[   39.645014][   T26] audit: type=1800 audit(1553115310.491:26): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[   39.681625][   T26] audit: type=1800 audit(1553115310.501:27): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[   39.704322][   T26] audit: type=1800 audit(1553115310.501:28): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[   40.568150][   T26] audit: type=1800 audit(1553115311.431:29): pid=7730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.121' (ECDSA) to the list of known hosts.
2019/03/20 20:55:20 fuzzer started
2019/03/20 20:55:23 dialing manager at 10.128.0.26:37497
2019/03/20 20:55:24 syscalls: 1
2019/03/20 20:55:24 code coverage: enabled
2019/03/20 20:55:24 comparison tracing: enabled
2019/03/20 20:55:24 extra coverage: extra coverage is not supported by the kernel
2019/03/20 20:55:24 setuid sandbox: enabled
2019/03/20 20:55:24 namespace sandbox: enabled
2019/03/20 20:55:24 Android sandbox: /sys/fs/selinux/policy does not exist
2019/03/20 20:55:24 fault injection: enabled
2019/03/20 20:55:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/03/20 20:55:24 net packet injection: enabled
2019/03/20 20:55:24 net device setup: enabled
20:58:40 executing program 0:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
close(r0)
ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0)
sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0)

syzkaller login: [  250.175172][ T7894] IPVS: ftp: loaded support on port[0] = 21
20:58:41 executing program 1:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040))

[  250.295950][ T7894] chnl_net:caif_netlink_parms(): no params data found
[  250.399195][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state
[  250.430685][ T7894] bridge0: port 1(bridge_slave_0) entered disabled state
[  250.438806][ T7894] device bridge_slave_0 entered promiscuous mode
[  250.447762][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state
[  250.455297][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state
[  250.463486][ T7894] device bridge_slave_1 entered promiscuous mode
[  250.488691][ T7894] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  250.499337][ T7894] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  250.513927][ T7897] IPVS: ftp: loaded support on port[0] = 21
[  250.530338][ T7894] team0: Port device team_slave_0 added
[  250.539466][ T7894] team0: Port device team_slave_1 added
20:58:41 executing program 2:
perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000180)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0x1000002ac)
read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3)

[  250.623754][ T7894] device hsr_slave_0 entered promiscuous mode
[  250.660969][ T7894] device hsr_slave_1 entered promiscuous mode
[  250.719898][ T7899] IPVS: ftp: loaded support on port[0] = 21
[  250.743246][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state
[  250.750617][ T7894] bridge0: port 2(bridge_slave_1) entered forwarding state
[  250.758514][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state
20:58:41 executing program 3:
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40))
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1})
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da)
ioctl$EXT4_IOC_MIGRATE(r2, 0x6609)

[  250.765650][ T7894] bridge0: port 1(bridge_slave_0) entered forwarding state
[  250.932597][ T7897] chnl_net:caif_netlink_parms(): no params data found
[  251.011687][ T7894] 8021q: adding VLAN 0 to HW filter on device bond0
[  251.050099][ T7902] IPVS: ftp: loaded support on port[0] = 21
[  251.052707][ T7894] 8021q: adding VLAN 0 to HW filter on device team0
[  251.077517][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  251.088920][   T12] bridge0: port 1(bridge_slave_0) entered disabled state
[  251.108482][   T12] bridge0: port 2(bridge_slave_1) entered disabled state
[  251.118353][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:58:42 executing program 4:
r0 = socket$inet(0x10, 0x2, 0x0)
sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="240000001a0007041dfffd946f610500020000001f00000000000800080004000400ff7e", 0x24}], 0x1}, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000000c0)={@loopback}, &(0x7f0000000100)=0x14)
socket$inet6(0xa, 0x1, 0x0)
accept$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, 0x0)
setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x9)
getgid()
openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x80080, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0)
fcntl$dupfd(r0, 0x406, r0)

