[ 56.384294] audit: type=1800 audit(1541926635.422:27): pid=6315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 56.403929] audit: type=1800 audit(1541926635.442:28): pid=6315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.268491] audit: type=1800 audit(1541926637.322:29): pid=6315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 58.288332] audit: type=1800 audit(1541926637.322:30): pid=6315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.92' (ECDSA) to the list of known hosts. 2018/11/11 08:57:27 fuzzer started 2018/11/11 08:57:32 dialing manager at 10.128.0.26:36043 2018/11/11 08:57:32 syscalls: 1 2018/11/11 08:57:32 code coverage: enabled 2018/11/11 08:57:32 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/11 08:57:32 setuid sandbox: enabled 2018/11/11 08:57:32 namespace sandbox: enabled 2018/11/11 08:57:32 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/11 08:57:32 fault injection: enabled 2018/11/11 08:57:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/11 08:57:32 net packed injection: enabled 2018/11/11 08:57:32 net device setup: enabled 08:59:50 executing program 0: syzkaller login: [ 212.377543] IPVS: ftp: loaded support on port[0] = 21 [ 214.681765] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.688422] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.697108] device bridge_slave_0 entered promiscuous mode [ 214.828620] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.835272] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.843863] device bridge_slave_1 entered promiscuous mode [ 214.973403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.104147] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.498230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.629336] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:59:54 executing program 1: [ 216.367334] IPVS: ftp: loaded support on port[0] = 21 [ 216.509443] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.517713] team0: Port device team_slave_0 added [ 216.710998] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.719133] team0: Port device team_slave_1 added [ 216.884767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.080211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.324106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.331724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.340905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.491645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.499449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.508763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.537943] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.544591] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.553148] device bridge_slave_0 entered promiscuous mode [ 219.792848] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.799397] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.807995] device bridge_slave_1 entered promiscuous mode [ 219.870287] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.876864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.884013] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.890469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.899097] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.044742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.262750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.732584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.943427] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.166808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.455135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.464050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:00:00 executing program 2: [ 222.437623] IPVS: ftp: loaded support on port[0] = 21 [ 222.596079] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.604288] team0: Port device team_slave_0 added [ 222.844671] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.852863] team0: Port device team_slave_1 added [ 223.143662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.150762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.159515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.405586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.412946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.421390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.686588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.694316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.703409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.022203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 224.029800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.038765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.059792] ip (6722) used greatest stack depth: 53216 bytes left [ 226.589159] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.595919] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.604436] device bridge_slave_0 entered promiscuous mode [ 226.732972] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.739461] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.748431] device bridge_slave_1 entered promiscuous mode [ 226.930983] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.094781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.115889] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.122448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.129327] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.135921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.144332] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.452201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.787341] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.920199] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.166234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.175120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.478758] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.486043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.241594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.249679] team0: Port device team_slave_0 added [ 229.561356] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.569397] team0: Port device team_slave_1 added 09:00:08 executing program 3: [ 229.868119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.875406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.884108] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.219235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.226484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.235352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.271781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.570320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.578090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.587047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.827715] IPVS: ftp: loaded support on port[0] = 21 [ 230.946272] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.953989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.962951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.558119] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.817665] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.824196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.832287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.085921] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.657816] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.664359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.671226] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.677798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.686357] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.453554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.927755] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.935198] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.943591] device bridge_slave_0 entered promiscuous mode [ 236.269168] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.275906] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.284363] device bridge_slave_1 entered promiscuous mode [ 236.596866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.848903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.738681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.083256] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.361272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 238.368500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.673440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.680535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:00:18 executing program 4: [ 239.664337] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.672483] team0: Port device team_slave_0 added [ 240.058295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.066291] team0: Port device team_slave_1 added [ 240.186376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.435940] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 240.443171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.451827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.768892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 240.776386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.785087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.838420] IPVS: ftp: loaded support on port[0] = 21 [ 241.192519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 241.200183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.209347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.553679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.561267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.570464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.667119] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:00:21 