregs(0xf, r5, 0xfff, &(0x7f0000000200)="6c5da4b41f") ptrace$getregset(0x4204, r5, 0x2, &(0x7f0000000100)={&(0x7f0000001300)=""/4096, 0x1000}) 20:47:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8990, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:01 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x80) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0x6058b2601b050682) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0xd5c, 0x7fffffff, 0x20}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x200001c4}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:01 executing program 1 (fault-call:3 fault-nth:0): r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 212.798684][T11802] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 20:47:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8992, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 212.846827][T11808] FAULT_INJECTION: forcing a failure. [ 212.846827][T11808] name failslab, interval 1, probability 0, space 0, times 0 [ 212.859489][T11810] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 212.884318][T11808] CPU: 0 PID: 11808 Comm: syz-executor.1 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 212.893530][T11808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.903590][T11808] Call Trace: [ 212.903618][T11808] dump_stack+0x172/0x1f0 [ 212.903648][T11808] should_fail.cold+0xa/0x15 [ 212.915815][T11808] ? fault_create_debugfs_attr+0x180/0x180 [ 212.921632][T11808] ? ___might_sleep+0x163/0x280 [ 212.926480][T11808] __should_failslab+0x121/0x190 [ 212.931409][T11808] should_failslab+0x9/0x14 [ 212.935905][T11808] __kmalloc+0x2e0/0x770 [ 212.940147][T11808] ? mark_held_locks+0xf0/0xf0 [ 212.944912][T11808] ? _parse_integer+0x190/0x190 [ 212.949768][T11808] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 212.955478][T11808] tomoyo_realpath_from_path+0xcd/0x7b0 [ 212.961027][T11808] ? tomoyo_path_number_perm+0x193/0x520 [ 212.966674][T11808] tomoyo_path_number_perm+0x1dd/0x520 [ 212.972125][T11808] ? tomoyo_path_number_perm+0x193/0x520 [ 212.977750][T11808] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 212.983547][T11808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.989786][T11808] ? __kasan_check_read+0x11/0x20 [ 212.994808][T11808] ? __fget+0x384/0x560 [ 212.998955][T11808] ? ksys_dup3+0x3e0/0x3e0 [ 213.003362][T11808] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 213.009599][T11808] ? fput_many+0x12c/0x1a0 [ 213.014012][T11808] tomoyo_file_ioctl+0x23/0x30 [ 213.018774][T11808] security_file_ioctl+0x77/0xc0 [ 213.023705][T11808] ksys_ioctl+0x57/0xd0 [ 213.027868][T11808] __x64_sys_ioctl+0x73/0xb0 [ 213.032493][T11808] do_syscall_64+0xfa/0x760 [ 213.037005][T11808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.042892][T11808] RIP: 0033:0x459829 [ 213.046778][T11808] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 213.066368][T11808] RSP: 002b:00007ff2e422dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 213.074768][T11808] RAX: ffffffffffffffda RBX: 00007ff2e422dc90 RCX: 0000000000459829 [ 213.082727][T11808] RDX: 0000000020000000 RSI: 00000000c2604110 RDI: 0000000000000003 20:47:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x14000, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000100)={0x1, 0x1, [0x10000, 0x6, 0x3, 0x1000, 0x3ff, 0x0, 0x2, 0x8000]}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200000020000803, &(0x7f0000000e00)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) [ 213.090684][T11808] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.098643][T11808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2e422e6d4 [ 213.106597][T11808] R13: 00000000004c0c41 R14: 00000000004d3d18 R15: 0000000000000004 20:47:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x7ffff000}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:02 executing program 1 (fault-call:3 fault-nth:1): r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 213.190457][T11808] ERROR: Out of memory at tomoyo_realpath_from_path. [ 213.306508][T11827] FAULT_INJECTION: forcing a failure. [ 213.306508][T11827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.319776][T11827] CPU: 1 PID: 11827 Comm: syz-executor.1 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 213.328982][T11827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.339048][T11827] Call Trace: [ 213.342373][T11827] dump_stack+0x172/0x1f0 [ 213.346723][T11827] should_fail.cold+0xa/0x15 [ 213.351421][T11827] ? fault_create_debugfs_attr+0x180/0x180 [ 213.357240][T11827] ? lock_downgrade+0x920/0x920 [ 213.362127][T11827] should_fail_alloc_page+0x50/0x60 [ 