[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.758089][ T26] audit: type=1800 audit(1569719083.248:25): pid=8653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.780406][ T26] audit: type=1800 audit(1569719083.248:26): pid=8653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.827808][ T26] audit: type=1800 audit(1569719083.248:27): pid=8653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.3' (ECDSA) to the list of known hosts. 2019/09/29 01:04:54 fuzzer started 2019/09/29 01:04:56 dialing manager at 10.128.0.26:37075 2019/09/29 01:05:02 syscalls: 2496 2019/09/29 01:05:02 code coverage: enabled 2019/09/29 01:05:02 comparison tracing: enabled 2019/09/29 01:05:02 extra coverage: extra coverage is not supported by the kernel 2019/09/29 01:05:02 setuid sandbox: enabled 2019/09/29 01:05:02 namespace sandbox: enabled 2019/09/29 01:05:02 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/29 01:05:02 fault injection: enabled 2019/09/29 01:05:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/29 01:05:02 net packet injection: enabled 2019/09/29 01:05:02 net device setup: enabled 01:06:37 executing program 0: syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x46a}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000040)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40000000000600b, 0x0) 01:06:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x40000) socket(0x10, 0x400000000080803, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'nlmon0\x00', {0x2, 0x4e23, @multicast2}}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = getegid() setresgid(r1, 0xee00, 0x0) syzkaller login: [ 172.654208][ T8819] IPVS: ftp: loaded support on port[0] = 21 [ 172.772054][ T8821] IPVS: ftp: loaded support on port[0] = 21 01:06:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f9c5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_int(r0, 0x29, 0x49, 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) [ 172.884582][ T8819] chnl_net:caif_netlink_parms(): no params data found [ 172.972532][ T8819] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.989833][ T8819] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.998471][ T8819] device bridge_slave_0 entered promiscuous mode [ 173.024656][ T8819] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.031953][ T8819] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.040879][ T8819] device bridge_slave_1 entered promiscuous mode [ 173.081893][ T8825] IPVS: ftp: loaded support on port[0] = 21 [ 173.117620][ T8819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 01:06:38 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x12a}], 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 173.146950][ T8819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.175139][ T8821] chnl_net:caif_netlink_parms(): no params data found [ 173.214888][ T8819] team0: Port device team_slave_0 added [ 173.234104][ T8819] team0: Port device team_slave_1 added 01:06:38 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, 0x0, 0xc100) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000480)="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", 0xfdef}], 0x1) [ 173.392818][ T8819] device hsr_slave_0 entered promiscuous mode [ 173.430720][ T8819] device hsr_slave_1 entered promiscuous mode [ 173.492999][ T8821] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.502573][ T8821] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.522053][ T8821] device bridge_slave_0 entered promiscuous mode [ 173.563496][ T8819] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.570976][ T8819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.579167][ T8819] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.586374][ T8819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.600781][ T8828] IPVS: ftp: loaded support on port[0] = 21 [ 173.648192][ T8821] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.658099][ T8821] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.666982][ T8821] device bridge_slave_1 entered promiscuous mode 01:06:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) bind$packet(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 173.737354][ T8821] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.766859][ T8821] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.783382][ T8832] IPVS: ftp: loaded support on port[0] = 21 [ 173.794926][ T8825] chnl_net:caif_netlink_parms(): no params data found [ 173.843038][ T8821] team0: Port device team_slave_0 added [ 173.864482][ T8821] team0: Port device team_slave_1 added [ 173.943038][ T8821] device hsr_slave_0 entered promiscuous mode [ 174.000053][ T8821] device hsr_slave_1 entered promiscuous mode [ 174.069736][ T8821] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.098795][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.118406][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.147413][ T8834] IPVS: ftp: loaded support on port[0] = 21 [ 174.193048][ T8825] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.200470][ T8825] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.208503][ T8825] device bridge_slave_0 entered promiscuous mode [ 174.218930][ T8825] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.226648][ T8825] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.235431][ T8825] device bridge_slave_1 entered promiscuous mode [ 174.254397][ T8819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.295771][ T8825] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.308165][ T8825] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.386868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.397270][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.407159][ T8825] team0: Port device team_slave_0 added [ 174.450504][ T8825] team0: Port device team_slave_1 added [ 174.457502][ T8819] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.502443][ T8828] chnl_net:caif_netlink_parms(): no params data found [ 174.521536][ T8832] chnl_net:caif_netlink_parms(): no params data found [ 174.541802][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.551044][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.559719][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.567933][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.612792][ T8825] device hsr_slave_0 entered promiscuous mode [ 174.669973][ T8825] device hsr_slave_1 entered promiscuous mode [ 174.729724][ T8825] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.766097][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.775243][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.784252][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.791518][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.820184][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.828931][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.840819][ T8828] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.848073][ T8828] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.856872][ T8828] device bridge_slave_0 entered promiscuous mode [ 174.866157][ T8828] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.873999][ T8828] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.882398][ T8828] device bridge_slave_1 entered promiscuous mode [ 174.938781][ T8828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.949738][ T8832] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.956860][ T8832] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.965010][ T8832] device bridge_slave_0 entered promiscuous mode [ 174.975951][ T8832] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.983690][ T8832] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.993336][ T8832] device bridge_slave_1 entered promiscuous mode [ 175.000764][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.014691][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.023904][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.033591][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.042376][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.063651][ T8828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.095848][ T8819] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 175.106595][ T8819] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.145235][ T8828] team0: Port device team_slave_0 added [ 175.156119][ T8828] team0: Port device team_slave_1 added [ 175.163461][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.172755][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.181816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.190458][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.200163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.211707][ T8821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.220953][ T8832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.234814][ T8832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.248070][ T8834] chnl_net:caif_netlink_parms(): no params data found [ 175.315441][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.323565][ T8834] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.332270][ T8834] device bridge_slave_0 entered promiscuous mode [ 175.342804][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.352566][ T8834] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.362755][ T8834] device bridge_slave_1 entered promiscuous mode [ 175.380350][ T8832] team0: Port device team_slave_0 added [ 175.398429][ T8819] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.407485][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.421692][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.434243][ T8821] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.473711][ T8828] device hsr_slave_0 entered promiscuous mode [ 175.530125][ T8828] device hsr_slave_1 entered promiscuous mode [ 175.569812][ T8828] debugfs: Directory 'hsr0' with parent '/' already present! [ 175.579753][ T8832] team0: Port device team_slave_1 added [ 175.586892][ T8834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.605074][ T8834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.648504][ T8825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.659376][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.668295][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.677827][ T8835] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.684961][ T8835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.751490][ T8832] device hsr_slave_0 entered promiscuous mode [ 175.790270][ T8832] device hsr_slave_1 entered promiscuous mode [ 175.829802][ T8832] debugfs: Directory 'hsr0' with parent '/' already present! [ 175.840506][ T8834] team0: Port device team_slave_0 added [ 175.850467][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.859210][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.868377][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.884274][ T8835] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.891593][ T8835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.900274][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.908996][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.948060][ T8821] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 175.993726][ T8821] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.020410][ T8834] team0: Port device team_slave_1 added [ 176.039035][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.057428][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.068589][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.084899][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.096837][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.114424][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.127246][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.143018][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.152912][ C0] hrtimer: interrupt took 28028 ns [ 176.170066][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.178064][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.217713][ T8825] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.247255][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.259122][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.298025][ T8821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.352363][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.362798][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.381694][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.388802][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.404629][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.415748][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.430934][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.438022][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state 01:06:42 executing program 0: syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x46a}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000040)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40000000000600b, 0x0) [ 176.453586][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.464914][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.478084][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.544608][ T8834] device hsr_slave_0 entered promiscuous mode [ 176.610929][ T8834] device hsr_slave_1 entered promiscuous mode [ 176.670559][ T8834] debugfs: Directory 'hsr0' with parent '/' already present! [ 176.682071][ T8828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.730551][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.757469][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.777314][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.787378][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.824397][ T8832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.845555][ T8825] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 176.864357][ T8825] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.888185][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.905655][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.927720][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.946286][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.956383][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.982783][ T8828] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.015464][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.024961][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.040477][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.075938][ T8825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.109929][ T8832] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.130026][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.138232][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.152213][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.168476][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.198744][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.206177][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.221461][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.234800][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.246275][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.253457][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.310174][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.320601][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.348058][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.384481][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 01:06:42 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) [ 177.427649][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.457013][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.490899][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.502567][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.511751][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.520495][ T3010] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.527606][ T3010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.535546][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.544590][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.553432][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.560716][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.568947][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 01:06:43 executing program 0: [ 177.585571][ T8828] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 177.600188][ T8828] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 177.624857][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.636807][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.645872][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.654940][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.663805][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.673219][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.682241][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:06:43 executing program 0: [ 177.692671][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.702599][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.711283][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.720501][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.766109][ T8832] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 177.785199][ T8832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 177.797310][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:06:43 executing program 0: [ 177.826224][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.858737][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 01:06:43 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) [ 177.892352][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.909655][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 01:06:43 executing program 0: [ 177.941365][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.954285][ T8885] ptrace attach of "/root/syz-executor.2"[8884] was attempted by "/root/syz-executor.2"[8885] [ 177.962225][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.034606][ T8828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 178.083823][ T8834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.123728][ T8832] 8021q: adding VLAN 0 to HW filter on device batadv0 01:06:43 executing program 0: [ 178.157568][ T8834] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.225800][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.238287][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.288447][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.324411][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.348908][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.356109][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 01:06:43 executing program 2: [ 178.396029][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.407402][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.416449][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.423712][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.481895][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.491660][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.500693][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.517081][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.526522][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.546913][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.562689][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.574314][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.584709][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.593669][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.602444][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.615720][ T8834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.624821][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.651334][ T8834] 8021q: adding VLAN 0 to HW filter on device batadv0 01:06:44 executing program 3: [ 178.749356][ T8917] ptrace attach of "/root/syz-executor.3"[8916] was attempted by "/root/syz-executor.3"[8917] 01:06:44 executing program 4: 01:06:44 executing program 5: 01:06:44 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:44 executing program 2: 01:06:44 executing program 0: 01:06:44 executing program 3: 01:06:44 executing program 4: 01:06:44 executing program 4: 01:06:44 executing program 0: 01:06:44 executing program 3: 01:06:44 executing program 2: 01:06:44 executing program 5: 01:06:44 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:44 executing program 4: 01:06:44 executing program 0: 01:06:44 executing program 2: 01:06:44 executing program 3: 01:06:44 executing program 5: 01:06:45 executing program 4: 01:06:45 executing program 0: 01:06:45 executing program 2: 01:06:45 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:45 executing program 3: 01:06:45 executing program 5: 01:06:45 executing program 4: 01:06:45 executing program 3: 01:06:45 executing program 0: socket(0x2, 0xc003, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="820201f0ffffffff"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = socket(0x2, 0x2, 0x0) dup2(r0, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) sendmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 01:06:45 executing program 2: 01:06:45 executing program 3: 01:06:45 executing program 4: 01:06:45 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:45 executing program 5: 01:06:45 executing program 5: 01:06:45 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:45 executing program 2: 01:06:45 executing program 0: 01:06:45 executing program 4: 01:06:45 executing program 3: 01:06:45 executing program 5: 01:06:45 executing program 