[  251.157069][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  251.166357][   T22] bridge0: port 1(bridge_slave_0) entered blocking state
[  251.173487][   T22] bridge0: port 1(bridge_slave_0) entered forwarding state
[  251.186256][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  251.213192][   T22] bridge0: port 2(bridge_slave_1) entered blocking state
[  251.220287][   T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[  251.257982][ T7899] chnl_net:caif_netlink_parms(): no params data found
[  251.293662][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state
[  251.301467][ T7897] bridge0: port 1(bridge_slave_0) entered disabled state
[  251.320754][ T7897] device bridge_slave_0 entered promiscuous mode
[  251.343428][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  251.352761][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  251.386128][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state
[  251.395829][ T7897] bridge0: port 2(bridge_slave_1) entered disabled state
[  251.404075][ T7897] device bridge_slave_1 entered promiscuous mode
20:58:42 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48)

[  251.426450][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  251.435818][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  251.447913][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  251.458657][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  251.479396][ T7894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  251.487978][ T7909] IPVS: ftp: loaded support on port[0] = 21
[  251.496114][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  251.513342][ T7897] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  251.533146][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  251.541893][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  251.576311][ T7897] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  251.636896][ T7894] 8021q: adding VLAN 0 to HW filter on device batadv0
[  251.662555][ T7899] bridge0: port 1(bridge_slave_0) entered blocking state
[  251.669711][ T7899] bridge0: port 1(bridge_slave_0) entered disabled state
[  251.678349][ T7899] device bridge_slave_0 entered promiscuous mode
[  251.687714][ T7899] bridge0: port 2(bridge_slave_1) entered blocking state
[  251.694945][ T7899] bridge0: port 2(bridge_slave_1) entered disabled state
[  251.703007][ T7899] device bridge_slave_1 entered promiscuous mode
[  251.721617][ T7897] team0: Port device team_slave_0 added
[  251.735710][ T7899] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  251.736718][ T7911] IPVS: ftp: loaded support on port[0] = 21
[  251.764239][ T7899] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  251.784350][ T7897] team0: Port device team_slave_1 added
20:58:42 executing program 0:

20:58:42 executing program 0:

[  251.873380][ T7897] device hsr_slave_0 entered promiscuous mode
20:58:42 executing program 0:

20:58:42 executing program 0:

[  251.921193][ T7897] device hsr_slave_1 entered promiscuous mode
20:58:42 executing program 0:

[  251.977559][ T7899] team0: Port device team_slave_0 added
20:58:42 executing program 0:

20:58:42 executing program 0:

[  252.049375][ T7899] team0: Port device team_slave_1 added
[  252.182417][ T7899] device hsr_slave_0 entered promiscuous mode
[  252.200980][ T7899] device hsr_slave_1 entered promiscuous mode
[  252.301218][ T7909] chnl_net:caif_netlink_parms(): no params data found
[  252.321133][ T7902] chnl_net:caif_netlink_parms(): no params data found
[  252.336157][ T7899] bridge0: port 2(bridge_slave_1) entered blocking state
[  252.343304][ T7899] bridge0: port 2(bridge_slave_1) entered forwarding state
[  252.350698][ T7899] bridge0: port 1(bridge_slave_0) entered blocking state
[  252.357922][ T7899] bridge0: port 1(bridge_slave_0) entered forwarding state
[  252.390359][ T7906] bridge0: port 1(bridge_slave_0) entered disabled state
[  252.398570][ T7906] bridge0: port 2(bridge_slave_1) entered disabled state
[  252.449851][ T7909] bridge0: port 1(bridge_slave_0) entered blocking state
[  252.457731][ T7909] bridge0: port 1(bridge_slave_0) entered disabled state
[  252.465716][ T7909] device bridge_slave_0 entered promiscuous mode
[  252.490443][ T7902] bridge0: port 1(bridge_slave_0) entered blocking state
[  252.497787][ T7902] bridge0: port 1(bridge_slave_0) entered disabled state
[  252.505944][ T7902] device bridge_slave_0 entered promiscuous mode
[  252.514116][ T7909] bridge0: port 2(bridge_slave_1) entered blocking state
[  252.521609][ T7909] bridge0: port 2(bridge_slave_1) entered disabled state
[  252.529508][ T7909] device bridge_slave_1 entered promiscuous mode
[  252.540915][ T7902] bridge0: port 2(bridge_slave_1) entered blocking state
[  252.547993][ T7902] bridge0: port 2(bridge_slave_1) entered disabled state
[  252.558154][ T7902] device bridge_slave_1 entered promiscuous mode
[  252.578152][ T7902] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  252.588077][ T7902] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  252.615155][ T7897] 8021q: adding VLAN 0 to HW filter on device bond0
[  252.645733][ T7909] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  252.662351][ T7909] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  252.682691][ T7902] team0: Port device team_slave_0 added
[  252.706153][ T7899] 8021q: adding VLAN 0 to HW filter on device bond0
[  252.733871][ T7902] team0: Port device team_slave_1 added
[  252.749811][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  252.758112][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  252.769974][ T7897] 8021q: adding VLAN 0 to HW filter on device team0
[  252.797948][ T7909] team0: Port device team_slave_0 added
[  252.808575][ T7909] team0: Port device team_slave_1 added
[  252.872438][ T7902] device hsr_slave_0 entered promiscuous mode
[  252.921212][ T7902] device hsr_slave_1 entered promiscuous mode
[  252.992445][ T7899] 8021q: adding VLAN 0 to HW filter on device team0
[  253.004921][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  253.012628][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  253.020308][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  253.030203][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  253.038775][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state
[  253.045862][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state
[  253.055427][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  253.075386][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  253.084627][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  253.093497][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state
[  253.100683][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state
[  253.163546][ T7909] device hsr_slave_0 entered promiscuous mode
[  253.200971][ T7909] device hsr_slave_1 entered promiscuous mode
[  253.253428][ T7911] chnl_net:caif_netlink_parms(): no params data found
[  253.281249][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  253.289990][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  253.299891][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state
[  253.307013][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state
[  253.316703][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  253.325483][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  253.334039][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  253.342769][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  253.351566][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  253.360413][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  253.368844][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state
[  253.375929][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state
[  253.409022][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  253.417068][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  253.428398][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  253.437250][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  253.485973][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  253.494782][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  253.504993][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  253.513680][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  253.522755][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  253.531225][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  253.539669][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  253.548511][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  253.579440][ T7899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  253.591482][ T7899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  253.603269][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  253.612250][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  253.620791][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  253.629043][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  253.637499][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  253.646071][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  253.654718][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  253.667996][ T7911] bridge0: port 1(bridge_slave_0) entered blocking state
[  253.676181][ T7911] bridge0: port 1(bridge_slave_0) entered disabled state
[  253.684232][ T7911] device bridge_slave_0 entered promiscuous mode
[  253.698149][ T7911] bridge0: port 2(bridge_slave_1) entered blocking state
[  253.705739][ T7911] bridge0: port 2(bridge_slave_1) entered disabled state
[  253.714158][ T7911] device bridge_slave_1 entered promiscuous mode
[  253.723943][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  253.765519][ T7911] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  253.784763][ T7909] 8021q: adding VLAN 0 to HW filter on device bond0
[  253.794469][ T7911] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  253.821969][ T7902] 8021q: adding VLAN 0 to HW filter on device bond0
[  253.842713][ T7899] 8021q: adding VLAN 0 to HW filter on device batadv0
[  253.865728][ T7911] team0: Port device team_slave_0 added
[  253.877014][ T7897] 8021q: adding VLAN 0 to HW filter on device batadv0
[  253.898471][ T7902] 8021q: adding VLAN 0 to HW filter on device team0
[  253.918655][ T7911] team0: Port device team_slave_1 added
[  253.929757][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  253.939587][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  253.948011][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  253.962880][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  253.995157][ T7909] 8021q: adding VLAN 0 to HW filter on device team0
[  254.025703][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
20:58:44 executing program 1:

[  254.041354][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  254.059320][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state
[  254.066495][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state
[  254.081975][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  254.108948][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  254.123606][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state
[  254.130783][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state
[  254.190014][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  254.201456][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  254.210048][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  254.219230][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  254.228076][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state
[  254.235185][ T7904] bridge0: port 1(bridge_slave_0) entered forwarding state
[  254.243625][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  254.252334][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  254.260917][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state
[  254.268020][ T7904] bridge0: port 2(bridge_slave_1) entered forwarding state
[  254.275970][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
20:58:45 executing program 2:

[  254.284861][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  254.293721][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  254.303881][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  254.312935][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  254.374178][ T7911] device hsr_slave_0 entered promiscuous mode
[  254.401165][ T7911] device hsr_slave_1 entered promiscuous mode
[  254.450046][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  254.458293][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  254.466790][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  254.475753][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  254.485583][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  254.494441][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  254.503367][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  254.512575][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  254.520997][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  254.529256][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  254.537758][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  254.552496][ T7909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  254.565768][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  254.574649][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  254.595093][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  254.603688][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  254.615668][ T7902] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  254.627319][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  254.637471][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  254.646629][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  254.660154][ T7909] 8021q: adding VLAN 0 to HW filter on device batadv0
[  254.689511][ T7902] 8021q: adding VLAN 0 to HW filter on device batadv0
[  254.785695][ T7948] 
[  254.788299][ T7948] =============================
[  254.793684][ T7948] WARNING: suspicious RCU usage
[  254.798649][ T7948] 5.1.0-rc1-next-20190320 #7 Not tainted
[  254.805057][ T7948] -----------------------------
[  254.807685][ T7911] 8021q: adding VLAN 0 to HW filter on device bond0
[  254.810022][ T7948] net/xfrm/xfrm_user.c:1080 suspicious rcu_dereference_check() usage!
[  254.828290][ T7948] 
[  254.828290][ T7948] other info that might help us debug this:
[  254.828290][ T7948] 
[  254.840876][ T7948] 
[  254.840876][ T7948] rcu_scheduler_active = 2, debug_locks = 1
[  254.856411][ T7948] 1 lock held by syz-executor.4/7948:
[  254.869604][ T7911] 8021q: adding VLAN 0 to HW filter on device team0
[  254.875407][ T7948]  #0: 0000000003359d37 (&net->xfrm.xfrm_cfg_mutex){+.+.}, at: xfrm_netlink_rcv+0x61/0x90
[  254.885729][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  254.896298][    C0] hrtimer: interrupt took 37961 ns
[  254.900001][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  254.931658][ T7948] 
[  254.931658][ T7948] stack backtrace:
[  254.938514][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  254.948880][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  254.958184][ T7948] CPU: 0 PID: 7948 Comm: syz-executor.4 Not tainted 5.1.0-rc1-next-20190320 #7
[  254.964397][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state
[  254.969618][ T7948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  254.969692][ T7948] Call Trace:
[  254.969772][ T7948]  dump_stack+0x172/0x1f0