213.367331][T11827] __alloc_pages_nodemask+0x1a1/0x900 [ 213.372713][T11827] ? __alloc_pages_slowpath+0x2530/0x2530 [ 213.378449][T11827] ? kernel_text_address+0x73/0xf0 [ 213.383610][T11827] ? unwind_get_return_address+0x61/0xa0 [ 213.389240][T11827] ? profile_setup.cold+0xbb/0xbb [ 213.394268][T11827] ? fault_create_debugfs_attr+0x180/0x180 [ 213.400080][T11827] cache_grow_begin+0x90/0xd20 [ 213.404850][T11827] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 213.410586][T11827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.416845][T11827] __kmalloc+0x6b2/0x770 [ 213.421091][T11827] ? mark_held_locks+0xf0/0xf0 [ 213.425904][T11827] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 213.431629][T11827] tomoyo_realpath_from_path+0xcd/0x7b0 [ 213.437176][T11827] ? tomoyo_path_number_perm+0x193/0x520 [ 213.442818][T11827] tomoyo_path_number_perm+0x1dd/0x520 [ 213.448276][T11827] ? tomoyo_path_number_perm+0x193/0x520 [ 213.453935][T11827] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 213.459767][T11827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.466029][T11827] ? __kasan_check_read+0x11/0x20 [ 213.471089][T11827] ? __fget+0x384/0x560 [ 213.471110][T11827] ? ksys_dup3+0x3e0/0x3e0 [ 213.479670][T11827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 213.479686][T11827] ? fput_many+0x12c/0x1a0 [ 213.479706][T11827] tomoyo_file_ioctl+0x23/0x30 [ 213.495106][T11827] security_file_ioctl+0x77/0xc0 [ 213.500047][T11827] ksys_ioctl+0x57/0xd0 [ 213.504211][T11827] __x64_sys_ioctl+0x73/0xb0 [ 213.508814][T11827] do_syscall_64+0xfa/0x760 [ 213.513326][T11827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.519233][T11827] RIP: 0033:0x459829 [ 213.523131][T11827] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 213.542766][T11827] RSP: 002b:00007ff2e422dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:47:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:02 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = fcntl$dupfd(r0, 0x406, r0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) write$P9_RGETATTR(r1, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x2011, {0x0, 0x1, 0x1}, 0xc66c54a1db8eca94, r2, r3, 0x981a, 0xffffffff, 0x7, 0x7fffffff, 0x0, 0x8000, 0x2cca, 0x1f, 0x6, 0x200, 0x5, 0xffffffffffff7fff, 0xff, 0x2}}, 0xa0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x2259, &(0x7f0000000040)}, 0x4) 20:47:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0x200002f1}], 0x2) 20:47:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:02 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) [ 213.551209][T11827] RAX: ffffffffffffffda RBX: 00007ff2e422dc90 RCX: 0000000000459829 [ 213.551218][T11827] RDX: 0000000020000000 RSI: 00000000c2604110 RDI: 0000000000000003 [ 213.551225][T11827] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.551242][T11827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2e422e6d4 [ 213.567167][T11827] R13: 00000000004c0c41 R14: 00000000004d3d18 R15: 0000000000000004 20:47:02 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8994, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:02 executing program 1 (fault-call:3 fault-nth:2): r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:47:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0x7fffef7c}], 0x2) 20:47:03 executing program 2: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) poll(&(0x7f00000000c0)=[{r0}, {r0, 0x8220}, {r0, 0x2100}, {r0, 0x40}, {r1, 0x4000}, {r1, 0x8000}, {r0, 0x1}, {r0, 0x4000}, {r1, 0xcf15b47f27f84b50}], 0x9, 0x3ff) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 20:47:03 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8995, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:03 executing program 5: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000c98000/0x3000)=nil, 0x3000, 0x2000, 0x49f143dc7094374b, &(0x7f0000df9000/0x2000)=nil) munlockall() 20:47:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x3) 20:47:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:03 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 20:47:03 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x2, &(0x7f0000000000)) 20:47:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:03 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a2, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x8) [ 214.280972][ T26] audit: type=1326 audit(1565642823.346:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 20:47:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:03 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) [ 215.050724][ T26] audit: type=1326 audit(1565642824.106:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 