1: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000400)) 01:06:45 executing program 2: 01:06:45 executing program 0: 01:06:45 executing program 4: 01:06:46 executing program 3: 01:06:46 executing program 2: 01:06:46 executing program 5: 01:06:46 executing program 0: 01:06:46 executing program 4: 01:06:46 executing program 1: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000400)) 01:06:46 executing program 2: 01:06:46 executing program 3: 01:06:46 executing program 5: 01:06:46 executing program 4: 01:06:46 executing program 0: 01:06:46 executing program 1: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000400)) 01:06:46 executing program 2: 01:06:46 executing program 0: 01:06:46 executing program 4: 01:06:46 executing program 3: 01:06:46 executing program 5: 01:06:46 executing program 2: 01:06:46 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:46 executing program 3: 01:06:46 executing program 0: syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x46a, 0x8}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x46000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x200005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x803, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(r4, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0xfffffdbf) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000380)={0x1}) dup2(r3, 0xffffffffffffffff) dup2(r3, r1) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000300)=""/66) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40000000000600b, 0x0) 01:06:46 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r0, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) 01:06:46 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x4, 0x0, @remote={0xac, 0x223}, @local}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x8, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}}}}}}, 0x0) 01:06:46 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:47 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @empty}}, 0x0, 0x6, 0x0, "aa6950035b33888ba3eb46d88e503df9a1c959e9e2b850dcdbd5f8fb2648bdac293876227e0a878412fa992319abb7d66505e9f98678fbeb414805ca670cf506a016bd31ed1f34e1c6ff0ea7bd1e00"}, 0xd8) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x109000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x3c, r3, 0x439, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28000400}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x88, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x17}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x40040c5}, 0x8800) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 01:06:47 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000001600)='./bus\x00', 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000000)=0x76c3256c, 0x4) 01:06:47 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:47 executing program 5: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000040)=@framed={{0xffffff85, 0x9800, 0x0, 0x0, 0x11, 0x17, 0x1000000000000}, [@exit]}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = dup3(r1, 0xffffffffffffffff, 0x100000) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) 01:06:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x662000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/222, &(0x7f0000000180)=0xde) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000000)=0x2) dup3(r1, r0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) 01:06:47 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:47 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:47 executing program 0: syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x46a, 0x8}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x46000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x200005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x803, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(r4, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0xfffffdbf) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000380)={0x1}) dup2(r3, 0xffffffffffffffff) dup2(r3, r1) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000300)=""/66) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40000000000600b, 0x0) 01:06:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3a92b15b7816a0ba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000000) close(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000019e, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffef0}, 0xfffffffffffffe73) r2 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x12}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0xa4e61fb5f146caa7) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800008, 0x13, r3, 0x0) r4 = socket$kcm(0x2, 0x1000000000000801, 0x84) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, 0x0, 0xf4) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r6, r5) ioctl$FIBMAP(r5, 0x1, &(0x7f0000000140)=0xc5) 01:06:47 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:47 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 01:06:47 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 01:06:47 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000025c0)) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f00000000c0)=""/91) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r3, &(0x7f0000002580)=[{{&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x7f, @loopback, 0x6}, 0x80, &(0x7f0000002500)=[{&(0x7f0000000100)="8db10121b3b346c3568b38675669f570ebf6", 0x12}, {&(0x7f0000000140)="19b87a80a868d516f17fbc0050389cef710ca523ab4a1c9767920e14f7d9f7723d16cf8bbcedc7e1adf77323ab52396e46f1148ff80e8cf8f4418ba9ee16cbb9516a46636809f78682bb66b1b1ab55e32871216a95f73445a1f09b2c32e6f27132c275fccba24b101b599e732ff3e96a2cf30f257f809f694bdf96e74a12a26fa3aa1a9e60675278c49e553a287f00077af748c958fded0f68eb52b13f3c874eea0be771cd413e29b70c9064ae3c04615bb376a1a7ef17774505bee7d29c1ce8759ab6ab4907ea3b672a316987f16a6118c6dcf35e45ae4241a4f33bea00f2967d7d6d882e1c78b41921299cb333deb91fc004df0c", 0x32b}, {&(0x7f0000000340)="e14a552eb46bd00354d82e8cc64a3b94c9f63699cefb068339465908dd9fbc43c96fbffe1f168d91e70727822ee176b8f6a14e7b81da1251e8189fbc3ecc6bf234dcb62fd650b0630a078db7a738241dd0314aca27962d9cfef36e0db3ca9ca1cab2afc2b0375c21e3e343c4814ccdee4d76088faeb4ba86b36c5bc0c29edf189290863983ea6510c50529bf8c095e73e6ea7d7fab540e2c3aad037d947287b92078ccaacc300868f8a56027716cc505a39f7e5c817f209e9a080af8211bb99f94dd9d3d4a60f162e6a7b3", 0xcb}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000240)="ca83dc5d3d7dbbd8ee0b99fdc7ed2760b24d0672bf412d13aab0", 0x1a}, {&(0x7f0000001440)="b1a722dcfcd9547922542e05acd33b714ba6ae128fc273b0701b2db4bb2059f9491de7aeacded05e7fb44b2b758d9a44ad94bcc49f05359a7ecad4d513de7a36667f14d683e1c34e65129cf39bc709d9545574977a3ee49f49bb4ba13d3e9db0c08e9b6eb44b65033634f3791328b8f4c72ebc2ac540e17aa79c4eb5323c9e67bf59d17461842d72203a52df972af3a6907fa5f6ebfaeabf8c1b18fd7a566a0300"/170, 0xaa}, {&(0x7f0000001500)="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", 0x1000}], 0x7, &(0x7f0000000280)}}], 0x1, 0x4000000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002600)='/dev/loop-control\x00', 0x20000, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r6, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r7 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r7, r6) r8 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x7f, 0x20400) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000002780)={0x9, [0x200, 0x80, 0x4, 0x5, 0x5, 0x1ff, 0x7, 0xd839, 0x2]}, &(0x7f00000028c0)=0x16) socket$netlink(0x10, 0x3, 0x0) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f0000002880)={&(0x7f00000027c0), 0xc, &(0x7f0000002840)={&(0x7f0000002800)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r9, @ANYBLOB="0001080006007f00"/22], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4040) connect(r5, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r10, 0xc04064a0, &(0x7f0000002740)={&(0x7f0000002640)=[0x0, 0x0], &(0x7f0000002680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000026c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002700)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x5, 0x9, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r10, 0x4008af22, &(0x7f00000002c0)={0x4bf2311864c75290, r12}) sendmmsg(r5, &(0x7f0000000140), 0x1236aa6efce153, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') 01:06:48 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 01:06:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3a92b15b7816a0ba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000000) close(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000019e, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffef0}, 0xfffffffffffffe73) r2 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x12}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0xa4e61fb5f146caa7) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800008, 0x13, r3, 0x0) r4 = socket$kcm(0x2, 0x1000000000000801, 0x84) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, 0x0, 0xf4) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r6, r5) ioctl$FIBMAP(r5, 0x1, &(0x7f0000000140)=0xc5) 01:06:48 executing program 3: clone(0xf9224100, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpid() setpgid(r2, 0x0) ptrace$setregs(0xf, r2, 0x9, &(0x7f0000000000)="2e30c07f9f1cca954ad5c5f38fd8f19b8e0d9eeea05b81bd70bdb1bda95d6eea3dbed1d67179f15352f93948b6342857cae734def706b17b176cc7adee52c102bce89e6a130c1a490834cf450e2f9f9a92df7791e8e7b7adcc16059ea5beaee9278fef5cbc4e1cf87912c420a88efc3b5d") r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r4, r3) r5 = dup(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0x9) [ 182.814745][ T9164] IPVS: ftp: loaded support on port[0] = 21 01:06:48 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)={0x0, 0x0, 0xc}, 0x10) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000880)=r1) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x335) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0xfffffffffffffdec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7fd7, 0x200}, 0x12120}, 0x0, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 01:06:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3a92b15b7816a0ba}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000000) close(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000019e, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffef0}, 0xfffffffffffffe73) r2 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x12}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0xa4e61fb5f146caa7) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800008, 0x13, r3, 0x0) r4 = socket$kcm(0x2, 0x1000000000000801, 0x84) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, 0x0, 0xf4) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r6, r5) ioctl$FIBMAP(r5, 0x1, &(0x7f0000000140)=0xc5) 01:06:48 