executing program 0: 09:00:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x200031, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x5) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000001c0)={0x990000, 0x4, 0x1, [], &(0x7f0000000180)={0x98091e, 0x8, [], @value=0x7}}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r2 = dup2(r0, r0) pipe2(&(0x7f0000000100), 0x4000) ioctl$VT_RELDISP(r0, 0x5605) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xffffffffffffffff, 0x400, 0x1, 0x800}, {0xe000000000000000, 0x8000, 0x2, 0x9}]}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x3f, 0x4000) [ 243.085021] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 243.091456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.099559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:00:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r0, 0x820000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgid(0xffffffffffffffff) move_pages(r2, 0x3, &(0x7f00000001c0)=[&(0x7f00003c6000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f000052f000/0x4000)=nil], &(0x7f0000000200)=[0x8, 0x9], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$can_bcm(r3, &(0x7f0000000340), 0x10) 09:00:22 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1000000000003, 0x3fff) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000080)={0x123, 0x2, 0x481}) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000000c0)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) 09:00:23 executing program 0: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000240)="66baf80cb8ee330d8bef66bafc0cec66baf80cb81c56d98cef66bafc0cec48b8934d123b449e31350f23c80f21f8350c0030000f23f8400f01f8c7442400ec000000c744240200109966ff1c24c462f9ae1966b825018ed8470f2101660f3808e90f07", 0x63}], 0x1, 0x0, &(0x7f0000000000), 0x0) [ 244.379192] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 244.582153] 8021q: adding VLAN 0 to HW filter on device team0 09:00:24 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x0, 0x1, &(0x7f0000000700)=""/66, &(0x7f0000000140)=""/1, &(0x7f0000000980)=""/158, 0x10d000}) rt_sigsuspend(&(0x7f00000001c0)={0x6}, 0x8) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f0000000900)=ANY=[@ANYRES64]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0x90, &(0x7f0000000080)=""/144}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) 09:00:25 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102003ff4, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465762f6e756c6c623000c6c986d3c88e5fdd4df636ccbece4bdc1a4e22a81594e91688a42e286f74d4fbd8f5ad3ba3007738e0428f6b6ac05a2c7b3d5b3d59bc5c2024a0"], &(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000600)='squashfs\x00', 0x0, 0x0) [ 246.120967] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.127562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.134795] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.141253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.149640] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 09:00:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800, 0x40) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000140)=0x1) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000001c0)={0x0, 0x80000000, [], @bt={0x7, 0x0, 0x1, 0x2, 0x0, 0x9, 0x6, 0xc}}) r1 = socket$kcm(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x2, 0x4e21, @local}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB="20000000000000000000000007000000830b0400000000000000000000000000"], 0x20}, 0x0) [ 246.352385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.246759] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.253582] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.262041] device bridge_slave_0 entered promiscuous mode [ 247.598723] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.605384] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.614026] device bridge_slave_1 entered promiscuous mode [ 248.045548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.375027] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.142322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.282171] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.613776] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.887579] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 249.894857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.235790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 250.243004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.318069] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.328763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.336882] team0: Port device team_slave_0 added [ 251.531478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.539722] team0: Port device team_slave_1 added [ 251.603279] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.614440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.622522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.810575] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.817843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.826502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.078520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.085972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.095015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 09:00:31 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') mknod(&(0x7f0000000380)='./file0\x00', 0xd616a9c21189c7e8, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[], &(0x7f0000000340)) mkdirat(0xffffffffffffffff, &(0x7f00000189a2)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000480)=""/171, 0xab, 0x2040, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001f6, 0x0) [ 252.363158] hrtimer: interrupt took 33271 ns [ 252.375354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.383080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.391767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.592215] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.958478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.966144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.975125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.728201] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large: [ 254.739635] clocksource: 'acpi_pm' wd_now: 314bb5 wd_last: 9cf0e8 mask: ffffff [ 254.749574] clocksource: 'tsc' cs_now: 8df8cfe5d4 cs_last: 8c847c20d0 mask: ffffffffffffffff [ 254.760193] tsc: Marking TSC unstable due to clocksource watchdog [ 254.774638] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 254.783551] sched_clock: Marking unstable (254842761046, -68141224)<-(254892167027, -117546580) [ 254.805260] clocksource: Switched to clocksource acpi_pm [ 256.726054] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.732615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.739533] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.746146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.755070] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 256.761799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.064177] 8021q: adding VLAN 0 to HW filter on device bond0 09:00:38 executing program 2: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xa4092, 0x0, 0x9, 0x3, 0x0, 0x0, 0x9, 0x4cbb, 0x0, 0x81, 0x6, 0x1, 0x1, 0x0, 0x5, 0x8cf, 0x400, 0x8, 0x0, 0x1ff, 0x0, 0xc511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 259.934396] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 260.558070] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.564671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.572563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.055737] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.773288] ip (7715) used greatest stack depth: 53072 bytes left [ 263.256414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.753931] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:00:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) r1 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x1ff) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f00000001c0)=0x8) [ 264.233314] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 264.239705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.247731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.694549] 8021q: adding VLAN 0 to HW filter on device team0 09:00:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7001, &(0x7f0000000040)) 09:00:45 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000018effc)=0x1c, 0x4) bind$unix(r0, &(0x7f0000003000)=@abs={0x0, 0x0, 0x4e21}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000939ff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 09:00:45 executing program 5: r0 = dup(0xffffffffffffff9c) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000040)=0x6) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000080)) ioctl$BLKRRPART(r0, 0x125f, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0xffffffff, 0x5, 0x0, 0x2, 0x100, 0x3, 0x457, 0x401, 0x2, 0xffffffff, 0x394, 0x9, 0x7a0a, 0x1f, 0x2, 0x4}}) ioctl$KDDISABIO(r0, 0x4b37) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000200)={'yam0\x00', {0x2, 0x81, @local}}) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000240)={0x7, 0x0, [{0x80000019, 0x1e, 0x3, 0xff800000000, 0x58}, {0x40000001, 0xd74, 0x4, 0x200, 0x3}, {0x80000008, 0xdaa, 0x2, 0x800, 0x540}, {0x80000007, 0x5, 0x9, 0x48, 0x80}, {0xc0000001, 0x0, 