20:47:04 executing program 2: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) poll(&(0x7f00000000c0)=[{r0}, {r0, 0x8220}, {r0, 0x2100}, {r0, 0x40}, {r1, 0x4000}, {r1, 0x8000}, {r0, 0x1}, {r0, 0x4000}, {r1, 0xcf15b47f27f84b50}], 0x9, 0x3ff) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 20:47:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x9) [ 215.252108][ T26] audit: type=1326 audit(1565642824.316:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11970 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 20:47:04 executing program 5: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) poll(&(0x7f00000000c0)=[{r0}, {r0, 0x8220}, {r0, 0x2100}, {r0, 0x40}, {r1, 0x4000}, {r1, 0x8000}, {r0, 0x1}, {r0, 0x4000}, {r1, 0xcf15b47f27f84b50}], 0x9, 0x3ff) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 20:47:04 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x10, &(0x7f0000000000)) 20:47:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:04 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0xf52) 20:47:04 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b1, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:04 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x1276, &(0x7f0000000000)) 20:47:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0xf6d) 20:47:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:04 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x400454ca, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) [ 215.599189][ T26] audit: type=1326 audit(1565642824.656:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12001 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 20:47:05 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="ded6d7bc89ddd7d5b791470a09e12eb9", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c65310afab4a28894366b921867eda2b6b1e0c6b70bf55ecf"], 0x20) 20:47:05 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x2402, &(0x7f0000000000)) 20:47:05 executing program 5: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) poll(&(0x7f00000000c0)=[{r0}, {r0, 0x8220}, {r0, 0x2100}, {r0, 0x40}, {r1, 0x4000}, {r1, 0x8000}, {r0, 0x1}, {r0, 0x4000}, {r1, 0xcf15b47f27f84b50}], 0x9, 0x3ff) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 20:47:05 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0xfc8) 20:47:05 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4112, &(0x7f0000000000)) 20:47:05 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000680)={'sit0\x00', &(0x7f0000000580)=@ethtool_dump={0x40, 0x7, 0x8, 0xea, "c6f02622c73d12c3634bc01c9ba3054ba2f7604e2a59523800f4c500cdc0d81a2d21b2858d4fba8c43fe5fa142cc24742d13f1586a77eb0a77f0a70003c636535d75e3c278e427eac2a71ab206bebe7e502c511f3b090b16fca620250c1f8635ba56d02c3e90ef94bbf9db4dcf9ffed3cbaf42565c897bb0e27587e589683307c162361fa2fb6844842933dd9293a6640d3c48df3cd21b1f3b71f76f4fcad5938e88c8719dc910186026ff73c27bc0c0c0ad821c7272c60809ad7a19524788a8661d6d989375d5b496358110976fd3a4ef4b9641b060d2298fa51c58c9e90521b2ecb2b112181d4b81b8"}}) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x4a0, 0x278, 0x118, 0x118, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000040), {[{{@arp={@empty, @multicast1, 0xff, 0xff000000, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xee3860c04044419f]}, @empty, {[0xff, 0xbd97904c83e0404b, 0x0, 0x0, 0xff]}, 0x4, 0x90, 0x0, 0x2, 0x7fff, 0x81, 'veth0_to_team\x00', 'veth0_to_hsr\x00', {}, {}, 0x0, 0x100}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x5, 0x6, 0x1}}}, {{@uncond, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x7f, 0xfffffffffffffe8f, 0x7f, 0x1, 0x0, "4b2aa82392ceb1bc57e6d6d0fca77970af8b413858ed016f8698093f0c571242a1264d4ecb8d1d52762036c1910d80ef378674d50216eacb481584db9c525c36"}}}, {{@arp={@rand_addr=0x5, @remote, 0xffffffff, 0xff000000, @mac=@broadcast, {[0x0, 0xceeadad035df85d1, 0x12b81354ed54874c, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}, 0x2, 0xdfa, 0x7, 0x1, 0x400, 0x2, 'bridge0\x00', 'veth1\x00', {0xff}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x4, @dev={0xac, 0x14, 0x14, 0x10}, 0x2, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, &(0x7f0000002740)) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x100, 0x0, {0xffffffff, 0x49, 0x0, 0x100000001}}) 20:47:05 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4122, &(0x7f0000000000)) 20:47:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0xfe3) 20:47:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:05 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:05 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f157f"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) [ 216.575190][ T26] audit: type=1326 audit(1565642825.636:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12057 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 20:47:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) write(r1, &(0x7f0000000080)="1b0000001a005f0014f9f4070009040a0a00000000000000003f00", 0x1b) 20:47:06 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4140, &(0x7f0000000000)) 20:47:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) fcntl$setlease(r1, 0x400, 0x2) 20:47:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x800454d2, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:06 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f157f"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) 20:47:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x80086301, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:06 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f157f"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) 20:47:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000003c0)={'ipddp0\x00', 0x8}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000a00}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r2, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'bpq0\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x800) ioctl$NBD_DISCONNECT(r1, 0xab08) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:06 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4141, &(0x7f0000000000)) 20:47:06 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x1, 0x3, 0x9, 0x7f}, {0x5, 0x1, 0x2, 0x1}, {0x8, 0x3db, 0x2, 0x5}, {0x9e86, 0xfff, 0x0, 0x81}]}) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x40800) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0)=0xffffffffffffff75, 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x49, 0x40000) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='\x00\x00\x00', 0x26e1, 0x0) ioctl(r2, 0x40086604, 0xfffffffffffffffd) 20:47:06 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f157f"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) 20:47:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x800000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:06 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4142, &(0x7f0000000000)) 20:47:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x1, 0x0) write$tun(r1, &(0x7f0000000300)={@void, @val={0x2, 0x0, 0x3, 0x0, 0x9, 0x3}, @ipv6={0x7, 0x6, "1d4c22", 0x9c, 0x2f, 0xfffffffffffff800, @mcast1, @remote, {[@dstopts={0x3b, 0xd, [], [@ra={0x5, 0x2, 0x5}, @enc_lim={0x4, 0x1, 0x20}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @empty}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @local}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x1, 0x2f, "bb72cc28fc55c0e7a55f066355acfb01ccb5a105f38ab110944f928a10c3d02ff38ba2e97e040615ecf5328ad9002e"}]}], @tcp={{0x4e24, 0x4e22, r2, r3, 0x40, 0x0, 0x5, 0xc2, 0x80000000, 0x0, 0x80}, {"960a8526dfc0a1a10750a1012b16792f"}}}}}, 0xce) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r1, 0x0, 0xe, &(0x7f00000000c0)='net/protocols\x00', 0xffffffffffffffff}, 0x30) fcntl$setownex(r0, 0xf, &(0x7f0000000440)={0x3, r4}) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) dup2(r0, r2) 20:47:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fff, 0x400000) getresuid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000300)) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000340)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:06 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{0xffffffffffffffff, 0x0, 0x8a6, 0x2, 0x7d2d1dad}, 0xffffffff, 0x3f000000, 'id1\x00', 'timer1\x00', 0x0, 0x401, 0x2, 0x1ff, 0x3f}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000000000)=[{0x7}, {0x6}]}, 0x10) 20:47:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:06 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4143, &(0x7f0000000000)) 20:47:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:07 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:07 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4144, &(0x7f0000000000)) 20:47:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x464, 0x50041) fgetxattr(r2, &(0x7f0000000040)=@known='com.apple.FinderInfo\x00', &(0x7f0000000300)=""/85, 0x55) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000000c0)=0x400, 0x4) 20:47:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vhci\x00', 0x42) pwrite64(r0, &(0x7f00000002c0)="2da76abd2b155efc5f8e927c0f0608f3df6cf2e7fc5c399093e51c262689794b428d4586102dcfe8c6b3cdf7d7ae9da3288aec3b939bf73f9e113c89e6555db58452c37812e17de6ea02f5e3543772d9eba9c7fef714bc561ac58a88ebe5a101f6f3c7ce3da66e3b0e16cf90288702e02aa543e9b895404fa0dd3425038179e1a17a4b53abe1c18c34e26470120799e9a0199ca7ff2b522df17a554ea19675f4dc8787711acd71116f74aa468baf9bfe24e2239541145661e26dade5b0264c3b31296bfa3b4227c9c5c4baed4886b5273a319e86e02de58f38", 