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000400)) 01:06:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 01:06:48 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2c, 0x3, 0x1, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x25, [@typed={0x8, 0x87, @pid=r4}]}, @typed={0xc, 0x49, @u64=0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 01:06:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:48 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x1ff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000011ff0)={0x2, 0x0, @multicast2}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000017000)=0xfffffffb, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x400, 0x20000) symlinkat(&(0x7f0000000100)='./file0/file0\x00', r2, &(0x7f00000001c0)='./file0\x00') bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) llistxattr(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x521) prctl$PR_MCE_KILL(0x21, 0x3, 0x1) 01:06:48 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000400)) 01:06:48 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x530b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) [ 183.470432][ T9189] device nr0 entered promiscuous mode 01:06:49 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) [ 183.967113][ T9189] device nr0 entered promiscuous mode 01:06:49 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:49 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@local, 0x9, 0x0, 0x2, 0x3, 0x4000}, 0x20) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x1) ioctl$TCSETA(r0, 0x89f2, &(0x7f0000000100)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r3 = accept4$rose(r2, &(0x7f0000000000)=@short={0xb, @dev, @rose, 0x1, @bcast}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:06:49 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000400)) 01:06:49 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000000)=@srh={0x89, 0xc, 0x4, 0x6, 0xa8, 0xc, 0xffff, [@mcast2, @local, @rand_addr="ce2c7d7d73a2e6c74e3fa49b9fca4e69", @ipv4={[], [], @remote}, @remote, @remote]}, 0x68) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000406023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 01:06:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x530b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 01:06:49 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x530b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 01:06:49 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) [ 184.290439][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 184.297006][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:06:49 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:49 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:50 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@local, 0x9, 0x0, 0x2, 0x3, 0x4000}, 0x20) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x1) ioctl$TCSETA(r0, 0x89f2, &(0x7f0000000100)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r3 = accept4$rose(r2, &(0x7f0000000000)=@short={0xb, @dev, @rose, 0x1, @bcast}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:06:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x95}, 0x3c) 01:06:50 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:50 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 01:06:50 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x80, 0x19, 0x6, 0x0, 0x5, 0x10, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80, 0x6, @perf_config_ext={0x6, 0x7fffffff}, 0x6cf, 0x7, 0x8001, 0x2, 0x80, 0x6, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2) semget(0x2, 0x4, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d0400b4f4d4f60000030000002272a062b492") 01:06:50 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) fcntl$setlease(r0, 0x400, 0x2) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={@loopback, 0xc, r6}) fcntl$setstatus(r1, 0x4, 0x2400) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 01:06:50 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:50 executing program 5: socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000140)=0x5, 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000100)={0xf, 0x1f, 0x2, 0x2000000000000009}, 0xf) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe7f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 01:06:50 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) 01:06:50 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:51 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={r2}, 0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={r2, 0x5, 0xc4}, 0x8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757372717509006da88a891f05b504b9364c117ce124f8eb810d5d08"]) 01:06:51 executing program 1 (fault-call:2 fault-nth:0): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 01:06:51 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) [ 186.083493][ T9345] FAULT_INJECTION: forcing a failure. [ 186.083493][ T9345] name failslab, interval 1, probability 0, space 0, times 1 [ 186.138973][ T9345] CPU: 0 PID: 9345 Comm: syz-executor.1 Not tainted 5.3.0-next-20190926 #0 [ 186.147614][ T9345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.158395][ T9345] Call Trace: [ 186.158430][ T9345] dump_stack+0x172/0x1f0 [ 186.166054][ T9345] should_fail.cold+0xa/0x15 [ 186.170670][ T9345] ? fault_create_debugfs_attr+0x180/0x180 [ 186.176513][ T9345] ? ___might_sleep+0x163/0x2c0 [ 186.181399][ T9345] __should_failslab+0x121/0x190 [ 186.186359][ T9345] should_failslab+0x9/0x14 [ 186.190877][ T9345] __kmalloc+0x2e0/0x770 [ 186.195165][ T9345] ? mark_held_locks+0xf0/0xf0 [ 186.200116][ T9345] ? mark_lock+0xc2/0x1220 [ 186.204675][ T9345] ? _parse_integer+0x190/0x190 [ 186.209564][ T9345] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 186.215313][ T9345] tomoyo_realpath_from_path+0xcd/0x7b0 [ 186.220884][ T9345] ? tomoyo_path_number_perm+0x193/0x520 [ 186.226549][ T9345] tomoyo_path_number_perm+0x1dd/0x520 [ 186.232826][ T9345] ? tomoyo_path_number_perm+0x193/0x520 [ 186.238492][ T9345] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 186.244316][ T9345] ? __f_unlock_pos+0x19/0x20 [ 186.249057][ T9345] ? __fget+0x384/0x560 [ 186.253242][ T9345] ? ksys_dup3+0x3e0/0x3e0 [ 186.257682][ T9345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 186.263947][ T9345] ? fput_many+0x12c/0x1a0 [ 186.268489][ T9345] tomoyo_file_ioctl+0x23/0x30 [ 186.273405][ T9345] security_file_ioctl+0x77/0xc0 [ 186.278361][ T9345] ksys_ioctl+0x57/0xd0 [ 186.282625][ T9345] __x64_sys_ioctl+0x73/0xb0 [ 186.287238][ T9345] do_syscall_64+0xfa/0x760 [ 186.291905][ T9345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.297919][ T9345] RIP: 0033:0x459a29 [ 186.301828][ T9345] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.322055][ T9345] RSP: 002b:00007fd38c57cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 186.330486][ T9345] RAX: ffffffffffffffda RBX: 00007fd38c57cc90 RCX: 0000000000459a29 [ 186.338485][ T9345] RDX: 0000000020000400 RSI: 000000004008af03 RDI: 0000000000000003 [ 186.346630][ T9345] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 186.354794][ T9345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd38c57d6d4 [ 186.362784][ T9345] R13: 00000000004c4a60 R14: 00000000004d8f70 R15: 0000000000000004 [ 186.399951][ T9353] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:935 [ 186.409627][ T9353] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 9353, name: syz-executor.3 [ 186.419019][ T9353] 2 locks held by syz-executor.3/9353: [ 186.424591][ T9353] #0: ffffffff89999920 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 186.433651][ T9353] #1: ffff8880a1407100 (&(&sch->q.lock)->rlock){+...}, at: sfb_change+0x257/0xe90 [ 186.443061][ T9353] Preemption disabled at: [ 186.443083][ T9353] [] sfb_change+0x257/0xe90 [ 186.458345][ T9353] CPU: 1 PID: 9353 Comm: syz-executor.3 Not tainted 5.3.0-next-20190926 #0 [ 186.467030][ T9353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.477114][ T9353] Call Trace: [ 186.480430][ T9353] dump_stack+0x172/0x1f0 [ 186.485467][ T9353] ? sfb_change+0x257/0xe90 [ 186.490015][ T9353] ___might_sleep.cold+0x1fb/0x23e [ 186.495148][ T9353] __might_sleep+0x95/0x190 [ 186.499672][ T9353] __mutex_lock+0xc5/0x13c0 [ 186.504192][ T9353] ? tcf_chain0_head_change_cb_del.isra.0+0x34/0x3e0 [ 186.510880][ T9353] ? save_stack+0x5c/0x90 [ 186.515227][ T9353] ? save_stack+0x23/0x90 [ 186.519601][ T9353] ? mutex_trylock+0x2d0/0x2d0 [ 186.524382][ T9353] ? fifo_set_limit+0x1a9/0x210 [ 186.529444][ T9353] ? fifo_create_dflt+0x90/0xf0 [ 186.534402][ T9353] ? sfb_change+0x18d/0xe90 [ 186.538937][ T9353] ? tc_modify_qdisc+0xfcf/0x1c50 [ 186.543984][ T9353] ? rtnetlink_rcv_msg+0x463/0xb00 [ 186.549119][ T9353] ? netlink_rcv_skb+0x177/0x450 [ 186.554074][ T9353] ? rtnetlink_rcv+0x1d/0x30 [ 186.558713][ T9353] ? netlink_unicast+0x531/0x710 [ 186.564281][ T9353] ? netlink_sendmsg+0x8a5/0xd60 [ 186.569238][ T9353] ? sock_sendmsg+0xd7/0x130 [ 186.573847][ T9353] ? ___sys_sendmsg+0x803/0x920 [ 186.578732][ T9353] ? __sys_sendmsg+0x105/0x1d0 [ 186.583511][ T9353] ? __x64_sys_sendmsg+0x78/0xb0 [ 186.588465][ T9353] ? do_syscall_64+0xfa/0x760 [ 186.593161][ T9353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.599342][ T9353] ? __kasan_check_read+0x11/0x20 [ 186.604453][ T9353] ? mark_lock+0xc2/0x1220 [ 186.608910][ T9353] mutex_lock_nested+0x16/0x20 [ 186.614390][ T9353] ? mutex_lock_nested+0x16/0x20 [ 186.619535][ T9353] tcf_chain0_head_change_cb_del.isra.0+0x34/0x3e0 [ 186.626051][ T9353] ? __kasan_check_read+0x11/0x20 [ 186.631090][ T9353] ? mark_lock+0xc2/0x1220 [ 186.636487][ T9353] tcf_block_put_ext.part.0+0x2a/0x80 [ 186.641875][ T9353] tcf_block_put+0xbf/0x110 [ 186.646399][ T9353] ? tcf_block_put_ext+0x40/0x40 [ 186.651348][ T9353] ? sfb_destroy+0x80/0x80 [ 186.655779][ T9353] ? sfb_destroy+0x80/0x80 [ 186.660216][ T9353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.666482][ T9353] ? prandom_u32+0x7d/0xb0 [ 186.670993][ T9353] ? sfb_zero_all_buckets+0x20/0x20 [ 186.676319][ T9353] sfb_destroy+0x37/0x80 [ 186.680582][ T9353] qdisc_destroy+0x11f/0x630 [ 186.685199][ T9353] qdisc_put+0x85/0xa0 [ 186.689280][ T9353] sfb_change+0x3d8/0xe90 [ 186.693632][ T9353] ? sfb_graft+0x5f0/0x5f0 [ 186.698075][ T9353] ? nla_strcmp+0xe3/0x120 [ 186.700063][ T9348] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "usrqu " [ 186.702673][ T9353] ? sfb_graft+0x5f0/0x5f0 [ 186.702708][ T9353] tc_modify_qdisc+0xfcf/0x1c50 [ 186.702732][ T9353] ? qdisc_create+0x1210/0x1210 [ 186.727341][ T9353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.734155][ T9353] ? qdisc_create+0x1210/0x1210 [ 186.739037][ T9353] rtnetlink_rcv_msg+0x463/0xb00 [ 186.744025][ T9353] ? rtnl_bridge_getlink+0x910/0x910 [ 186.749336][ T9353] ? netlink_deliver_tap+0x22d/0xbf0 [ 186.754640][ T9353] ? find_held_lock+0x35/0x130 [ 