ffffff}) ioctl$IMHOLD_L1(r0, 0x80044948, 0x0) 03:18:30 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000002fc0)='TIPCv2\x00') 03:18:31 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x240) 03:18:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x7, 0x0, 0x0, 0x100000009}, 0x40) 03:18:31 executing program 0: add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) 03:18:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) socket(0x0, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0) 03:18:31 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$nl_rdma(0x10, 0x3, 0x14) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r12, @ANYBLOB="07000000000000001c001a8018000a8014000700debb0000000000000000000000000001b2c3414e631cb154b5276dd2c4ac"], 0x3c}}, 0x0) 03:18:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0), 0x201085400b409c52) 03:18:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000001c0)=0x40001, 0x4) 03:18:31 executing program 0: prctl$PR_GET_FPEMU(0x9, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) read$midi(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) 03:18:31 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$nl_rdma(0x10, 0x3, 0x14) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r12, @ANYBLOB="07000000000000001c001a8018000a8014000700debb0000000000000000000000000001b2c3414e631cb154b5276dd2c4ac"], 0x3c}}, 0x0) 03:18:31 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') 03:18:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) 03:18:31 executing program 2: syz_open_dev$vcsa(&(0x7f0000001840)='/dev/vcsa#\x00', 0x0, 0x208602) 03:18:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) socket(0x10, 0x80002, 0x0) 03:18:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) close(r0) 03:18:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) 03:18:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000200)) 03:18:31 executing program 2: r0 = gettid() ptrace(0x8, r0) 03:18:32 executing program 0: syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@utf8='utf8'}]}) 03:18:32 executing program 3: add_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="93", 0x1, 0xfffffffffffffffe) add_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000240)="e44c348a20854e40f70bc047b258b7848930db278ceb595d7b2e4c001d124b5597d38fbb754be9df29082057e5f39020263ef775a8eefb17258c251bfe520cba66027b8b2c0f57bd2d38d2175cc0ecf8e526f401af86", 0x56, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x1c500) 03:18:32 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 03:18:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000480)) 03:18:32 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) 03:18:32 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, r0, 0x0) [ 462.524888][ T27] audit: type=1804 audit(1583291912.463:51): pid=12827 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir404338830/syzkaller.U75z0B/36/file0" dev="sda1" ino=16517 res=1 [ 462.561627][T12819] ISOFS: Unable to identify CD-ROM format. 03:18:32 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getpid() shmget$private(0x0, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8a2eb21fba144e7da0f629fb4078533e2e7227178", 0x2a}], 0x2000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@fragment, 0x8) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0xa808) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 03:18:32 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000003800)={0x0, 0x0, 0x0}, 0x0) 03:18:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_genetlink_get_family_id$ethtool(0x0) socket(0x0, 0x80002, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) 03:18:32 executing program 4: clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002240)=[{{&(0x7f0000000540)=@l2tp={0x2, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000900)=""/7, 0x7}, 0x3}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=""/192, 0xc0}, 0x1f}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/156, 0x9c}, {0x0}, {&(0x7f0000000bc0)=""/234, 0xea}, {0x0}, {&(0x7f0000000d00)=""/93, 0x5d}, {&(0x7f0000000d80)=""/103, 0x67}, {0x0}, {&(0x7f0000000e40)=""/183, 0xb7}, {0x0}], 0x9}, 0x1}], 0x3, 0x10000, &(0x7f0000002380)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, 0x0) [ 462.898266][T12819] ISOFS: Unable to identify CD-ROM format. 03:18:33 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1}) 03:18:33 executing program 2: bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x19, 0x0, 0x0, 0x1ff}, 0x3c) 03:18:33 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20\x00', 0x208000, 0x0) 03:18:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/218, 0xda}], 0x1) 03:18:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000004040, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x101) sendfile(r1, r2, 0x0, 0x10000) 03:18:33 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) waitid(0x0, 0x0, 0x0, 0x20000000, 0x0) 03:18:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000004c40)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000005800)={&(0x7f0000004c80)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4}]}]}, 0x30}}, 0x0) 03:18:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x100, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, 0x0) 03:18:33 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x8006, &(0x7f0000000600)=ANY=[]) [ 463.885053][ T27] audit: type=1804 audit(1583291913.823:52): pid=12878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir428957987/syzkaller.xY1ljy/91/file0/file0" dev="sda1" ino=16561 res=1 03:18:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) connect$x25(r0, 0x0, 0x0) 03:18:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getpeername$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002cc0)={&(0x7f0000002740)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8, 0x1, r4}, {0x10c, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x128}}, 0x0) [ 464.049995][ T27] audit: type=1800 audit(1583291913.823:53): pid=12878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16561 res=0 03:18:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) 03:18:34 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000200)={0x0}) 03:18:34 executing program 2: socket$packet(0x11, 0x0, 0x300) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) sendfile(r0, r1, 0x0, 0x8000fffffffe) 03:18:34 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, r0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="d7b657aab88d"}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x55}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x4008004) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f0000000700)={0x7, 'ipvlan0\x00', {0xdaa8}, 0x2}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000740)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000001100)={'batadv_slave_0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000066c0)={@multicast2, @initdev}, &(0x7f0000006700)=0xc) 03:18:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000002000000030000006802000000000000d0000000d00000000000000000000000d0010000d0010000d0010000d0010000d0010000030000000000000000000000ffffffffffffffff00000000ffffffff6970366772653000000000000000000062617461647630000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d00000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000001000000bbbbbbbbbbbb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800000100000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000006e657462696f732d6e7300000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028"], 0x1) 03:18:34 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="00400000001200000000003a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000200ffffe5bf"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xa2b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 03:18:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x2, &(0x7f0000004940)) 03:18:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 