[  254.976870][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state
[  254.986908][ T7948]  lockdep_rcu_suspicious+0x153/0x15d
[  254.986935][ T7948]  xfrm_alloc_userspi+0x7d5/0xa80
[  254.996548][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  255.001815][ T7948]  ? xfrm_state_netlink+0x140/0x140
[  255.001921][ T7948]  ? nla_parse+0x45/0x60
[  255.001948][ T7948]  ? xfrm_state_netlink+0x140/0x140
[  255.008120][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  255.012376][ T7948]  xfrm_user_rcv_msg+0x458/0x770
[  255.012397][ T7948]  ? xfrm_dump_sa_done+0xf0/0xf0
[  255.012418][ T7948]  ? mark_held_locks+0xf0/0xf0
[  255.012430][ T7948]  ? lockdep_hardirqs_on+0x418/0x5d0
[  255.012543][ T7948]  ? __mutex_lock+0x3cd/0x1310
[  255.012560][ T7948]  ? xfrm_netlink_rcv+0x61/0x90
[  255.012618][ T7948]  netlink_rcv_skb+0x17a/0x460
[  255.012634][ T7948]  ? xfrm_dump_sa_done+0xf0/0xf0
[  255.012650][ T7948]  ? netlink_ack+0xb50/0xb50
[  255.012676][ T7948]  xfrm_netlink_rcv+0x70/0x90
[  255.012691][ T7948]  netlink_unicast+0x536/0x720
[  255.012712][ T7948]  ? netlink_attachskb+0x770/0x770
[  255.012759][ T7948]  ? _copy_from_iter_full+0x259/0x8f0
[  255.012812][ T7948]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  255.027350][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state
[  255.030368][ T7948]  ? __check_object_size+0x3d/0x42f
[  255.030393][ T7948]  netlink_sendmsg+0x8ae/0xd70
[  255.035674][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state
[  255.043581][ T7948]  ? netlink_unicast+0x720/0x720
[  255.043662][ T7948]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  255.043686][ T7948]  ? apparmor_socket_sendmsg+0x2a/0x30
[  255.054983][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  255.058338][ T7948]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  255.058428][ T7948]  ? security_socket_sendmsg+0x93/0xc0
[  255.058453][ T7948]  ? netlink_unicast+0x720/0x720
[  255.065925][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  255.068607][ T7948]  sock_sendmsg+0xdd/0x130
[  255.068628][ T7948]  ___sys_sendmsg+0x806/0x930
[  255.098361][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  255.102881][ T7948]  ? copy_msghdr_from_user+0x430/0x430
[  255.102998][ T7948]  ? kasan_check_read+0x11/0x20
[  255.103027][ T7948]  ? __fget+0x381/0x550
[  255.103047][ T7948]  ? ksys_dup3+0x3e0/0x3e0
[  255.103065][ T7948]  ? lock_downgrade+0x880/0x880
[  255.103083][ T7948]  ? __fget_light+0x1a9/0x230
[  255.103099][ T7948]  ? __fdget+0x1b/0x20
[  255.103113][ T7948]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  255.103129][ T7948]  __sys_sendmsg+0x105/0x1d0
[  255.103143][ T7948]  ? __ia32_sys_shutdown+0x80/0x80
[  255.103197][ T7948]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  255.103213][ T7948]  ? do_syscall_64+0x26/0x610
[  255.103230][ T7948]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  255.103253][ T7948]  ? do_syscall_64+0x26/0x610
[  255.115475][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  255.121580][ T7948]  __x64_sys_sendmsg+0x78/0xb0
[  255.121599][ T7948]  do_syscall_64+0x103/0x610
[  255.121622][ T7948]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  255.121633][ T7948] RIP: 0033:0x458079
[  255.121648][ T7948] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  255.121725][ T7948] RSP: 002b:00007fd024f33c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  255.121739][ T7948] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079
[  255.121746][ T7948] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000007
[  255.121754][ T7948] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  255.121762][ T7948] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd024f346d4
[  255.121771][ T7948] R13: 00000000004c56c3 R14: 00000000004d95f0 R15: 00000000ffffffff
[  255.384121][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  255.395400][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  255.404299][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  255.413726][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  255.423139][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  255.431927][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  255.447415][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  255.480070][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  255.538458][ T7911] 8021q: adding VLAN 0 to HW filter on device batadv0
20:58:46 executing program 3:
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40))
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1})
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da)
ioctl$EXT4_IOC_MIGRATE(r2, 0x6609)

20:58:46 executing program 0:

20:58:46 executing program 5:
r0 = msgget(0x3, 0x386)
msgctl$IPC_RMID(r0, 0x0)

20:58:46 executing program 1:

20:58:46 executing program 2:

20:58:46 executing program 4:

20:58:46 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0)
r1 = memfd_create(&(0x7f0000000180)='\x06\x00\x00\x00^\x00\xac\xd8\xfd\xcc\xeeq\xe5\xf5\xcb\x801`\xe48\x85\xa4\xf5\xd0\x1b\\\x04\f\xf8F\\\xb4\xba\x8d\xef\x12d\xee\xa5?\x00kZ\x8b\x19h\xd7|\x14i\r\x18U9\xc1\xd7\x10\xf0G\x12\xa8\xbaa\xb2\x94|%n\x1e+\x9f\xbb\xb8\xac\x81\x8d\x93q\xd4\xd4z\xaaZ\x0f\xaa\xc7\x97#\xe5g l\xd55\x15\xbf\xfc\xf5\x83\xb72\x00Y\x15\x92\xb1\xb6a\xf4\xe9u\xb2\xe7\xeciy\b\xdb\xc7\xf1\x87\xc9\a\x91\x04J\xc8\x0e\xff|J\'Nxr\x00\xbc\xab5\x9b\x85>\x99\xcaz2\xabKI\xdc\xe4\x9f\xa5\xd0\x0ewm\xe7\xccK\xc9\x8b\x8bE\x89\x03\x00\x00\x00}@Ry\xa69^\xdc\x9d\xa0\x04\xdf \aelO7\xf1\xda\xcc\xa2x\xc2\x9a\xf5\x18F\xa0\x80M\xf9,+\xc9\xf7/nt\x9ba\x14\x1b\x18\xdd\x18X\xd2o\x15\x97L\xe6\xb5\xba\xc7\xf2W\n\x7f\x14ZIL:T\x1bd\x19\x8dE\x9c\xb1\xb9JK\x1do\x85\xe9\xa2\xca\x9cd\b\xc8\xbdiQ_L\xb0\xb9 \xf7/F\xfc\'M#,\x84M\xba\xa9\xa2yr\'?f\tb\xdai\xfd\x8c\x9aoj\x84\x03i\x8a|\xf7T;=p\xa2\x98f\xc7\xefu=\x96\xcb\x11\x91\xce\xce\xbev\xaa\xbb\xca\xfa\xa3\xde\xd5\x1f\xd7\x03:12\xf2\xfd\rN\x84=A\xae\x9b3\x81\xa9~\xb7\x80\xd1\xe2\xf6\xf2\xb8\xc9\x8a\xabC\xe2\xec\xb8,j\xe1\xbb\x1b\x1f@', 0x3)
write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67)
sendfile(r0, r1, &(0x7f0000000380), 0xfffb)
fcntl$addseals(r1, 0x409, 0x8)
fchown(r1, 0x0, 0x0)

20:58:46 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:46 executing program 0:
r0 = timerfd_create(0x0, 0x0)
readv(r0, &(0x7f0000001500)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
creat(&(0x7f0000000080)='./file0\x00', 0x80)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000082000003, 0x8031, 0xffffffffffffffff, 0x0)
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
pkey_free(0xffffffffffffffff)

20:58:46 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getpgrp(0xffffffffffffffff)

20:58:46 executing program 5:
r0 = socket$inet6(0xa, 0x200000000000001, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @multicast1}})
getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000180)=0x40)
setsockopt$inet_buf(r0, 0x0, 0x100000040, &(0x7f0000000040), 0x0)
setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)

[  256.057608][ T7986] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
20:58:47 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
io_setup(0x8, &(0x7f0000000240)=<r2=>0x0)
pipe2(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x0)
write$P9_RLOPEN(r3, &(0x7f0000000040)={0x18}, 0x18)
io_submit(0x0, 0x0, 0x0)
io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x7}])