186.759433][ T9353] netlink_rcv_skb+0x177/0x450 [ 186.764340][ T9353] ? rtnl_bridge_getlink+0x910/0x910 [ 186.769655][ T9353] ? netlink_ack+0xb50/0xb50 [ 186.774379][ T9353] ? __kasan_check_read+0x11/0x20 [ 186.779426][ T9353] ? netlink_deliver_tap+0x254/0xbf0 [ 186.784747][ T9353] rtnetlink_rcv+0x1d/0x30 [ 186.789187][ T9353] netlink_unicast+0x531/0x710 [ 186.793973][ T9353] ? netlink_attachskb+0x7c0/0x7c0 01:06:52 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x1, 0x0) connect$x25(r2, &(0x7f00000005c0)={0x9, @remote={[], 0x0}}, 0x12) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000010}, 0x0) connect$rds(r2, &(0x7f0000000600)={0x2, 0x4e24, @local}, 0x10) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)) r3 = syz_open_pts(r1, 0x800) r4 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x4, 0x3, 0x4}) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="00000000edff00008e62906a4e8cc68bdb61a515e292ff5e97"]) ioprio_set$pid(0x2, 0x0, 0x0) r5 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r5, 0x6430) capset(&(0x7f0000000040)={0x0, r4}, 0x0) readv(r3, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0x10}, {&(0x7f0000000280)=""/243}, {&(0x7f00000001c0)=""/20}, {&(0x7f0000000380)=""/124, 0x717000}], 0x2c0) sendto$llc(r5, &(0x7f0000000500)="0e9f9f796774654d3ae0ec27c288e2da4b7374cc8287569dcf91ca54e000346e86ac35d91d86ba72b3eb97eaf59bfc443a4208a0271623efbf15067b2bfb47d7732cda0359d4c7b33c8443d81ed09364d69e3056ee27d5", 0x57, 0x40000, &(0x7f0000000180)={0x1a, 0x3, 0x7, 0xc1, 0x3f, 0x31, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) [ 186.799091][ T9353] ? _copy_from_iter_full+0x25d/0x8c0 [ 186.804496][ T9353] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 186.810233][ T9353] ? __check_object_size+0x3d/0x437 [ 186.815475][ T9353] netlink_sendmsg+0x8a5/0xd60 [ 186.820274][ T9353] ? netlink_unicast+0x710/0x710 [ 186.825269][ T9353] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 186.830938][ T9353] ? apparmor_socket_sendmsg+0x2a/0x30 [ 186.836607][ T9353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.842870][ T9353] ? security_socket_sendmsg+0x8d/0xc0 [ 186.848352][ T9353] ? netlink_unicast+0x710/0x710 [ 186.853337][ T9353] sock_sendmsg+0xd7/0x130 [ 186.857779][ T9353] ___sys_sendmsg+0x803/0x920 [ 186.862507][ T9353] ? copy_msghdr_from_user+0x440/0x440 [ 186.867990][ T9353] ? __kasan_check_read+0x11/0x20 [ 186.873232][ T9353] ? __fget+0x384/0x560 [ 186.877499][ T9353] ? ksys_dup3+0x3e0/0x3e0 [ 186.881943][ T9353] ? __fget_light+0x1a9/0x230 [ 186.886722][ T9353] ? __fdget+0x1b/0x20 [ 186.890811][ T9353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.897067][ T9353] __sys_sendmsg+0x105/0x1d0 [ 186.901675][ T9353] ? __sys_sendmsg_sock+0xd0/0xd0 [ 186.906725][ T9353] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 186.913827][ T9353] ? do_syscall_64+0x26/0x760 [ 186.918643][ T9353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.924731][ T9353] ? do_syscall_64+0x26/0x760 [ 186.929438][ T9353] __x64_sys_sendmsg+0x78/0xb0 [ 186.934216][ T9353] do_syscall_64+0xfa/0x760 [ 186.938920][ T9353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.944824][ T9353] RIP: 0033:0x459a29 [ 186.949292][ T9353] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.949308][ T9353] RSP: 002b:00007f2bc9086c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 186.977442][ T9353] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 186.986734][ T9353] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000008 [ 186.994804][ T9353] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 01:06:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 187.002787][ T9353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bc90876d4 [ 187.010768][ T9353] R13: 00000000004c7979 R14: 00000000004dd398 R15: 00000000ffffffff 01:06:52 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:52 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) fcntl$setlease(r0, 0x400, 0x2) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={@loopback, 0xc, r6}) fcntl$setstatus(r1, 0x4, 0x2400) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 01:06:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r2, r1) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff, 0x4, 0x0, 0x401}, 0x10) write(r0, &(0x7f0000000180)="1200000012005f0214f9f4070000fbe40a00", 0x12) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x21, 0x1, 0x4}}, 0x10) 01:06:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 01:06:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, 0x0, 0xffffff15) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x2c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 187.409666][ T9345] ERROR: Out of memory at tomoyo_realpath_from_path. 01:06:53 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe}, 0xc) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000200)={'NETMAP\x00'}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x529, 0x20c, 0x4, 0x0, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0x4}, &(0x7f0000000380)=0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x200) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x200000000000000, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401, 0x0, 0x4, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x8000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8008, 0x0, 0x8, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r7, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r8, r7) ioctl$int_out(r7, 0x5460, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000000)=0x5, 0x4) 01:06:53 executing program 1 (fault-call:2 fault-nth:1): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 01:06:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getrule={0x20, 0x22, 0x4, 0x70bd25, 0x25dfdbfb, {0xa, 0x0, 0x80, 0x1, 0xfa, 0x0, 0x0, 0xa, 0x2}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000440), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) 01:06:53 executing program 2: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r0 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x0, r0}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000080)) [ 187.918619][ T9406] sctp: [Deprecated]: syz-executor.0 (pid 9406) Use of struct sctp_assoc_value in delayed_ack socket option. [ 187.918619][ T9406] Use struct sctp_sack_info instead [ 188.030252][ T9412] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 01:06:53 executing program 2: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r0 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x0, r0}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000080)) 01:06:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 188.301757][ T9425] FAULT_INJECTION: forcing a failure. [ 188.301757][ T9425] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 188.315108][ T9425] CPU: 0 PID: 9425 Comm: syz-executor.1 Tainted: G W 5.3.0-next-20190926 #0 [ 188.325123][ T9425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.335282][ T9425] Call Trace: [ 188.338639][ T9425] dump_stack+0x172/0x1f0 [ 188.342995][ T9425] should_fail.cold+0xa/0x15 [ 188.347647][ T9425] ? fault_create_debugfs_attr+0x180/0x180 [ 188.353476][ T9425] ? lock_downgrade+0x920/0x920 [ 188.359410][ T9425] should_fail_alloc_page+0x50/0x60 [ 188.364641][ T9425] __alloc_pages_nodemask+0x1a1/0x900 [ 188.371085][ T9425] ? __kasan_check_read+0x11/0x20 [ 188.376138][ T9425] ? mark_lock+0xc2/0x1220 [ 188.380580][ T9425] ? __alloc_pages_slowpath+0x28e0/0x28e0 [ 188.386321][ T9425] ? __kasan_check_read+0x11/0x20 [ 188.391559][ T9425] ? fault_create_debugfs_attr+0x180/0x180 [ 188.397399][ T9425] cache_grow_begin+0x90/0xd20 [ 188.402199][ T9425] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 188.408037][ T9425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 188.414392][ T9425] __kmalloc+0x6b2/0x770 [ 188.418662][ T9425] ? mark_held_locks+0xf0/0xf0 [ 188.423453][ T9425] ? mark_lock+0xc2/0x1220 [ 188.427905][ T9425] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 188.434876][ T9425] tomoyo_realpath_from_path+0xcd/0x7b0 [ 188.440524][ T9425] ? tomoyo_path_number_perm+0x193/0x520 [ 188.440555][ T9425] tomoyo_path_number_perm+0x1dd/0x520 [ 188.440566][ T9425] ? tomoyo_path_number_perm+0x193/0x520 [ 188.440580][ T9425] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 188.440593][ T9425] ? __f_unlock_pos+0x19/0x20 [ 188.468588][ T9425] ? __fget+0x384/0x560 [ 188.473805][ T9425] ? ksys_dup3+0x3e0/0x3e0 [ 188.473825][ T9425] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 188.473847][ T9425] ? fput_many+0x12c/0x1a0 [ 188.489388][ T9425] tomoyo_file_ioctl+0x23/0x30 [ 188.494262][ T9425] security_file_ioctl+0x77/0xc0 [ 188.499318][ T9425] ksys_ioctl+0x57/0xd0 [ 188.503512][ T9425] __x64_sys_ioctl+0x73/0xb0 [ 188.508225][ T9425] do_syscall_64+0xfa/0x760 [ 188.512763][ T9425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.519372][ T9425] RIP: 0033:0x459a29 [ 188.523372][ T9425] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.543542][ T9425] RSP: 002b:00007fd38c57cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 188.552169][ T9425] RAX: ffffffffffffffda RBX: 00007fd38c57cc90 RCX: 0000000000459a29 [ 188.559747][ T9430] sctp: [Deprecated]: syz-executor.0 (pid 9430) Use of struct sctp_assoc_value in delayed_ack socket option. [ 188.559747][ T9430] Use struct sctp_sack_info instead [ 188.560423][ T9425] RDX: 0000000020000400 RSI: 000000004008af03 RDI: 0000000000000003 [ 188.560433][ T9425] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 188.560440][ T9425] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd38c57d6d4 [ 188.560448][ T9425] R13: 00000000004c4a60 R14: 00000000004d8f70 R15: 0000000000000004 01:06:54 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) fcntl$setlease(r0, 0x400, 0x2) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={@loopback, 0xc, r6}) fcntl$setstatus(r1, 0x4, 0x2400) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 01:06:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getrule={0x20, 0x22, 0x4, 0x70bd25, 0x25dfdbfb, {0xa, 0x0, 0x80, 0x1, 0xfa, 0x0, 0x0, 0xa, 0x2}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000440), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) 01:06:54 executing program 1 (fault-call:2 fault-nth:2): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:54 executing program 2: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r0 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x0, r0}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000080)) 01:06:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe}, 0xc) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000200)={'NETMAP\x00'}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x529, 0x20c, 0x4, 