0xfffffffffffffff8, 0x7775, 0x5}, {0x80000007, 0x8, 0xfffffffeffffffff, 0x5, 0xffffffff}, {0xc0000001, 0x4, 0x3, 0x9c, 0x7fffffff}]}) fstat(r0, &(0x7f0000000300)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000380)=0x2, 0x4) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000003c0)={0x4, 0x1, 0x100000001}) r1 = syz_open_dev$vbi(&(0x7f0000000400)='/dev/vbi#\x00', 0x3, 0x2) getpeername$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000006c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000700)={'vcan0\x00', r2}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000740), &(0x7f0000000780)=0x4) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000900)={0x4, 0xaa9, &(0x7f00000007c0)="2356007c351d", &(0x7f0000000800)="b62a3887fc6ed38806a6dfe3cbdd62fdbb5eff422b212f15385c1bfe09d1242f3f11ded4c7512fe4a818c07d6b824ca127cfc658a1703377c0d4079594b163e8def03308c7974a64b3a8b61b17bdfb50dc9b38c1b02f2a29a3dde782445d285ccb304d8bc6e520d08f6b91b268830ae952584aa9446314821cf3b0f3cfd6757ef63db1884f2eb4860cc99295cbede6e7857b4e74c1bed62762cf3160bb7edc4dbece365fa9769428b5011f96efc1a7ec0bf0f358a9e10243d087fd074601238245b27681639b3cf10c05f388b4f63dcc0158f744f26b14d43abd3a4f15a951", 0x6, 0xdf}) connect$inet6(r1, &(0x7f0000000940)={0xa, 0x4e22, 0x40, @remote, 0x7f}, 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000980)={0x0, 0x7, 0x0, 0x5, 0xd6e, 0x2f0}, &(0x7f00000009c0)=0x14) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000a00)={r3, 0xe2, 0x77, 0x3, 0x8, 0x80000000}, 0x14) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000a40)=0xba) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000a80)={0x81, 0x6, 0x4, 0x200000, {}, {0x5, 0x0, 0x28e, 0x0, 0x7fffffff, 0x8, "390170b4"}, 0xef, 0x2, @offset=0x4, 0x4}) r4 = syz_open_dev$cec(&(0x7f0000000b00)='/dev/cec#\x00', 0x0, 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x2e, 0x4, 0x0, {0x6, 0xfff, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) splice(r1, &(0x7f0000000b80), r4, &(0x7f0000000bc0), 0x100000001, 0xa) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x42, 0x4) getsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000c00), &(0x7f0000000c40)=0x4) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000c80)={{0x200, 0x1}, 0x4}, 0x10) 09:00:45 executing program 2: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xa4092, 0x0, 0x9, 0x3, 0x0, 0x0, 0x9, 0x4cbb, 0x0, 0x81, 0x6, 0x1, 0x1, 0x0, 0x5, 0x8cf, 0x400, 0x8, 0x0, 0x1ff, 0x0, 0xc511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 09:00:45 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') mknod(&(0x7f0000000380)='./file0\x00', 0xd616a9c21189c7e8, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[], &(0x7f0000000340)) mkdirat(0xffffffffffffffff, &(0x7f00000189a2)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000480)=""/171, 0xab, 0x2040, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001f6, 0x0) 09:00:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) r1 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x1ff) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f00000001c0)=0x8) 09:00:45 executing program 0: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000080)=ANY=[], &(0x7f000000fff8)='./file0\x00', &(0x7f0000032ffb)='fuse\x00', 0x7ffbf, &(0x7f0000032000)) 09:00:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7001, &(0x7f0000000040)) 09:00:46 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) 09:00:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setlease(r0, 0x400, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x20400) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 09:00:46 executing program 1: syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x21, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x88a8ffff, 0x0, 0x5}}}}}}, 0x0) 09:00:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) 09:00:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000015ff4), 0xc, &(0x7f00000000c0)={&(0x7f000000bf20)=@delpolicy={0x50, 0x15, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@broadcast}}}, 0x50}}, 0x0) [ 267.545861] dccp_v4_rcv: dropped packet with invalid checksum [ 267.602700] dccp_v4_rcv: dropped packet with invalid checksum 09:00:46 executing program 2: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xa4092, 0x0, 0x9, 0x3, 0x0, 0x0, 0x9, 0x4cbb, 0x0, 0x81, 0x6, 0x1, 0x1, 0x0, 0x5, 0x8cf, 0x400, 0x8, 0x0, 0x1ff, 0x0, 0xc511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 267.989608] IPVS: ftp: loaded support on port[0] = 21 [ 269.395828] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.402318] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.409891] device bridge_slave_0 entered promiscuous mode [ 269.485650] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.492220] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.499773] device bridge_slave_1 entered promiscuous mode [ 269.575282] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 269.650328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.877743] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 269.955770] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 270.110551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.117708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.342134] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 270.349640] team0: Port device team_slave_0 added [ 270.425593] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 270.433324] team0: Port device team_slave_1 added [ 270.510731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.588483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.663402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 270.670671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.679735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.750192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 270.757625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.766717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.608665] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.615168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.622074] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.628480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.636624] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 272.056256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.811699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.112371] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.391501] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.397913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.406048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.685611] 8021q: adding VLAN 0 to HW filter on device team0 09:00:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000d80)=[{{&(0x7f0000000680)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000700)=""/231}, {&(0x7f0000000800)=""/138}, {&(0x7f00000008c0)=""/161}, {&(0x7f0000000980)=""/56}, {&(0x7f00000009c0)=""/123}, {&(0x7f0000000a40)=""/112}, {&(0x7f0000000dc0)=""/96}, {&(0x7f0000000b40)=""/192}], 0x0, &(0x7f0000000c80)=""/229}}], 0x54, 0x0, &(0x7f0000003700)={0x77359400}) 09:00:56 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) r1 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x1ff) socket$inet(0x2, 0x3, 0x9) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f00000001c0)=0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) 09:00:56 executing program 1: syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x21, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x88a8ffff, 0x0, 0x5}}}}}}, 0x0) 09:00:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386105, &(0x7f0000000300)) 09:00:56 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 09:00:56 executing program 2: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xa4092, 0x0, 0x9, 0x3, 0x0, 0x0, 0x9, 0x4cbb, 0x0, 0x81, 0x6, 0x1, 0x1, 0x0, 0x5, 0x8cf, 0x400, 0x8, 0x0, 0x1ff, 0x0, 0xc511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 277.636362] dccp_v4_rcv: dropped packet with invalid checksum 09:00:56 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = epoll_create(0x400000201) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) 09:00:56 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) accept4(r1, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 09:00:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000001140)=0x3fb, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000011c0), 0x0, 0xfffffefffffffffe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) 09:00:57 executing program 3: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$eventfd(r0, &(0x7f0000000000), 0x8) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) munmap(&(0x7f0000000000/0x600000)=nil, 0x600000) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 278.090585] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:00:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000001140)=0x3fb, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000011c0), 0x0, 0xfffffefffffffffe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) 09:00:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 09:00:57 executing program 0: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000280)={0x7, 0x3f}) socket$inet_sctp(0x2, 0x0, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x13f, 0xf}}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0x5451) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)={0x3, r1}) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000)=0x1c0000000, 0x0) 09:00:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000680)=0xe529) write(r1, &(0x7f00000003c0)='M', 