20:58:47 executing program 3:
close(0xffffffffffffffff)
openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0)
openat$dsp(0xffffffffffffff9c, 0x0, 0x100, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66b8ea000f00d8eadd5484f88a00f0833600660f71d50066ba4100edb8010000000f01d90f0866b8bd008ee0b94d0200000f32360f07", 0x36}], 0xaaaaaaaaaaaabce, 0x0, 0x0, 0x0)
fcntl$setown(r0, 0x8, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

20:58:47 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
r1 = dup(r0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:47 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2)
write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24)
open$dir(&(0x7f0000000080)='./file0\x00', 0x841, 0x0)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0)

20:58:47 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:47 executing program 4:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc)
listen(r1, 0x0)
connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
write$P9_RCLUNK(r0, &(0x7f0000000000)={0x7}, 0x7)

[  256.646102][ T8022] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.
20:58:47 executing program 4:
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
pipe(&(0x7f0000000480)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f0000000340), 0x10000014c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000080)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

20:58:47 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
r1 = dup(r0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:47 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:48 executing program 0:
clock_nanosleep(0x800000002, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000000))

20:58:48 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
r1 = dup(r0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:48 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:48 executing program 3:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x200)
r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0)
pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0)
sendfile(r0, r1, 0x0, 0x102002700)

20:58:48 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
r1 = dup(r0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:48 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
close(r0)

20:58:51 executing program 5:
add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb)

20:58:51 executing program 3:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x200)
r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0)
pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0)
sendfile(r0, r1, 0x0, 0x102002700)

20:58:51 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
r1 = dup(r0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:51 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
close(r0)

20:58:51 executing program 0:
r0 = socket$inet6(0xa, 0x200000003, 0x8000000003c)
getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'security\x00'}, 0x0)

20:58:51 executing program 4:
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
pipe(&(0x7f0000000480)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f0000000340), 0x10000014c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000080)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

20:58:51 executing program 0:
socketpair$unix(0x1, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
mkdir(&(0x7f0000000040)='./control\x00', 0x0)
chmod(&(0x7f00000000c0)='./control\x00', 0x0)
lstat(&(0x7f0000000240)='./control\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0})
capset(&(0x7f0000000580)={0x19980330}, 0x0)
chown(&(0x7f0000000440)='./control\x00', 0x0, r0)
open(0x0, 0x0, 0x0)
fchmod(0xffffffffffffffff, 0x0)

20:58:51 executing program 2:
syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7)

20:58:51 executing program 5:
perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f00000003c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@euid_gt={'euid>'}}, {@dont_appraise='dont_appraise'}]})

20:58:51 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
close(r0)

[  260.627118][ T8097] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use)
20:58:51 executing program 3:
r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3f, 0x0)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0185647, &(0x7f00000000c0)={0x0, 0x200000001, 0x0, [], &(0x7f0000000040)={0x98f905, 0x0, [], @p_u16=0x0}})

20:58:51 executing program 2:
syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7)

20:58:51 executing program 0:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='%roc\x00', 0x0, 0x0)

20:58:51 executing program 3:
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0)

20:58:51 executing program 5:
socket$unix(0x1, 0x0, 0x0)
ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0)
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)

20:58:51 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:52 executing program 4:
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
pipe(&(0x7f0000000480)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f0000000340), 0x10000014c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000080)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

20:58:52 executing program 2:
syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7)