0x0, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0x4}, &(0x7f0000000380)=0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x200) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x200000000000000, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401, 0x0, 0x4, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x8000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8008, 0x0, 0x8, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r7, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r8, r7) ioctl$int_out(r7, 0x5460, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000000)=0x5, 0x4) 01:06:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 188.659610][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 188.659624][ T26] audit: type=1800 audit(1569719214.148:31): pid=9402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16542 res=0 01:06:54 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) [ 188.801446][ T9444] FAULT_INJECTION: forcing a failure. [ 188.801446][ T9444] name failslab, interval 1, probability 0, space 0, times 0 01:06:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 188.970801][ T9456] sctp: [Deprecated]: syz-executor.0 (pid 9456) Use of struct sctp_assoc_value in delayed_ack socket option. [ 188.970801][ T9456] Use struct sctp_sack_info instead [ 188.977875][ T9444] CPU: 0 PID: 9444 Comm: syz-executor.1 Tainted: G W 5.3.0-next-20190926 #0 [ 188.998630][ T9444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.010018][ T9444] Call Trace: [ 189.013340][ T9444] dump_stack+0x172/0x1f0 [ 189.017701][ T9444] should_fail.cold+0xa/0x15 [ 189.022376][ T9444] ? fault_create_debugfs_attr+0x180/0x180 [ 189.028219][ T9444] ? ___might_sleep+0x163/0x2c0 [ 189.033098][ T9444] __should_failslab+0x121/0x190 [ 189.038067][ T9444] should_failslab+0x9/0x14 [ 189.042588][ T9444] kmem_cache_alloc_node_trace+0x274/0x750 [ 189.048532][ T9444] __kmalloc_node+0x3d/0x70 [ 189.053061][ T9444] kvmalloc_node+0x68/0x100 [ 189.057591][ T9444] vhost_dev_ioctl+0x206/0xda0 [ 189.062471][ T9444] ? lock_downgrade+0x920/0x920 [ 189.067336][ T9444] ? lockdep_hardirqs_on+0x421/0x5e0 [ 189.072744][ T9444] ? vhost_dev_set_owner+0x9b0/0x9b0 [ 189.078138][ T9444] ? tomoyo_path_number_perm+0x459/0x520 [ 189.083836][ T9444] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 189.089157][ T9444] ? vhost_vsock_flush+0xc0/0xc0 [ 189.094157][ T9444] ? vhost_vsock_flush+0xc0/0xc0 [ 189.099216][ T9444] do_vfs_ioctl+0xdb6/0x13e0 [ 189.104013][ T9444] ? compat_ioctl_preallocate+0x210/0x210 [ 189.109765][ T9444] ? __fget+0x384/0x560 [ 189.113957][ T9444] ? ksys_dup3+0x3e0/0x3e0 [ 189.118397][ T9444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 189.124690][ T9444] ? fput_many+0x12c/0x1a0 [ 189.129133][ T9444] ? tomoyo_file_ioctl+0x23/0x30 [ 189.134093][ T9444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.140363][ T9444] ? security_file_ioctl+0x8d/0xc0 [ 189.145895][ T9444] ksys_ioctl+0xab/0xd0 [ 189.150132][ T9444] __x64_sys_ioctl+0x73/0xb0 [ 189.155324][ T9444] do_syscall_64+0xfa/0x760 [ 189.160132][ T9444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.166487][ T9444] RIP: 0033:0x459a29 [ 189.170523][ T9444] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.191298][ T9444] RSP: 002b:00007fd38c57cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.200339][ T9444] RAX: ffffffffffffffda RBX: 00007fd38c57cc90 RCX: 0000000000459a29 [ 189.209391][ T9444] RDX: 0000000020000400 RSI: 000000004008af03 RDI: 0000000000000003 01:06:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe}, 0xc) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000200)={'NETMAP\x00'}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x529, 0x20c, 0x4, 0x0, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0x4}, &(0x7f0000000380)=0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x200) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x200000000000000, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401, 0x0, 0x4, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x8000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8008, 0x0, 0x8, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r7, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r8, r7) ioctl$int_out(r7, 0x5460, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000000)=0x5, 0x4) [ 189.218522][ T9444] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 189.228300][ T9444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd38c57d6d4 [ 189.237008][ T9444] R13: 00000000004c4a60 R14: 00000000004d8f70 R15: 0000000000000004 01:06:54 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 01:06:54 executing program 1 (fault-call:2 fault-nth:3): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) [ 189.552538][ T9468] sctp: [Deprecated]: syz-executor.5 (pid 9468) Use of struct sctp_assoc_value in delayed_ack socket option. [ 189.552538][ T9468] Use struct sctp_sack_info instead [ 189.694434][ T9475] FAULT_INJECTION: forcing a failure. [ 189.694434][ T9475] name failslab, interval 1, probability 0, space 0, times 0 [ 189.714892][ T9475] CPU: 0 PID: 9475 Comm: syz-executor.1 Tainted: G W 5.3.0-next-20190926 #0 [ 189.725079][ T9475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.735159][ T9475] Call Trace: [ 189.738475][ T9475] dump_stack+0x172/0x1f0 [ 189.742858][ T9475] should_fail.cold+0xa/0x15 [ 189.747777][ T9475] ? fault_create_debugfs_attr+0x180/0x180 [ 189.753728][ T9475] ? ___might_sleep+0x163/0x2c0 [ 189.758609][ T9475] __should_failslab+0x121/0x190 [ 189.765212][ T9475] should_failslab+0x9/0x14 [ 189.770681][ T9475] kmem_cache_alloc_node_trace+0x274/0x750 [ 189.770712][ T9475] __kmalloc_node+0x3d/0x70 [ 189.770730][ T9475] kvmalloc_node+0x68/0x100 [ 189.770749][ T9475] vhost_dev_ioctl+0x206/0xda0 [ 189.770770][ T9475] ? lock_downgrade+0x920/0x920 [ 189.796620][ T9475] ? lockdep_hardirqs_on+0x421/0x5e0 [ 189.802899][ T9475] ? vhost_dev_set_owner+0x9b0/0x9b0 [ 189.808221][ T9475] ? tomoyo_path_number_perm+0x459/0x520 [ 189.813895][ T9475] vhost_vsock_dev_ioctl+0x71e/0xb70 [ 189.819223][ T9475] ? vhost_vsock_flush+0xc0/0xc0 [ 189.824196][ T9475] ? vhost_vsock_flush+0xc0/0xc0 [ 189.829153][ T9475] do_vfs_ioctl+0xdb6/0x13e0 [ 189.833863][ T9475] ? compat_ioctl_preallocate+0x210/0x210 [ 189.839612][ T9475] ? __fget+0x384/0x560 [ 189.843803][ T9475] ? ksys_dup3+0x3e0/0x3e0 [ 189.848244][ T9475] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 189.854534][ T9475] ? fput_many+0x12c/0x1a0 [ 189.859091][ T9475] ? tomoyo_file_ioctl+0x23/0x30 [ 189.864060][ T9475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.871044][ T9475] ? security_file_ioctl+0x8d/0xc0 [ 189.876453][ T9475] ksys_ioctl+0xab/0xd0 [ 189.880658][ T9475] __x64_sys_ioctl+0x73/0xb0 [ 189.885277][ T9475] do_syscall_64+0xfa/0x760 [ 189.889808][ T9475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.895811][ T9475] RIP: 0033:0x459a29 [ 189.899823][ T9475] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.920093][ T9475] RSP: 002b:00007fd38c57cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.928534][ T9475] RAX: ffffffffffffffda RBX: 00007fd38c57cc90 RCX: 0000000000459a29 [ 189.936737][ T9475] RDX: 0000000020000400 RSI: 000000004008af03 RDI: 0000000000000003 01:06:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9c) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x8200, 0x32, 0x0, 0xfffffffffffffc7d) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "f04a92d21860892a", "08e35b97dc8b2581b58a19571da70e1574367f6975ff8ec8912dcae3ceb9026b", "1d31114f", "c890e7bc64acf57f"}, 0x38) 01:06:55 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 01:06:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe}, 0xc) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000200)={'NETMAP\x00'}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x529, 0x20c, 0x4, 0x0, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0x4}, &(0x7f0000000380)=0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x200) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x200000000000000, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401, 0x0, 0x4, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x8000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8008, 0x0, 0x8, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r7, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r8, r7) ioctl$int_out(r7, 0x5460, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000000)=0x5, 0x4) 01:06:55 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) [ 189.944738][ T9475] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 189.952730][ T9475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd38c57d6d4 [ 189.960724][ T9475] R13: 00000000004c4a60 R14: 00000000004d8f70 R15: 0000000000000004 01:06:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x0, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) [ 190.000266][ T9482] sctp: [Deprecated]: syz-executor.0 (pid 9482) Use of struct sctp_assoc_value in delayed_ack socket option. [ 190.000266][ T9482] Use struct sctp_sack_info instead 01:06:55 executing program 5: ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000040)={0x0, 0x9967, 0x0, 0x1000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value, 0x8) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r4, r3) fchmod(r4, 0x1) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:06:55 executing program 1 (fault-call:2 fault-nth:4): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) 01:06:55 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x0, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe}, 0xc) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000200)={'NETMAP\x00'}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x529, 0x20c, 0x4, 0x0, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0x4}, &(0x7f0000000380)=0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x200) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x200000000000000, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401, 0x0, 0x4, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x8000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8008, 0x0, 0x8, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r7, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r8, r7) ioctl$int_out(r7, 0x5460, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000000)=0x5, 0x4) 01:06:55 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="696fe9b47466382c00"]) 01:06:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r1 = dup(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x6, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) mlockall(0x1) r5 = dup2(r2, r4) dup3(r5, r3, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_GET_PROFILE(0xffffffffffffffff, 0xc0404309, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x0, 0x0) exit(0x0) 01:06:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x0, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:56 