0x1) 09:00:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2a00000000000000, 0x3f000000) 09:00:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000500)) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r3, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 09:00:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="10"]}) 09:00:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8948, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000080)=ANY=[]}) 09:00:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x21, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:00:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0x57]}) 09:00:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/igmp6\x00') ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000480)=""/254) socketpair$unix(0x1, 0x2000000000000001, 0x0, &(0x7f0000000600)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = semget$private(0x0, 0x0, 0x100) semctl$SETVAL(r3, 0x2, 0x10, &(0x7f0000000640)=0xf2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() write(r2, &(0x7f0000000340), 0x10000014c) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000340), &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$sock_int(r4, 0x1, 0x2d, &(0x7f00000005c0)=0x3ff, 0x4) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000580)={0x7002, 0x10001, 0x400, 0x100, 0x3f}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f00000003c0)={0x7b, 0x0, [0x2, 0x4, 0x80000001, 0xffffffffffffffe1]}) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000440)) 09:00:58 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 279.414486] dccp_invalid_packet: P.type (SYNC) not Data || [Data]Ack, while P.X == 0 [ 279.471266] dccp_invalid_packet: P.type (SYNC) not Data || [Data]Ack, while P.X == 0 09:00:58 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") write(r0, &(0x7f0000000040)="1f0000000104fffffd3b54c007110000f30501000b000500000010d10200cf", 0x1f) 09:00:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES32], 0x4b) [ 279.874726] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 09:00:59 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r2 = dup(r1) write$sndseq(r2, &(0x7f0000000940), 0x0) 09:00:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20040000008912, &(0x7f00000001c0)="0a452d0240316285717070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000004, 0x2013, r1, 0x500000) [ 279.942416] netlink: 'syz-executor4': attribute type 5 has an invalid length. [ 280.000028] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 280.011671] netlink: 'syz-executor4': attribute type 5 has an invalid length. [ 280.032611] sg_write: data in/out 65499/33 bytes for SCSI command 0x0-- guessing data in; [ 280.032611] program syz-executor3 not setting count and/or reply_len properly 09:00:59 executing program 4: ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000480)=""/254) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() write(r1, &(0x7f0000000340), 0x10000014c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000340), &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000580)={0x7002, 0x10001, 0x400, 0x100, 0x3f}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000003c0)={0x0, 0x0, [0x0, 0x4, 0x80000001, 0xffffffffffffffe1]}) 09:00:59 executing program 1: r0 = epoll_create(0x8) r1 = socket$rds(0x15, 0x5, 0x0) r2 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000300)={0xb}) 09:00:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000680)=@bridge_setlink={0x20, 0x13, 0x1}, 0x20}}, 0x0) 09:00:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, &(0x7f00000000c0), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'dummy0\x00', 'team_slave_0\x00', 'syzkaller0\x00', 'rose0\x00', @dev, [], @link_local, [], 0xb0, 0xb0, 0xe8, [@time={'time\x00', 0x18}]}}, @snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}}]}]}, 0x1f0) 09:00:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") mmap(&(0x7f0000187000/0x600000)=nil, 0x1e360000, 0x0, 0x72, 0xffffffffffffffff, 0x0) 09:00:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000003c0)="0f20c035100000000f22c0c4c1f87766baf80cb8aedf018fef66bafc0c66ed0f01ef8149000f00000036f30f2000c4c37962530782670fc75b39643e2e0f01cf66baf80cb86c5fbb8aef66bafc0c66b8e07166ef", 0x54}], 0x1, 0x0, &(0x7f0000000040), 0x600c424d7c543bd) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(&(0x7f0000000100), &(0x7f0000000140)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x0, 0x9}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:01:00 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 09:01:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0f"]}) 09:01:00 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000085) 09:01:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 09:01:00 executing program 0: 09:01:00 executing program 5: 09:01:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040000000000", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) recvmsg(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f00000015c0)=""/142, 0x8e}, {&(0x7f0000001680)=""/169, 0xa9}, {&(0x7f0000001740)=""/156, 0x9c}, {&(0x7f0000001840)=""/192, 0xc0}, {&(0x7f0000001900)=""/161, 0xa1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a80)=""/172, 0xac}, 0x0) recvmsg(r0, &(0x7f0000005380)={&(0x7f0000005040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000005240), 0x0, &(0x7f0000005280)=""/228, 0xe4}, 0x0) 09:01:00 executing program 1: 09:01:00 executing program 2: 09:01:00 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) epoll_create(0x0) 09:01:00 executing program 5: 09:01:01 executing program 3: [ 282.029157] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. 09:01:01 executing program 2: [ 282.083630] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. 09:01:01 executing program 1: 09:01:01 executing program 5: 09:01:01 executing program 0: 09:01:01 executing program 4: 09:01:01 executing program 3: 09:01:01 executing program 2: 09:01:01 executing program 1: 09:01:01 executing program 0: 09:01:01 executing program 5: 09:01:01 executing program 4: 09:01:01 executing program 3: 09:01:02 executing program 2: 09:01:02 executing program 0: 09:01:02 executing program 1: 09:01:02 executing program 5: 09:01:02 executing program 3: 09:01:02 executing program 4: 09:01:02 executing program 1: 09:01:02 executing program 2: 09:01:02 executing program 0: 09:01:02 executing program 5: 09:01:02 executing program 2: 09:01:02 executing program 4: 09:01:02 executing program 3: 09:01:02 executing program 1: 09:01:03 executing program 0: 09:01:03 executing program 4: 09:01:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000001a010000010000007d00000000000000"], 0x18}}], 0x1, 0x0) 09:01:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000fbffffff0700000000e0000095007a500000000041e29548e5bc0bf04e4bfaa20ece9618804d130f10c08662e41f188b24cc0e739212915480a9452518e43aa7dbe0ef5e83d01a57f46debca3bf917cd320a64e7e393c502935d"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000240)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000000)=r1, 0x4) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) 09:01:03 executing program 3: 09:01:03 executing program 1: 09:01:03 executing program 0: 09:01:03 executing program 4: 09:01:03 executing program 3: 09:01:03 executing program 5: 09:01:03 executing program 2: 09:01:03 executing program 1: 09:01:03 executing program 0: 09:01:04 executing program 4: 09:01:04 executing program 5: 09:01:04 executing program 2: 09:01:04 executing program 3: 09:01:04 executing program 1: 09:01:04 executing program 4: 09:01:04 executing program 0: 09:01:04 executing program 5: 09:01:04 executing program 3: 09:01:04 executing program 2: 09:01:04 executing program 1: 09:01:04 executing program 4: 09:01:05 executing program 0: 09:01:05 executing program 5: 09:01:05 executing program 3: 09:01:05 executing program 2: 09:01:05 executing program 1: 09:01:05 executing program 4: 09:01:05 executing program 3: 09:01:05 executing program 5: 09:01:05 executing program 0: 09:01:05 executing program 4: 09:01:05 executing program 1: 09:01:05 executing program 2: 09:01:05 executing program 3: 09:01:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) r3 = syz_open_pts(r1, 0x0) ioctl$int_in(r2, 0x2000005452, &(0x7f00000000c0)=0xd39) r4 = syz_open_pts(r1, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000080)=0x10000) dup2(r2, r3) 09:01:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_INIT(r1, &(0x7f0000000080)={0x50}, 0x50) 09:01:06 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 09:01:06 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) timer_create(0x3, &(0x7f00000002c0), &(0x7f0000000300)) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)="0f747275737465645e2c7365637572697479272e2d2b75736572656d3000", 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, &(0x7f0000000180)}) 09:01:06 executing program 3: 09:01:06 executing program 2: 09:01:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 09:01:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) inotify_init1(0x0) 09:01:06 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 09:01:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x7, 0x0, &(0x7f0000000000)) 09:01:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040), &(0x7f0000001ac0)=0x4) 09:01:06 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x80000000000005) 09:01:07 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x33f, 0x4) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000080)=0x7, 