0xd9, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000100)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, {}, {0x0, 0x0, 0x0, 0x1ff}]}) getuid() getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0x7c3, @ipv4={[], [], @remote}}}}, &(0x7f0000000880)=0x84) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x84000, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000180)={0x9, 0xa7, 0x5, 0x40, 0x15, 0x6, 0x4, 0xffffffffffffff02, 0xfffffffffffffff9, 0x9, 0x6}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:47:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x501600) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000100)) 20:47:07 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:07 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4147, &(0x7f0000000000)) 20:47:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') socket$bt_bnep(0x1f, 0x3, 0x4) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:07 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f00000000c0)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x222000, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x25) 20:47:08 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4148, &(0x7f0000000000)) 20:47:08 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) ioctl(r0, 0x40044103, &(0x7f00000000c0)) 20:47:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\x00', 0x1, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x1, 0x30}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000380)={r2, 0xd6c, 0x530e9386, 0x9c}, &(0x7f00000003c0)=0x10) 20:47:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'b%idge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:08 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4161, &(0x7f0000000000)) 20:47:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x501600) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000100)) 20:47:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000440)="11dca50d5e0bcfe47bf070cd8fbc8115c2358cb30400000042abfea6487630b7b3829385bb0ced0a7e2ab82db0bff56cf4e9b621ce209938b12c0ba0dcd0b2aa84d9") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='limits\x00') ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000300)) readv(r1, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:08 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000100)=ANY=[@ANYBLOB="0600450026aaef47b177729ee0827c5b17a0626e69b51d5dad81f8079d1eb29b465b7fa0203b6c386972cf284b5bcd268cfad02d72aa5c00c2cf054ec15e00"/73]) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000000180)='f', 0xfffffffffffffed8, 0x0, 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000001c0)=""/81) splice(r2, 0x0, r1, 0x0, 0x1, 0x0) 20:47:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'b\\idge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:08 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x4c01, &(0x7f0000000000)) 20:47:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:08 executing program 2: r0 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x4100) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x10000, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x52, 0x6, 0x55e2, 0x0, 0x4, 0x600, 0x2, 0x0, 0x5, 0x8, 0x7, 0xdca7, 0xfffffffffffffff7, 0x6, 0x869, 0x5, 0x3, 0x6, 0x2, 0xffffffffffffff7f, 0x8, 0x80000000, 0x10000, 0x5, 0x7a00, 0x1, 0x2, 0xffffffff, 0xfff, 0x5, 0xcc26, 0x3, 0x9, 0x0, 0x97, 0x0, 0x6, 0x5, @perf_config_ext={0x4, 0x400}, 0x1, 0xdf9, 0x401, 0x3, 0x1, 0x1, 0x10000}, r2, 0x5, r3, 0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) 20:47:08 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') readv(r2, &(0x7f0000000740)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/241, 0xf1}], 0x2) 20:47:08 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x5421, &(0x7f0000000000)) 20:47:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'br%dge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x68}}) 20:47:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x501600) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000100)) 20:47:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 20:47:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/stat\x00') fstat(r0, &(0x7f0000000180)) [ 219.645755][T12286] ================================================================== [ 219.653875][T12286] BUG: KASAN: null-ptr-deref in rxrpc_unuse_local+0x23/0x70 [ 219.661149][T12286] Write