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:56 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) [ 190.580872][ T9515] FAT-fs (loop3): Unrecognized mount option "ioé´tf8" or missing value 01:06:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) [ 190.690802][ T9528] sctp: [Deprecated]: syz-executor.0 (pid 9528) Use of struct sctp_assoc_value in delayed_ack socket option. [ 190.690802][ T9528] Use struct sctp_sack_info instead [ 190.730806][ T9515] FAT-fs (loop3): Unrecognized mount option "ioé´tf8" or missing value 01:06:56 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x2, &(0x7f0000000400)) 01:06:56 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x87, @rand_addr=0xfffffff8, 0x4e21, 0x2, 'fo\x00', 0x0, 0x1, 0x72}, {@local, 0x4e20, 0x2, 0x0, 0x8000, 0xfffff992}}, 0x44) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 01:06:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:56 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x10, &(0x7f0000000400)) 01:06:56 executing program 0: setgroups(0x2fe, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7f, 0x1440) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@null=' \x00', 0x3, 'bond_slave_0\x00'}) 01:06:56 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x140) semget$private(0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)=@v2={0x2, @adiantum, 0x3, [], "44b225a3b5f3a2c9383cec338acb8f25"}) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0x80000004, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x800, 0x2000000000002) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) 01:06:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4c01, &(0x7f0000000400)) 01:06:57 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:57 executing program 0: r0 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r1, 0x0) quotactl(0x9a, &(0x7f00000002c0)='./file0\x00', r1, &(0x7f0000000300)="14d0a2864ba9dcb6eac04308568db36ffa884b258acd2bd6813c2ea14583e1292a2f4e913c5c906425fe3a4cd6e10d0e56c3c77209115d1d5943ed65c296eee317f2a97d0f4e447c042d73721f6349049ac24f4504456a39291fe9eee170f1fb8f38f9c30a42210805c5acc6df15da47e0165b6e6701fc989ad1269e8191686bfe461599f85e14e57be40f2d14b27c0e538b6b15701b548a1fd6a673f8a57a70915754ad1732f76204cc4d6d7d9887f32f001cf0671c214bb88634470c5cff43d37138a06ed0fdeef244d4baa9b6760fdab5ab0b81cf8e425854250b293c74f84265eb51a85802e792124a") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f0000000240)={{0xffffffffffffffff, 0x3, 0x10001, 0x1, 0x101}, 0x1, 0x2}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@local, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) dup2(r2, r3) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$MON_IOCX_GETX(r6, 0x4018920a, &(0x7f00000000c0)={&(0x7f0000000100), &(0x7f0000000040)=""/127, 0x100000100}) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = getpid() setpgid(r8, 0x0) fcntl$setownex(r7, 0xf, &(0x7f00000001c0)={0x2, r8}) 01:06:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:57 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) [ 191.769877][ T9590] mmap: syz-executor.5 (9590) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 01:06:57 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0xfffffffffffffffd}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000440)={0x8, {{0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1000}}, 0x0, 0x1, [{{0xa, 0x4e24, 0x60000, @mcast2, 0x2}}]}, 0x110) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 01:06:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5421, &(0x7f0000000400)) 01:06:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5450, &(0x7f0000000400)) 01:06:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x140) semget$private(0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)=@v2={0x2, @adiantum, 0x3, [], "44b225a3b5f3a2c9383cec338acb8f25"}) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0x80000004, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x800, 0x2000000000002) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) 01:06:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xed, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pselect6(0x61862bd29df4724b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x8}, 0x236cdea298d592c5}) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00002540000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) r4 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r5, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r8 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r7, r9) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r12 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r11, r13) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r17 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r16, r18) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) r23 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r25 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r24, r26) getgroups(0x1, &(0x7f00000008c0)=[r26]) r28 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r30 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r29, r31) r32 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r34 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r33, r35) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="022d9951b787c6adb812810000a3be6db5ed297afe0002000000", @ANYRES32=r0, @ANYBLOB="020005000b4f30f47f08ba243820b7693caf5b42323606bd0e955ca4e40db0d51153ddbc62b6f835f7bd6eb6be68d7431c8ffab76e13d63d1636a69b370f892c4caa44856f32c52b5ebd5fcd7835975f5586af1c03a291952d7c17f458a6286cff075479206950fb405e90e662e2df2206f895fa5ed35e21c17661738ff1fd2acdd632fb3dc5ef8d46762b6ff89a8e289812f6", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="040007000000000008001591", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r13, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r14, @ANYBLOB="08000600a665a0ba5e86b2a6528762f958a9ee70b3e5ee9921ff470a17", @ANYRES32=r18, @ANYBLOB="08000200", @ANYRES32=r20, @ANYBLOB="08000200", @ANYRES32=r21, @ANYBLOB="08000400", @ANYRES32=r22, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r27, @ANYBLOB="08000600", @ANYRES32=r31, @ANYBLOB="08000400", @ANYRES32=r35, @ANYBLOB="10000300000000002000020000000000"], 0x94, 0x2) 01:06:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xae1d1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = open(&(0x7f0000000140)='./file0\x00', 0x8000, 0x10a) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000180)={0xfd, 0x0, 0x5, 0xcc3, r5}, &(0x7f00000001c0)=0x10) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 01:06:58 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:06:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5451, &(0x7f0000000400)) 01:06:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x110, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}]}, 0x110}}, 0x0) 01:06:58 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5452, &(0x7f0000000400)) 01:06:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x110, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}]}, 0x110}}, 0x0) [ 193.381590][ T9658] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 193.433693][ T9658] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 193.464625][ T9658] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 193.544074][ T9658] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 01:06:59 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x5460, &(0x7f0000000400)) 01:06:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x110, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x20, 0x17, {0x1, 0x0, 0x0, 0x0, 0x0, 0x6, [0x0]}}]}, 0x110}}, 0x0) 01:06:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xed, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pselect6(0x61862bd29df4724b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x8}, 0x236cdea298d592c5}) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00002540000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) r4 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r5, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r8 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r7, r9) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r12 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r11, r13) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r17 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r16, r18) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) r23 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r25 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r24, r26) getgroups(0x1, &(0x7f00000008c0)=[r26]) r28 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r30 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r29, r31) r32 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r34 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r33, r35) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="022d9951b787c6adb812810000a3be6db5ed297afe0002000000", @ANYRES32=r0, @ANYBLOB="020005000b4f30f47f08ba243820b7693caf5b42323606bd0e955ca4e40db0d51153ddbc62b6f835f7bd6eb6be68d7431c8ffab76e13d63d1636a69b370f892c4caa44856f32c52b5ebd5fcd7835975f5586af1c03a291952d7c17f458a6286cff075479206950fb405e90e662e2df2206f895fa5ed35e21c17661738ff1fd2acdd632fb3dc5ef8d46762b6ff89a8e289812f6", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="040007000000000008001591", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r13, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r14, @ANYBLOB="08000600a665a0ba5e86b2a6528762f958a9ee70b3e5ee9921ff470a17", @ANYRES32=r18, @ANYBLOB="08000200", @ANYRES32=r20, @ANYBLOB="08000200", @ANYRES32=r21, @ANYBLOB="08000400", @ANYRES32=r22, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r27, @ANYBLOB="08000600", @ANYRES32=r31, @ANYBLOB="08000400", @ANYRES32=r35, @ANYBLOB="10000300000000002000020000000000"], 0x94, 0x2) 01:06:59 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 01:06:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRESOCT=0x0], 0x4}, 0x1, 0x0, 0x0, 0x880}, 0x0) 01:06:59 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x6364, &(0x7f0000000400)) 01:06:59 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x72, 0x0, 0x82, 0x0, 0x9f7, 0x6282, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2aba69fd7108fc2e, @perf_bp={&(0x7f0000000040), 0xb}, 0x10000, 0x5, 0x8001, 0x4, 0x7, 0xfffffff7, 0x9}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, 0x0, 0xffffff15) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x203) r3 = syz_open_pts(r1, 0x101000) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x4, 0x100132, r3, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x8503, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000180)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r5, 0x118, 0x1, &(0x7f0000000000), 0x4) 