03:18:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 03:18:34 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 03:18:34 executing program 0: getitimer(0x0, &(0x7f0000000080)) 03:18:34 executing program 1: r0 = socket$inet6(0xa, 0x10000000000001, 0x0) r1 = dup2(r0, r0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000000000), 0x4) [ 465.084356][ T27] audit: type=1800 audit(1583291915.023:54): pid=12918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16530 res=0 03:18:35 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "92"}}, 0x119) 03:18:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 03:18:35 executing program 2: clock_gettime(0x0, &(0x7f0000002340)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002240)=[{{&(0x7f0000000540)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000880)=[{&(0x7f00000005c0)}, {&(0x7f0000000600)=""/78, 0x4e}, {&(0x7f0000000680)=""/146, 0x92}, {&(0x7f0000000740)=""/16, 0x10}, {&(0x7f0000000780)=""/176, 0xb0}, {&(0x7f0000000840)=""/24, 0x18}], 0x6}, 0x3}, {{0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)=""/192, 0xc0}, 0x1f}, {{&(0x7f0000001100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001180)=""/4096, 0x1000}], 0x1, &(0x7f00000021c0)=""/67, 0x43}, 0xffffffff}], 0x3, 0x10000, &(0x7f0000002380)={r0, r1+10000000}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r3, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000440)) [ 465.329854][ T2876] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 03:18:35 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) r2 = open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) fchdir(r2) [ 465.386417][ T2876] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 [ 465.448906][T12967] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 465.488831][T12973] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:35 executing program 3: socketpair(0x2, 0x1, 0x0, &(0x7f0000000080)) 03:18:35 executing program 4: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) 03:18:35 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getpid() shmget$private(0x0, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@fragment, 0x8) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f00000000c0)={0x0, 0x101}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:18:35 executing program 1: socket$caif_seqpacket(0x25, 0x5, 0x3) socket$can_raw(0x1d, 0x3, 0x1) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000004c40)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000005800)={&(0x7f0000004c80)={0x80, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}]}]}]}, 0x80}}, 0x0) r2 = socket(0x0, 0x80b, 0x0) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f0000001040)=@l2tp={0x2, 0x0, @initdev}, 0x80, &(0x7f00000010c0), 0x0, &(0x7f0000001100)=""/161, 0xa1}, 0x9}, {{&(0x7f00000011c0)=@rc, 0x80, &(0x7f0000002240)=[{&(0x7f0000001240)=""/4096, 0x1000}], 0x1, &(0x7f0000002280)=""/76, 0x4c}, 0x4}, {{&(0x7f0000002300)=@ethernet={0x0, @multicast}, 0x80, 0x0}, 0x100}, {{&(0x7f0000002900)=@un=@abs, 0x80, &(0x7f0000004e80)=[{&(0x7f0000002980)=""/213, 0xd5}, {&(0x7f0000002a80)=""/53, 0x35}, {&(0x7f0000002ac0)=""/228, 0xe4}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/240, 0xf0}, {&(0x7f0000003cc0)=""/31, 0x1f}, {&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/227, 0xe3}, {0x0}, {&(0x7f0000004e40)=""/5, 0x5}], 0xa}, 0x6}, {{&(0x7f0000006300)=@nfc_llcp, 0x80, &(0x7f0000006500)=[{&(0x7f0000006380)=""/92, 0x5c}, {&(0x7f0000006400)=""/177, 0xb1}, {&(0x7f00000064c0)}], 0x3}}], 0x5, 0x22, &(0x7f00000066c0)={0x77359400}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @remote}, &(0x7f0000000200)=0xc) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004bc0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x24}}, 0x0) 03:18:35 executing program 3: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000002300)='keyring\x00', &(0x7f0000002340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 03:18:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) [ 466.090995][T13002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:18:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) 03:18:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r1 = socket(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x0) 03:18:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 466.704653][T13002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:18:36 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x12081ff) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r1, r2, 0x0, 0x200019) 03:18:36 executing program 3: syz_mount_image$minix(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:18:36 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) socket(0x0, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x0) syz_genetlink_get_family_id$ipvs(0x0) waitid(0x2, 0x0, 0x0, 0x20000000, 0x0) 03:18:36 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ocfs2(0x0, &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x1013006, 0x0) 03:18:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) [ 467.098720][ T27] audit: type=1804 audit(1583291917.033:55): pid=13033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/98/bus" dev="sda1" ino=16845 res=1 03:18:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000848}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x8ce67fc4148f3368, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) [ 467.274345][ T27] audit: type=1804 audit(1583291917.183:56): pid=13039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/98/bus" dev="sda1" ino=16845 res=1 03:18:37 executing program 0: request_key(&(0x7f00000029c0)='cifs.spnego\x00', 0x0, 0x0, 0x0) 03:18:37 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 467.413749][T13051] NFS: mount program didn't pass remote address 03:18:37 executing program 0: socket(0x15, 0x0, 0x0) 03:18:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 03:18:37 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x66) 03:18:37 executing program 0: open_tree(0xffffffffffffffff, 0x0, 0x89000) [ 468.441506][ T27] audit: type=1804 audit(1583291918.373:57): pid=13046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/98/bus" dev="sda1" ino=16845 res=1 [ 468.624252][ T27] audit: type=1804 audit(1583291918.563:58): pid=13039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/98/bus" dev="sda1" ino=16845 res=1 03:18:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) prctl$PR_GET_FPEMU(0x9, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) read$midi(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) socket$inet_tcp(0x2, 0x1, 0x0) 03:18:38 executing program 0: syz_emit_ethernet(0x52, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x1c, 0x6, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[@routing], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:18:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) 03:18:38 executing program 4: open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) 03:18:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0x43}, 0x14) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x4) sendto(r0, &(0x7f00000000c0)=':', 0x1, 0x0, 0x0, 0x0) close(r0) [ 468.681743][ T27] audit: type=1804 audit(1583291918.563:59): pid=13093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/98/bus" dev="sda1" ino=16845 res=1 03:18:38 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x40000060) 03:18:38 executing program 0: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:18:38 executing program 2: r0 = gettid() openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) write(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000b40)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) 03:18:38 executing program 4: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r2, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x1d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r1, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+,bdevem1\x00'}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, 