0x4) sendto$inet6(r1, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x8, @dev}, 0x1c) recvmsg(r1, &(0x7f0000000300)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000100)}, 0x0) 09:01:07 executing program 0: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='#! ./file0 #! \n'], 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) 09:01:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000100)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x2000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='U'], 0x1) write$binfmt_misc(r2, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x1) shutdown(r2, 0x1) dup2(r2, r1) 09:01:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000003680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 09:01:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) timer_create(0x3, &(0x7f00000002c0), &(0x7f0000000300)) r2 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)="0f747275737465645e2c7365637572697479272e2d2b75736572656d3000", 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x1, 0x0, &(0x7f0000000180)='T'}) timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000540)={0x0, 'eql\x00'}, 0x18) tkill(0x0, 0x1004000000016) 09:01:07 executing program 0: r0 = socket$kcm(0x10, 0x800800000002, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000007c0)}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={&(0x7f00000005c0)=@in6, 0x80, &(0x7f0000001a40)=[{&(0x7f00000006c0)=""/99, 0x63}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/146, 0x92}], 0x3, &(0x7f0000000740)=""/21, 0x15}, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000002a00), 0x0, &(0x7f0000002a80)=""/207, 0x234}, 0x0) [ 288.584195] sctp: failed to load transform for md5: -2 [ 288.670286] binder: BINDER_SET_CONTEXT_MGR already set [ 288.675899] binder: 8506:8516 ioctl 40046207 0 returned -16 09:01:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r4, r5) 09:01:08 executing program 4: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 09:01:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, 0x0, 0x10001, 0x100000) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000100)="b805000000b9ab8f3d150f01c10f3566baf80cb83853508def66bafc0cec66ba6100ec48b800000000000000800f23c00f21f83503000c000f23f8c4e10573fa2bb9800000c00f3235001000000f30c744240088000000c74424020001c0feff2c2448b800000000010000000f23c80f21f8350400f0000f23f8c423cd790c7eff", 0x81}], 0x1a8, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x15, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:01:08 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') mknod(&(0x7f0000000380)='./file0\x00', 0xd616a9c21189c7e8, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[], &(0x7f0000000340)) mkdirat(0xffffffffffffffff, &(0x7f00000189a2)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000480)=""/171, 0xab, 0x2040, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 09:01:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) timer_create(0x3, &(0x7f00000002c0), &(0x7f0000000300)) r2 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)="0f747275737465645e2c7365637572697479272e2d2b75736572656d3000", 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x1, 0x0, &(0x7f0000000180)='T'}) timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000540)={0x0, 'eql\x00'}, 0x18) tkill(0x0, 0x1004000000016) 09:01:08 executing program 3: io_setup(0x9, &(0x7f0000000480)=0x0) io_cancel(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000004c0)}, &(0x7f0000000540)) 09:01:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, 0x1c) connect$inet6(r1, &(0x7f0000000180), 0x1c) [ 289.308352] kvm: SMP vm created on host with unstable TSC; guest TSC will not be reliable 09:01:08 executing program 4: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 09:01:08 executing program 3: 09:01:08 executing program 5: 09:01:08 executing program 2: 09:01:08 executing program 1: 09:01:09 executing program 0: 09:01:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040000000000", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000003940)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000005380)={&(0x7f0000005040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000005240), 0x0, &(0x7f0000005280)=""/228, 0xe4}, 0x0) 09:01:09 executing program 3: 09:01:09 executing program 5: 09:01:09 executing program 2: [ 290.211293] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. [ 290.237117] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. 09:01:09 executing program 1: 09:01:09 executing program 0: 09:01:09 executing program 5: 09:01:09 executing program 2: 09:01:09 executing program 4: 09:01:09 executing program 3: 09:01:09 executing program 1: 09:01:09 executing program 0: 09:01:10 executing program 5: 09:01:10 executing program 2: 09:01:10 executing program 4: 09:01:10 executing program 3: 09:01:10 executing program 0: 09:01:10 executing program 1: 09:01:10 executing program 2: 09:01:10 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x40247007, &(0x7f0000000040)) 09:01:10 executing program 4: 09:01:10 executing program 3: 09:01:10 executing program 1: 09:01:10 executing program 0: 09:01:10 executing program 3: 09:01:10 executing program 5: 09:01:11 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) r0 = socket(0xa, 0x3, 0x1000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='ip6tnl0\x00', 0x10) sendto$unix(r0, &(0x7f0000000140)="62e21e70b40d53c83940e3dcaa18a3130ea96e860c3abc635e4ede25de1570769c7324f3877af465", 0x28, 0x0, &(0x7f0000000080)=@abs, 0x6e) 09:01:11 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x0, 0x2, 0x1, 0x0, 0x7}, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) mknod(&(0x7f0000000100)='./file0\x00', 0x8469, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000480), &(0x7f0000775000)) 09:01:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 09:01:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x200000, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') setsockopt$inet6_int(r0, 0x29, 0x100000000004a, &(0x7f00000000c0)=0x400, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x100, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000180)=""/189) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3f, 0x400) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000000)={'bpq0\x00', 0x8}) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 09:01:11 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername(r0, &(0x7f00000001c0)=@generic, &(0x7f0000000100)=0x80) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) 09:01:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000040)={0x132e000, 0x1, 0x7}) syz_open_procfs(0x0, &(0x7f0000000180)="6d61705f66696c65730956cc1ec9ce9fb6c59d9ef4a05c0f28fa785c5c69c01ff313e881c1246a79f7cde78a978d07b56d68701efa2a856728bb3d441510b299363428222bfb572543ccafc5d11067e13de3a3253c76b27454c6c6df83e347795201ace9cfc302f816039292ce6703682d1161dcc7c1e0540f2c52bfee1c9bb4268dc2ebdefb978d71832cf15ae76c5184bd952a00000000000000000000") 09:01:11 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) r1 = socket$inet6(0xa, 0x100000002, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x80000000) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x4}, 0x1c) 09:01:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000100), 0x8f, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x1, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f0000000040), 0x7, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) 09:01:11 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='comm\x00') sendfile(r1, r1, &(0x7f0000000340)=0xffffffd, 0x7ffffffb) 09:01:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDDELIO(r0, 0x40085500, 0x0) 09:01:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0xfffffffffffffde5, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[], @ANYPTR=0xfffffffffffffffd, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="d71033180efb16c86cf58e16f3d23f16af4a6e6e4ac094611b18ca08d018fcd63288ce907dd8ef4117fd2c47"]}}, 0xffffffffffffffff) 09:01:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40000, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{0x400, 0x6, 0xbc45, 0x6}, 'syz0\x00', 0x1b}) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xd8, r2, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x810}, 0x48800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet(0x15, 0x5, 0x0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) 09:01:12 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0xc3d, 0xc0902) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000003c0)=0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@mpls_getnetconf={0x1c, 0x52, 0x3, 0x0, 0x0, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x8000, 0x0) r4 = getuid() r5 = getegid() mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x4000, &(0x7f0000000280)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x77, 0x7a, 0x7b, 0x76, 0x39, 0x77], 0x2d, [0x34, 0x7f, 0x30, 0x36], 0x2d, [0x77, 0x30, 0x0, 0x34], 0x2d, [0x77, 0x34, 0x39, 0x62], 0x2d, [0x62, 0x64, 0x35, 0x37, 0x65, 0x71, 0x31, 0x36]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) 09:01:12 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) shutdown(r0, 0x1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4000, 0x0) unshare(0x400) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000240)="1d0509c2363c2c5ebcd0ed8ab15386c57ed07efce4dd82a92c179172d740225cbb00266b45c06a9e72922fd7c5a3bf32f135f8e8514aaf6e76e39e76d817a18b8fafdffb6eba25679b655109c5eda87cdab62e9ed65bec4eedb537dc179f3ea9b1fc8ff129244619b74c39fb745c5cbf28ea861f883940fcd55966b8bf94e24dfdfe80f44983bec5cb7898f5a74795b46f86ad1e0b2cf35e9ebfca8dd2a38217f62affffe3a2238e1ec2545a6af99d79e95fcbd16998f41d3418772eaa7292f93c"}, 