01:06:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) sendto$inet6(r1, &(0x7f0000000000)="ac2190013dda86cee7dd5b27d46911d2addd427ce84b63daf07637a7174c952a97e5c64d37876f3f7d2f3766b5b34b94cb10cf143df76fca2df14370b5e7de62c3dc2f294b609c706981119ec7d9287b78e7487a53", 0x55, 0x8000, &(0x7f0000000080)={0xa, 0x4e21, 0xa38, @empty, 0x2}, 0x1c) 01:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r4, r3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000000)={0x10000000}) r5 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r5, &(0x7f0000000380)={0x0, 0xfffffffffffffd67, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000030028080008000c0004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1, 0x0, 0x178}, 0x0) 01:06:59 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:06:59 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8933, &(0x7f0000000400)) 01:07:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) [ 194.486594][ T9726] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 01:07:00 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2, &(0x7f0000001fd8)=@raw=[@generic={0x2, 0xc, 0x1, 0xa4a, 0x7}, @jmp={0x5, 0x0, 0x0, 0x3, 0x5, 0xffffffffffffffc0, 0x10}], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x121, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0xfffffffe}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r4 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x67, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect(r4, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) sendmmsg$inet_sctp(r4, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x20, 0x0) ioctl$KDDELIO(r7, 0x4b35, 0x3) close(r1) [ 194.537861][ T9726] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 194.566825][ T9726] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 194.678099][ T9726] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 01:07:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xed, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pselect6(0x61862bd29df4724b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x8}, 0x236cdea298d592c5}) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00002540000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) r4 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r5, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r8 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r7, r9) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r12 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r11, r13) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r17 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r16, r18) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) r23 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r25 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r24, r26) getgroups(0x1, &(0x7f00000008c0)=[r26]) r28 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r30 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r29, r31) r32 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r34 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r33, r35) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="022d9951b787c6adb812810000a3be6db5ed297afe0002000000", @ANYRES32=r0, @ANYBLOB="020005000b4f30f47f08ba243820b7693caf5b42323606bd0e955ca4e40db0d51153ddbc62b6f835f7bd6eb6be68d7431c8ffab76e13d63d1636a69b370f892c4caa44856f32c52b5ebd5fcd7835975f5586af1c03a291952d7c17f458a6286cff075479206950fb405e90e662e2df2206f895fa5ed35e21c17661738ff1fd2acdd632fb3dc5ef8d46762b6ff89a8e289812f6", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="040007000000000008001591", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r13, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r14, @ANYBLOB="08000600a665a0ba5e86b2a6528762f958a9ee70b3e5ee9921ff470a17", @ANYRES32=r18, @ANYBLOB="08000200", @ANYRES32=r20, @ANYBLOB="08000200", @ANYRES32=r21, @ANYBLOB="08000400", @ANYRES32=r22, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r27, @ANYBLOB="08000600", @ANYRES32=r31, @ANYBLOB="08000400", @ANYRES32=r35, @ANYBLOB="10000300000000002000020000000000"], 0x94, 0x2) 01:07:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x10001}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f00000000c0)={0x1, 0xf2, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ppoll(&(0x7f0000000100)=[{r3, 0x820}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000001c0)={0x3f}, 0x8) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) 01:07:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 01:07:00 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)) 01:07:00 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf01, &(0x7f0000000400)) 01:07:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0) 01:07:00 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000080)) 01:07:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unlink(&(0x7f0000000040)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x58, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x30, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x20, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_FWMARK={0x8}]]]}}}]}, 0x58}}, 0x0) 01:07:00 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2, &(0x7f0000001fd8)=@raw=[@generic={0x2, 0xc, 0x1, 0xa4a, 0x7}, @jmp={0x5, 0x0, 0x0, 0x3, 0x5, 0xffffffffffffffc0, 0x10}], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x121, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0xfffffffe}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r4 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x67, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect(r4, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) sendmmsg$inet_sctp(r4, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x20, 0x0) ioctl$KDDELIO(r7, 0x4b35, 0x3) close(r1) 01:07:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) 01:07:00 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x400454ca, &(0x7f0000000400)) 01:07:00 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000080)) [ 195.443975][ T9786] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 195.509592][ T9786] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 195.566256][ T9786] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 195.659890][ T9786] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 01:07:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xed, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pselect6(0x61862bd29df4724b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x8}, 0x236cdea298d592c5}) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00002540000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) r4 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r5, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r8 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r7, r9) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r12 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r11, r13) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r17 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r16, r18) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) r23 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r25 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r24, r26) getgroups(0x1, &(0x7f00000008c0)=[r26]) r28 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r30 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r29, r31) r32 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r34 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r33, r35) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="022d9951b787c6adb812810000a3be6db5ed297afe0002000000", @ANYRES32=r0, @ANYBLOB="020005000b4f30f47f08ba243820b7693caf5b42323606bd0e955ca4e40db0d51153ddbc62b6f835f7bd6eb6be68d7431c8ffab76e13d63d1636a69b370f892c4caa44856f32c52b5ebd5fcd7835975f5586af1c03a291952d7c17f458a6286cff075479206950fb405e90e662e2df2206f895fa5ed35e21c17661738ff1fd2acdd632fb3dc5ef8d46762b6ff89a8e289812f6", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="040007000000000008001591", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r13, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r14, @ANYBLOB="08000600a665a0ba5e86b2a6528762f958a9ee70b3e5ee9921ff470a17", @ANYRES32=r18, @ANYBLOB="08000200", @ANYRES32=r20, @ANYBLOB="08000200", @ANYRES32=r21, @ANYBLOB="08000400", @ANYRES32=r22, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r27, @ANYBLOB="08000600", @ANYRES32=r31, @ANYBLOB="08000400", @ANYRES32=r35, @ANYBLOB="10000300000000002000020000000000"], 0x94, 0x2) 01:07:01 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x281, 0x3f, 0x1f}, 0xc) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(r2, 0x0, 0x8084) syz_genetlink_get_family_id$tipc(0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000080)) ioctl$FS_IOC_GETFSLABEL(r1, 0x800452d3, &(0x7f0000000100)) 01:07:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) 01:07:01 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000080)) 01:07:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x40049409, &(0x7f0000000400)) 01:07:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2, &(0x7f0000001fd8)=@raw=[@generic={0x2, 0xc, 0x1, 0xa4a, 0x7}, @jmp={0x5, 0x0, 0x0, 0x3, 0x5, 0xffffffffffffffc0, 0x10}], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x121, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0xfffffffe}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r4 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x67, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect(r4, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) sendmmsg$inet_sctp(r4, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x20, 0x0) ioctl$KDDELIO(r7, 0x4b35, 0x3) close(r1) 01:07:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) 01:07:01 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) 01:07:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4004af07, &(0x7f0000000400)) 01:07:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2, &(0x7f0000001fd8)=@raw=[@generic={0x2, 0xc, 0x1, 0xa4a, 0x7}, @jmp={0x5, 0x0, 0x0, 0x3, 0x5, 0xffffffffffffffc0, 0x10}], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x121, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0xfffffffe}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r4 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x67, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect(r4, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) sendmmsg$inet_sctp(r4, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x20, 0x0) ioctl$KDDELIO(r7, 0x4b35, 0x3) close(r1) 01:07:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) 01:07:01 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x20, 0x17, {0x287, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0]}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x158}}, 0x0)