of size 4 at addr 0000000000000010 by task syz-executor.0/12286 [ 219.661153][T12286] [ 219.661167][T12286] CPU: 0 PID: 12286 Comm: syz-executor.0 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 219.661174][T12286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.661179][T12286] Call Trace: [ 219.661198][T12286] dump_stack+0x172/0x1f0 [ 219.661211][T12286] ? rxrpc_unuse_local+0x23/0x70 [ 219.661229][T12286] ? rxrpc_unuse_local+0x23/0x70 [ 219.691115][T12286] __kasan_report.cold+0x5/0x36 [ 219.713432][T12286] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 219.719265][T12286] ? rxrpc_unuse_local+0x23/0x70 [ 219.724232][T12286] kasan_report+0x12/0x17 [ 219.724255][T12286] check_memory_region+0x134/0x1a0 [ 219.724267][T12286] __kasan_check_write+0x14/0x20 [ 219.724281][T12286] rxrpc_unuse_local+0x23/0x70 [ 219.724294][T12286] rxrpc_release+0x47d/0x840 [ 219.724317][T12286] __sock_release+0xce/0x280 [ 219.738689][T12286] sock_close+0x1e/0x30 [ 219.738705][T12286] __fput+0x2ff/0x890 [ 219.738724][T12286] ? __sock_release+0x280/0x280 [ 219.765615][T12286] ____fput+0x16/0x20 [ 219.769605][T12286] task_work_run+0x145/0x1c0 [ 219.774218][T12286] exit_to_usermode_loop+0x316/0x380 [ 219.779528][T12286] do_syscall_64+0x65f/0x760 [ 219.784141][T12286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.790038][T12286] RIP: 0033:0x413511 20:47:08 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {0x0}, {&(0x7f0000012000)=""/155, 0x9b}, {0x0}, {&(0x7f0000000000)=""/102, 0x66}], 0x5, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) ioctl(r0, 0x5450, &(0x7f0000000000)) [ 219.793939][T12286] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 219.813992][T12286] RSP: 002b:00007ffcc7cb62b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 219.822405][T12286] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 219.830405][T12286] RDX: 0000001b2d520000 RSI: 0000000000000000 RDI: 0000000000000003 [ 219.838388][T12286] RBP: 0000000000000001 R08: 0000000063b92382 R09: ffffffffffffffff [ 219.846381][T12286] R10: 00007ffcc7cb6390 R11: 0000000000000293 R12: 000000000075bf20 [ 219.854384][T12286] R13: 00000000000359e2 R14: 0000000000760498 R15: ffffffffffffffff [ 219.862387][T12286] ================================================================== [ 219.880802][T12286] Kernel panic - not syncing: panic_on_warn set ... [ 219.887470][T12286] CPU: 1 PID: 12286 Comm: syz-executor.0 Tainted: G B 5.3.0-rc4-next-20190812+ #64 [ 219.898054][T12286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.908121][T12286] Call Trace: [ 219.911500][T12286] dump_stack+0x172/0x1f0 [ 219.915855][T12286] panic+0x2dc/0x755 [ 219.919773][T12286] ? add_taint.cold+0x16/0x16 [ 219.924465][T12286] ? rxrpc_unuse_local+0x23/0x70 [ 219.929417][T12286] ? preempt_schedule+0x4b/0x60 [ 219.934309][T12286] ? ___preempt_schedule+0x16/0x20 [ 219.939450][T12286] ? trace_hardirqs_on+0x5e/0x240 [ 219.944488][T12286] ? rxrpc_unuse_local+0x23/0x70 [ 219.949434][T12286] end_report+0x47/0x4f [ 219.953598][T12286] ? rxrpc_unuse_local+0x23/0x70 [ 219.958544][T12286] __kasan_report.cold+0xe/0x36 [ 219.963404][T12286] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 219.969213][T12286] ? rxrpc_unuse_local+0x23/0x70 [ 219.974170][T12286] kasan_report+0x12/0x17 [ 219.978500][T12286] check_memory_region+0x134/0x1a0 [ 219.983608][T12286] __kasan_check_write+0x14/0x20 [ 219.988551][T12286] rxrpc_unuse_local+0x23/0x70 [ 219.993332][T12286] rxrpc_release+0x47d/0x840 [ 219.997942][T12286] __sock_release+0xce/0x280 [ 220.002562][T12286] sock_close+0x1e/0x30 [ 220.006736][T12286] __fput+0x2ff/0x890 [ 220.010739][T12286] ? __sock_release+0x280/0x280 [ 220.015620][T12286] ____fput+0x16/0x20 [ 220.019636][T12286] task_work_run+0x145/0x1c0 [ 220.024247][T12286] exit_to_usermode_loop+0x316/0x380 [ 220.029564][T12286] do_syscall_64+0x65f/0x760 [ 220.034179][T12286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.040083][T12286] RIP: 0033:0x413511 [ 220.044017][T12286] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 220.063630][T12286] RSP: 002b:00007ffcc7cb62b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 220.072048][T12286] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 220.080044][T12286] RDX: 0000001b2d520000 RSI: 0000000000000000 RDI: 0000000000000003 [ 220.088029][T12286] RBP: 0000000000000001 R08: 0000000063b92382 R09: ffffffffffffffff [ 220.096024][T12286] R10: 00007ffcc7cb6390 R11: 0000000000000293 R12: 000000000075bf20 [ 220.104015][T12286] R13: 00000000000359e2 R14: 0000000000760498 R15: ffffffffffffffff [ 220.112996][T12286] Kernel Offset: disabled [ 220.117327][T12286] Rebooting in 86400 seconds..