0x10) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000100)={r2}) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000200), 0x8) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000340)={&(0x7f0000000180), 0x0, 0x4, 0x5, 0x9, 0x97, 0x7, {0x1, 0x3ff, 0xfffffffffffffffc, 0x8000, 0x4, 0x6, 0x6, 0x3f, 0x8, 0x1, 0x3, 0x4, 0xfffffffffffffffb, 0x0, "ca8d6d70b364a21a2e5e0d83425c3de16701f10d24bcda8bf0c081d402a00131"}}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000003c0)="ffeefc2d2db8218b0f4888ae7c62c3efcb955d2aaa9aa04863dce6e3c44cec26e9cc9d838f93ecd6b9bd83f40efd7fccfce059f3497497a77ad504dc9a7beb692b87bf1e52293544a6495c4635e24e2eb040c25e99353564bbe56e7078ccac7c8ec922bce8a9db768f2d188522c1647b55602b7470c0e0acd54cc23dde6539c412338056da3a87fc3138b1721c230da5a13944991863e75ae41a0e22958e4069a4c4a0e83f109d4369fc183e0a737fa397aa3f508e1912b492d95e7007b849d8e1e542908e9703c26c268bf09ec8e400f46300fbf85459a304be04d85c6a85a6c702ba4a156d2af43b9760161365ef63bf5de0f3b171c6b8eb86b0959539784a") 09:01:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x200000, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') setsockopt$inet6_int(r0, 0x29, 0x100000000004a, &(0x7f00000000c0)=0x400, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x100, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000180)=""/189) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3f, 0x400) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000000)={'bpq0\x00', 0x8}) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 09:01:12 executing program 4: r0 = socket(0x6000800000000010, 0x3, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x5, 0x7, 0x8, "841c4114f04901f1fd87c3f7aece8930c578fa2d9443ffa3cc8ed6a547b23cbd9288c54cccecfa4f767f2f4c47bee3f6c6eb55866bae58551e12fe41cbd679e4", "108d60e7d7650674bfa7dc2464e2bbd770c21fe45353d72b5b3eee292925130d", [0x1, 0x1]}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) write(r0, &(0x7f0000000100)="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", 0xfc) 09:01:12 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000080)={0x0, 0x10001, 0x0, &(0x7f0000000040)=0x401}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x2c0, 0xffffffffffffffff}}]}, &(0x7f00000001c0)=0x10) shutdown(r1, 0x2000000000000002) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2}, &(0x7f0000000200)=0x8) [ 293.505130] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 293.512710] netlink: 188 bytes leftover after parsing attributes in process `syz-executor4'. 09:01:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x400200, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000180)={0x7, 0x7b, 0x2}, 0x7) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000140)={0x1ff, 0xa4}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x9}, &(0x7f0000000080)=0x8) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000001c0)={0x3206, 0x7c1, 0x8, 0x6, 0x401, 0x4}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000000c0)={r4, 0x401, 0x30}, 0xc) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000007500)=@hci, 0x80, &(0x7f00000006c0)=[{&(0x7f00000003c0)="dd7cf07b", 0x4}], 0x1, &(0x7f00000076c0)}}], 0x1, 0x0) 09:01:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000009280)=[{{&(0x7f0000007d00)=@nfc, 0x80, &(0x7f0000009100)=[{&(0x7f0000007d80)=""/185, 0xb9}, {&(0x7f0000007e40)=""/237, 0xed}, {&(0x7f0000007f40)=""/179, 0xb3}, {&(0x7f0000008000)=""/50, 0x32}, {&(0x7f0000008040)=""/4096, 0x1000}, {&(0x7f0000009040)=""/40, 0x28}], 0x6, &(0x7f0000009180)=""/221, 0xdd}}], 0x1, 0x0, &(0x7f0000009480)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x800) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfd4a, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:01:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x400000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="0f4a"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:01:12 executing program 4: r0 = socket(0x6000800000000010, 0x3, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1000, 0x5, 0x7, 0x8, "841c4114f04901f1fd87c3f7aece8930c578fa2d9443ffa3cc8ed6a547b23cbd9288c54cccecfa4f767f2f4c47bee3f6c6eb55866bae58551e12fe41cbd679e4", "108d60e7d7650674bfa7dc2464e2bbd770c21fe45353d72b5b3eee292925130d", [0x1, 0x1]}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) write(r0, &(0x7f0000000100)="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", 0xfc) [ 293.859406] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:01:13 executing program 3: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000300)=""/155) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000200)={0x0, r4+10000000}, &(0x7f0000000240), 0x8) ioctl$KDDISABIO(r0, 0x4b37) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000704000)) dup2(r1, r2) [ 294.063078] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 294.070656] netlink: 188 bytes leftover after parsing attributes in process `syz-executor4'. 09:01:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000ff0)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10) 09:01:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000040)="a5ab0fc75dc566b9b10100000f32b899000f00d0b857000f00d00f005d990f01df1bd9670fc79d06000000", 0x2b}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)={0x7}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000080)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x80050002, 0x0, 0x0, 0xff}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000700)) 09:01:13 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000c00)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d40)=0xe8) getgroups(0x2, &(0x7f0000000d80)=[0xffffffffffffffff, 0xee00]) getpid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001280)={{{@in6, @in6=@dev}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001380)=0xe8) getresgid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001480)={{{@in=@local, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) stat(&(0x7f00000015c0)='./bus\x00', &(0x7f0000001600)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc) stat(&(0x7f0000001700)='./bus\x00', &(0x7f0000001740)) sendmmsg$unix(r0, &(0x7f0000001840)=[{&(0x7f0000000e00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001200)=[{&(0x7f0000001100)="f091b2e8d3b73aa994d9bd4c8f13bc0af2496cab2f1952a32009aac0157379d906695a5324ead8a792838b46909d57167aaec03111898c768c4cb30d6cd5e1c5c17314072811f62940d400b0864091813bc43273668a35a5eed8593d7bfa64c51cf6a638e1b009ff606b90720364f26ff5c5763de49a710e90b9668514234240b65b00c72385b1459e290d47dcf921a4b43c3bfb9bb9a4c34279785923803bb2829838a6da53ae6f60f3ad647e9183299546c5cc219f8a5892f350944bf8b9ae00ee750bfb31b559e0932b68ec0761109b62c87f", 0xd4}], 0x1, &(0x7f0000000540)=ANY=[], 0x0, 0x4000000}], 0x1, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)=0x8ad) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x800000000a, &(0x7f00007b1000)=0x81, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080)=0x412, 0x4) setsockopt$inet6_int(r3, 0x29, 0x35, &(0x7f00000003c0)=0x6, 0x4) setns(r1, 0x20020000) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'nr0\x00', 0x4001}) ioctl$int_in(r3, 0x5452, &(0x7f0000000380)=0x6) ioctl$int_out(r3, 0x0, &(0x7f00000000c0)) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 09:01:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r1) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 09:01:13 executing program 2: r0 = socket$inet6(0xa, 0x2000080003, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x0, 0xc) sendfile(r0, r1, &(0x7f0000000040), 0x402) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000001c0)="240000000105075f1dfbfd946fa2830020200a0009000300001d85680c1ba3a20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) [ 294.492662] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 294.543700] input: syz1 as /devices/virtual/input/input5 09:01:13 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x183840, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x100d}}, 0x20) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x81) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0x2}}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x7530}) [ 294.621735] input: syz1 as /devices/virtual/input/input7 09:01:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setstatus(r1, 0x4, 0x400) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80, 0x2}, 'port0\x00', 0x94, 0x4}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x280}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000080)={{}, {0x80}}) 09:01:14 executing program 2: r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$GETALL(r0, 0x0, 0xd, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="6b4704452f61509b61bc0f957377a334276884c9ad6919c30113c6ea8ddecbb4450eb73c075f61fe69153c2756d1098f", 0x30, 0xfffffffffffffffc) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x7fffffff}, 0x28, 0x2) keyctl$instantiate(0xc, r1, &(0x7f0000000080)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'vmnet0', 0x20, 0x9}, 0x31, r2) 09:01:14 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000001000/0x10000)=nil, 0x10000) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) 09:01:14 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) accept$inet6(r0, 0x0, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xffff}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x2005}, 0x1c) 09:01:14 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100c0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140), 