20:58:52 executing program 0:
getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0)
keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f00000013c0)='./file0\x00', 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={<r0=>0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30)
ptrace(0x4218, r0)
r1 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x1ff, 0x20000)
mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0)
chdir(&(0x7f0000000100)='./file0\x00')
ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000040)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpid()
mkdir(&(0x7f0000000180)='./file0\x00', 0x0)
syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0)
syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d909abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef3a19cd9833cbc7153961c01455c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f21524eb2"])
r2 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0)
chdir(&(0x7f0000000280)='./file0\x00')
openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000300)={0xe4, 0x4, 0x8, 0x10000, 0x80000001, 0xffffffffffffff00, 0x11aa8cb60000, 0xffffffffffff689f}, &(0x7f0000000340)=0x20)
stat(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0))
syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000400)='./file1\x00', 0x6, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="8df2a16bfb17c867a86d2dffcb45893802d5f66425716a34608da6eb256e3d9c9bacfafadfdd2e284f0d65bd3e6b2f582020f17394523fd8c71636c7dfd617c08ef67639499fd3a592f8e9507e355b8e320e7491c5bcfebbd7078f65ff34a37523693d631321db92a11591bdd79de90832463e6cf1eccb4985a25fe3e11f2852fd4eb15b1b867fd679f58d8645aad3db55d1e8f7f50038e041210389373d3b53e5baeaf8897d8c7c557309abf26bf075d9a18efa5a71fcad2b44dce19688a5d84bd230d747d4b49a471e73f9765caacbdae760dc5da82509a11c24009322618caf19e8be7ac4d2bea2d92a5c4b", 0xed, 0x2}], 0x10000, 0x0)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000380), 0x4)

20:58:52 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:52 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:52 executing program 2:
r0 = dup(0xffffffffffffffff)
ioctl$KVM_SMI(r0, 0xaeb7)

[  261.704195][ T8156] overlayfs: failed to resolve './file1': -2
20:58:52 executing program 3:
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0)

20:58:52 executing program 2:
r0 = dup(0xffffffffffffffff)
ioctl$KVM_SMI(r0, 0xaeb7)

20:58:52 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

[  261.972898][ T8156] overlayfs: failed to resolve './file1': -2
20:58:52 executing program 2:
r0 = dup(0xffffffffffffffff)
ioctl$KVM_SMI(r0, 0xaeb7)

20:58:53 executing program 5:
socket$unix(0x1, 0x0, 0x0)
ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0)
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)

20:58:53 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:53 executing program 4:
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
pipe(&(0x7f0000000480)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f0000000340), 0x10000014c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000080)={0x0, <r2=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

20:58:53 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"])
ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]})

20:58:53 executing program 2:
r0 = syz_open_dev$dri(0x0, 0x4000007, 0x0)
r1 = dup(r0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:53 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:53 executing program 2:
r0 = syz_open_dev$dri(0x0, 0x4000007, 0x0)
r1 = dup(r0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:53 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:53 executing program 3:
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0)

20:58:53 executing program 2:
r0 = syz_open_dev$dri(0x0, 0x4000007, 0x0)
r1 = dup(r0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:53 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"])
ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]})

20:58:54 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:54 executing program 5:
socket$unix(0x1, 0x0, 0x0)
ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0)
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)

20:58:54 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x0, 0x0)
r1 = dup(r0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:54 executing program 4:
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0)
pipe(&(0x7f0000000480)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write(r0, &(0x7f0000000340), 0x10000014c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000080)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

20:58:54 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"])
ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]})

20:58:54 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:54 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x0, 0x0)
r1 = dup(r0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:54 executing program 2:
r0 = syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x0, 0x0)
r1 = dup(r0)
ioctl$KVM_SMI(r1, 0xaeb7)

20:58:54 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:55 executing program 3:
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0xeb, &(0x7f0000002b80)=[{&(0x7f0000000600)=""/190, 0xbe}], 0x1}}], 0x400023a, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0)

20:58:55 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700fff0ffff04040000000000000a00000006"])
ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x3, 0x0, [{0x390}]})

20:58:55 executing program 2:
syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$KVM_SMI(r0, 0xaeb7)

20:58:55 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10)
r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x8, 0x4)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb493112c459ccaca)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0)
sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000180)={0x2, 0x4e20}, 0x10)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000180), 0x13f698e4b9e296e3, 0x4007ffa, 0x0, 0xfffffffffffffe8c)
close(r0)

20:58:55 executing program 5:

20:58:55 executing program 2:
syz_open_dev$dri(&(0x7f00000015c0)='/dev/dri/card#\x00', 0x4000007, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$KVM_SMI(r0, 0xaeb7)