0xfffffffffffffd10) 09:01:14 executing program 5: clone(0xa000000000041fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ptrace(0x10, r0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@loopback, @mcast1, @remote, 0x4, 0xfff, 0x7fff, 0x500, 0x1, 0x10000, r2}) ptrace$poke(0x4, r0, &(0x7f0000000000), 0x0) 09:01:14 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000001000/0x10000)=nil, 0x10000) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) 09:01:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7fff, 0x101000) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) geteuid() ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @remote}], 0x10) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000005fdb)="240000001800030307fffd946fa200001c140000feffffff031d8568791ba3a2d188527e", 0x24}], 0x1}, 0x0) 09:01:14 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000040)) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00006f7000), &(0x7f0000000000), 0x4000) futex(&(0x7f000000cffc), 0x1, 0x5, &(0x7f00000017c0), &(0x7f0000000080), 0x0) 09:01:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x7}) poll(&(0x7f0000000000)=[{r2}], 0x1, 0x0) [ 295.632339] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 09:01:14 executing program 1: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) unshare(0x40600) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r0 = epoll_create1(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000500), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000cd8ff4)) r3 = epoll_create1(0x0) dup2(r2, r0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000007000)) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)={0x607}, &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) [ 295.704025] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 09:01:14 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000001000/0x10000)=nil, 0x10000) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) 09:01:15 executing program 1: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xfffffffffffffdc2}}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x11}}}, 0x3ff, 0x8, 0x9, 0x7, 0x20}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)={r1, 0x0, 0xf3, "5ac12419696e8d37ca83c20b3f33fb9d0f7ef538db37eb1b01bdcc1bd6776d5669a4cce8b349acfd0d20da0d00fccf19be5042ab3db409af0b1eca9873c705de205079ae139c91a511e33b0f74767e5277d6a07726bb4c2a54471aec3c87cd089967d751a7ed1be891e71bfb297f817e8f4ecadfe155cb74a7202fae013f5a3217d037963ed8db1b27277c95f9e854ace9b8c72cb0dfd6f565df26a65d8d150f966736174c496b0accf96152b7886bed9c7fac0afd69a4897f5f1011e22fa577c54fc9b30401a413aab451a3a161b96af46f6fab2eb4aff9ca4f876e37183c5d5ff92136329254a311eafad21c80475b70bb41"}, 0xfb) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)={0x2, 0xb, 0x0, 0x0, 0x2}, 0x10}}, 0x840) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) r3 = socket$key(0xf, 0x3, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000080)=0x1e, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000000000400000000000000000000000000000900000004000400170000001f000000000700003f00000000000000030000000000120002000b00050000000100000000000000"], 0x88}}, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffffc, 0x4200) sendmmsg(r3, &(0x7f0000000180), 0x400000000000117, 0x0) 09:01:15 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7fff, 0x101000) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) geteuid() ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @remote}], 0x10) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000005fdb)="240000001800030307fffd946fa200001c140000feffffff031d8568791ba3a2d188527e", 0x24}], 0x1}, 0x0) 09:01:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000000c0)=""/243) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x2c0, 0xffffffffffffffff}}]}, &(0x7f00000001c0)=0x10) shutdown(r0, 0x2000000000000002) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, r2}, &(0x7f0000000080)=0x20) 09:01:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f00000000c0)={0x764d, 0x100002}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x480100, 0x0) uselib(&(0x7f0000000080)='.\x00') ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x4, 0x7, 0x3f]}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x8000}) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000340)="643e67660f3a61ca9bbaf80c66b8bc5d158866efbafc0c66ed66b9800000c00f326635001000000f30f40f38c94bf80f380b5775260f01ca0f21360f180ad810", 0x40}], 0x2d3, 0xfffffffffffffffc, &(0x7f0000000280), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:01:15 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000001000/0x10000)=nil, 0x10000) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) [ 296.251662] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 09:01:15 executing program 5: capget(&(0x7f0000000500)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000540)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-'}, 0x28, 0x1) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) accept4$unix(r0, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x43, "411d3d0c65eb8eb3d6745724986da4a697f0dc5d51b0c3335c101f41a040e7c70985022492a1f4944eee2e943f31c4ed808f33e61d41441aa5d884eb15ea7c9ecf0bff"}, &(0x7f0000000280)=0x4b) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x7, "294f0d8c4a3bf9"}, &(0x7f0000000140)=0xf) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x3, 0x2, 0x0, 0x8001, r2}, &(0x7f00000001c0)=0x10) 09:01:15 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000001000/0x10000)=nil, 0x10000) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) 09:01:15 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x105080, 0x8) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(pcrypt(rfc4543(gcm(camellia-asm))))\x00'}, 0x58) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(r1, 0x800454cf, 0x70f000) 09:01:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800100000003) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000b00)={0x4, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000008c00000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x110) 09:01:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000000000010000000000ff0000000a0000000000000000000000040024000000000000000000"], 0x28}}, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000100)=""/92) 09:01:15 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) 09:01:16 executing program 5: capget(&(0x7f0000000500)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000540)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-'}, 0x28, 0x1) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) accept4$unix(r0, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x43, "411d3d0c65eb8eb3d6745724986da4a697f0dc5d51b0c3335c101f41a040e7c70985022492a1f4944eee2e943f31c4ed808f33e61d41441aa5d884eb15ea7c9ecf0bff"}, &(0x7f0000000280)=0x4b) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x7, "294f0d8c4a3bf9"}, &(0x7f0000000140)=0xf) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x3, 0x2, 0x0, 0x8001, r2}, &(0x7f00000001c0)=0x10) 09:01:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) recvmmsg(r1, &(0x7f0000000a80), 0x0, 0x0, &(0x7f0000000b40)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x7e8e18f5, 0x6, "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", 0x2a, 0xffffffff, 0x800, 0x9, 0x7fffffff, 0x7fffffff, 0x3, 0x1}, r2}}, 0x120) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000300)=0x1000) 09:01:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000240)={0x6, 0xab, [{0x2f6, 0x0, 0x80000000}, {0x1, 0x0, 0x9}, {0x1, 0x0, 0x800}, {0xffffffff, 0x0, 0x81}, {0x6, 0x0, 0xc277}, {0x1f, 0x0, 0xffffffffffffff7f}]}) getsockname(r0, &(0x7f00000001c0)=@xdp, &(0x7f0000000000)=0x80) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) creat(&(0x7f0000000180)='./control/file0\x00', 0xffffffffffffffff) 09:01:16 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) unshare(0x2000400) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f0000000000)=""/82, &(0x7f0000000080)=0x52) unshare(0x2040600) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 09:01:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) mq_open(&(0x7f0000000100)='cgroupposix_acl_access&vboxnet1selinux{,^{ppp1\'-@[\x00', 0x40, 0x4, &(0x7f0000000180)={0x3, 0xffffffff, 0x8, 0x200, 0x5, 0x1, 0x6, 0x400}) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, &(0x7f0000000a40), 0x0, &(0x7f0000000140)=[@assoc={0x18}], 0x28}], 0x1, 0x0) r2 = memfd_create(&(0x7f0000000000)='aead\x00', 0x2) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') set_thread_area(&(0x7f00000001c0)={0xc6, 0x30b380246a8341b6, 0x2000, 0x1ff, 0x80, 0x694f3ba2, 0xac, 0x0, 0x2, 0x7}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000200)={@remote, 0x0}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000600)=0xe8) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000007c0)={&(0x7f0000000640)={0x158, r3, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0xf8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x61}}}]}}]}, 0x158}, 0x1, 0x0, 0x0, 0x80c0}, 0x8010) 09:01:16 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) [ 297.301617] Unknown ioctl 20998 09:01:16 executing program 5: capget(&(0x7f0000000500)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000540)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-'}, 0x28, 0x1) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) accept4$unix(r0, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x43, "411d3d0c65eb8eb3d6745724986da4a697f0dc5d51b0c3335c101f41a040e7c70985022492a1f4944eee2e943f31c4ed808f33e61d41441aa5d884eb15ea7c9ecf0bff"}, &(0x7f0000000280)=0x4b) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x7, "294f0d8c4a3bf9"}, &(0x7f0000000140)=0xf) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x3, 0x2, 0x0, 0x8001, r2}, &(0x7f00000001c0)=0x10) [ 297.404349] Unknown ioctl 20998 09:01:16 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x13) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) 09:01:16 executing program 2: unshare(0x2000400) r0 = socket(0x1c, 0x800, 0x200) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x1d, "575cbc14f1f91b395d13b9535639727bf9d8713702101cb6ab82a9021d"}, &(0x7f0000000080)=0x25) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000100)={0x0, 0x0, 0x1009980}, 0xc) 09:01:16 executing program 1: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000005c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f0000000380)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)="72616d667300d971abaf50e501000000923627a5744cd7d1b96b8d4618e24e36049b5844a75fe6f6d4200b96b0749fdd17fc0d8c51663f69b78999dff00ad5d5f2a5940579d3189bfa01a1fe357cacc04a77d5ebfe32e5b27547a1e8d9069f53814969fc451b9223e747c9d972a8c2fb93bb23f6a8a43261fa33fcbfbe5071cf48002b25fabc803bd3e52cc10a1bce00c7e3bf430fb3422b8a3219edd913fce89d56b7f1df27a46c63aacd69c9a1184731ca152e528709dfe5f7cdd5f5a8784c82896cc9a067073488f4fd1d3ec0c3aff2685fcfd3e22bd62311fb2779727bf10fa24555", 0x0, &(0x7f00000003c0)="76626f786e6574313a706f7369785f61636c5f6163636573736c6f2f657468306e6f64657617296e6f6465764073656375726974793a73797374656d2c776c616e3100") poll(&(0x7f0000000080), 0x0, 0x400007f) rmdir(&(0x7f0000000240)='./file0\x00') 09:01:16 executing program 5: capget(&(0x7f0000000500)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000540)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-'}, 0x28, 0x1) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) accept4$unix(r0, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x800) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x43, "411d3d0c65eb8eb3d6745724986da4a697f0dc5d51b0c3335c101f41a040e7c70985022492a1f4944eee2e943f31c4ed808f33e61d41441aa5d884eb15ea7c9ecf0bff"}, &(0x7f0000000280)=0x4b) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0xfff}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x7, "294f0d8c4a3bf9"}, &(0x7f0000000140)=0xf) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x3, 0x2, 0x0, 0x8001, r2}, &(0x7f00000001c0)=0x10) 09:01:16 executing program 0: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "03000009d0010100000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) 09:01:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) rt_sigreturn() r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x300, r0, &(0x7f00000001c0)={0x8000000b0002003}) [ 298.066710] PANIC: double fault, error_code: 0x0 [ 298.071579] CPU: 0 PID: 8872 Comm: syz-executor4 Not tainted 4.19.0+ #82 [ 298.072118] ================================================================== [ 298.072118] BUG: KMSAN: uninit-value in irq_work_claim+0x153/0x390 [ 298.072118] CPU: 0 PID: 8872 Comm: syz-executor4 Not tainted 4.19.0+ #82 [ 298.072118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.072118] Call Trace: [ 298.072118] <#DF> [ 298.072118] dump_stack+0x32d/0x480 [ 298.072118] ? irq_work_claim+0x153/0x390 [ 298.072118] kmsan_report+0x19f/0x300 [ 298.072118] kmsan_internal_check_memory+0x35f/0x450 [ 298.072118] ? __msan_poison_alloca+0x1e0/0x2b0 [ 298.072118] kmsan_check_memory+0xd/0x10 [ 298.072118] irq_work_claim+0x153/0x390 [ 298.072118] irq_work_queue+0x44/0x280 [ 298.072118] vprintk_emit+0x693/0x790 [ 298.072118] vprintk_default+0x90/0xa0 [ 298.154262] vprintk_func+0x26b/0x2a0 [ 298.154262] printk+0x1a3/0x1f0 [ 298.154262] dump_stack_print_info+0x2c4/0x3c0 [ 298.162802] show_regs_print_info+0x37/0x40 [ 298.162802] show_regs+0x38/0x170 [ 298.162802] df_debug+0x86/0xb0 [ 298.162802] do_double_fault+0x362/0x480 [ 298.162802] double_fault+0x1e/0x30 [ 298.162802] RIP: 0010:kmsan_get_origin_address+0xa/0x370 [ 298.162802] Code: eb fe 0f 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 <41> 54 53 48 83 ec 10 48 89 75 c8 48 89 fb 49 bc 00 00 00 00 00 78 [ 298.162802] RSP: 0018:fffffe0000002000 EFLAGS: 00010086 09:01:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000110007031dfffd946fa2830020200a0008000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x10b}, 0x0) 09:01:17 executing program 0: clone(0xa0004500, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='comm\x00') pselect6(0x40, &(0x7f0000000200), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5}, &(0x7f0000000140)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) sendfile(r0, r0, &(0x7f0000000180), 0x3) [ 298.162802] RAX: 00000000000001a8 RBX: 0000000000000000 RCX: 0000000000000001 [ 298.222069] RDX: 0000000000000001 RSI: 0000000000000088 RDI: fffffe0000002150 [ 298.222544] RBP: fffffe0000002018 R08: 0000000000000000 R09: 0000000000000000 [ 298.222544] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000088 [ 298.222544] R13: fffffe00000021c0 R14: fffffe00000021a8 R15: fffffe00000021a8 [ 298.222544] [ 298.222544] [ 298.222544] kmsan_memmove_origins+0xbd/0x1d0 [ 298.222544] ? kmsan_memmove_shadow+0xad/0xe0 09:01:17 executing program 3: madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000001000/0x10000)=nil, 0x10000) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) [ 298.222544] __msan_memmove+0x6c/0x80 [ 298.222544] fixup_bad_iret+0x9b/0x130 [ 298.222544] error_entry+0xad/0xc0 [ 298.222544] RIP: 0000: (null) [ 298.222544] Code: Bad RIP value. [ 298.222544] RSP: a3fb7f:00007f15a3cc79c0 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 298.292077] RAX: 0000000000000000 RBX: ffffffff8ae00e58 RCX: 000000000040393c [ 298.296570] RDX: df8c693ea0458900 RSI: 0000000000000000 RDI: 0000000000000000 [ 298.296570] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000072bf08 [ 298.296570] R10: 000000000072bf00 R11: 000000000072bf0c R12: 0000000000000000 [ 298.296570] R13: 000000000072bf08 R14: 000000000072bf00 R15: 000000000072bf0c [ 298.296570] ? general_protection+0x8/0x30 [ 298.296570] ? general_protection+0x8/0x30 [ 298.296570] [ 298.296570] [ 298.296570] Local variable description: ----__ai_ptr@irq_work_claim [ 298.296570] Variable was created at: [ 298.296570] irq_work_claim+0x4b/0x390 [ 298.296570] irq_work_queue+0x44/0x280 [ 298.296570] [ 298.296570] Byte 7 of 8 is uninitialized [ 298.362801] Memory access of size 8 starts at fffffe000000aa38 [ 298.362801] ================================================================== [ 298.362801] Disabling lock debugging due to kernel taint [ 298.362801] Kernel panic - not syncing: panic_on_warn set ... [ 298.362801] [ 298.362801] CPU: 0 PID: 8872 Comm: syz-executor4 Tainted: G B 4.19.0+ #82 [ 298.362801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.362801] Call Trace: [ 298.362801] <#DF> [ 298.362801] dump_stack+0x32d/0x480 [ 298.362801] panic+0x57e/0xb28 [ 298.362801] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 298.362801] kmsan_report+0x300/0x300 [ 298.362801] kmsan_internal_check_memory+0x35f/0x450 [ 298.432077] ? __msan_poison_alloca+0x1e0/0x2b0 [ 298.432077] kmsan_check_memory+0xd/0x10 [ 298.432077] irq_work_claim+0x153/0x390 [ 298.448163] irq_work_queue+0x44/0x280 [ 298.448163] vprintk_emit+0x693/0x790 [ 298.448163] vprintk_default+0x90/0xa0 [ 298.458036] vprintk_func+0x26b/0x2a0 [ 298.458036] printk+0x1a3/0x1f0 [ 298.458036] dump_stack_print_info+0x2c4/0x3c0 [ 298.458036] show_regs_print_info+0x37/0x40 [ 298.458036] show_regs+0x38/0x170 [ 298.458036] df_debug+0x86/0xb0 [ 298.458036] do_double_fault+0x362/0x480 [ 298.458036] double_fault+0x1e/0x30 [ 298.458036] RIP: 0010:kmsan_get_origin_address+0xa/0x370 [ 298.458036] Code: eb fe 0f 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 <41> 54 53 48 83 ec 10 48 89 75 c8 48 89 fb 49 bc 00 00 00 00 00 78 09:01:17 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x42000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x46, &(0x7f00008bbfba)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "24a589", 0x0, '~9\f'}}}}}}}, &(0x7f0000775000)) [ 298.502082] RSP: 0018:fffffe0000002000 EFLAGS: 00010086 [ 298.502082] RAX: 00000000000001a8 RBX: 0000000000000000 RCX: 0000000000000001 [ 298.502082] RDX: 0000000000000001 RSI: 0000000000000088 RDI: fffffe0000002150 [ 298.502082] RBP: fffffe0000002018 R08: 0000000000000000 R09: 0000000000000000 [ 298.502082] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000088 [ 298.502082] R13: fffffe00000021c0 R14: fffffe00000021a8 R15: fffffe00000021a8 [ 298.556236] [ 298.556236] [ 298.556236] kmsan_memmove_origins+0xbd/0x1d0 [ 298.556236] ? kmsan_memmove_shadow+0xad/0xe0 [ 298.556236] __msan_memmove+0x6c/0x80 [ 298.556236] fixup_bad_iret+0x9b/0x130 [ 298.556236] error_entry+0xad/0xc0 [ 298.556236] RIP: 0000: (null) [ 298.556236] Code: Bad RIP value. [ 298.556236] RSP: a3fb7f:00007f15a3cc79c0 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 298.556236] RAX: 0000000000000000 RBX: ffffffff8ae00e58 RCX: 000000000040393c [ 298.556236] RDX: df8c693ea0458900 RSI: 0000000000000000 RDI: 0000000000000000 [ 298.556236] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000072bf08 [ 298.556236] R10: 000000000072bf00 R11: 000000000072bf0c R12: 0000000000000000 [ 298.556236] R13: 000000000072bf08 R14: 000000000072bf00 R15: 000000000072bf0c [ 298.556236] ? general_protection+0x8/0x30 [ 298.556236] ? general_protection+0x8/0x30 [ 298.556236] [ 298.556236] Kernel Offset: disabled [ 298.556236] Rebooting in 86400 seconds..