0x0, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) fchdir(r6) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r5}}, 0x48) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {0x0, r3, 0x7}}, 0x18) 03:18:38 executing program 3: socket(0x0, 0x500, 0x0) 03:18:39 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000000, 0x0) 03:18:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f00000026c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)=""/4067, 0xfe3}], 0x1, 0x0, 0x0, 0x1f4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) 03:18:39 executing program 1: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)='\x00', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r0}, &(0x7f0000000240)=""/230, 0x1ce, &(0x7f0000000040)={&(0x7f0000000080)={'rmd320-generic\x00'}}) 03:18:39 executing program 3: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2, 0x12, r0, 0x0) 03:18:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, "e3b129848ae0de1533ea6095edff43f6855289"}) 03:18:39 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) 03:18:39 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) fcntl$setstatus(r0, 0x4, 0x4b800) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) open(0x0, 0x0, 0x0) 03:18:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) 03:18:39 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) 03:18:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100), 0x4) 03:18:39 executing program 4: syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100051, 0x0) 03:18:40 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uhid\x00', 0x0, 0x0) 03:18:40 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') 03:18:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 03:18:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x2}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004bc0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) 03:18:40 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) creat(&(0x7f0000000040)='./bus\x00', 0x0) 03:18:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) [ 470.905914][ T27] audit: type=1804 audit(1583291920.843:60): pid=13204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir019979848/syzkaller.S08c7S/92/bus" dev="sda1" ino=16872 res=1 03:18:40 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x22, 0x1}, @window, @window], 0x3) r0 = socket$inet6(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$sock_rose_SIOCDELRT(r3, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x6, @bcast, @bpq0='bpq0\x00', 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast]}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480010003266b1e33206293d0304664c54863875", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800c0001006d6163766c616e000c00028006000200000000000a0005000400000000000000"], 0x48}}, 0x0) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x3c4, r5, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2ca6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x50ae30a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7e53}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf246}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9918}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6db}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77e40b67}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x894a147}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4dff4f4d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4135db54}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2530b749}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x88, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x46b9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x50fd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7fffffff}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd563}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3fb6acd4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4988}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xec76}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xff65}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6abf483f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4154}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x28fe9117}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x64ac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x71cfe0f2}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5296c414}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2974}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x104, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6468485}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x27}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18a42f68}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70356fd0}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c401cba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x51a30e60}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x95}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a15ad3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1823afe5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7092e71c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7425c31}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x258be575}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d4f6c8f}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x666b3fb5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5b580ae9}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15cfa70b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7e}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0xe0, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9abf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6ddf5931}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x620059cd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x678946ce}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x570434f8}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2ae2fefc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x27e7f766}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x834e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x21c47f75}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x9d4f6fa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54eb8963}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60e66dc5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x47787b6f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2cafb12d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3640c7a3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5cb0af80}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bf4ed5e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d7942b6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5c24227}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x30ef}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52516686}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x292ea05f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e983a1d}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61ba762b}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x54, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6dae2dcf}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75e820e3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9c5574d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x88}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x32}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3e89749a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49e6bbf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b4cd635}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x53936b0b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x35}]}]}]}, 0x3c4}, 0x1, 0x0, 0x0, 0x40}, 0x4040000) r6 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$sock_void(r6, 0x1, 0x1b, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 471.025054][ T27] audit: type=1804 audit(1583291920.903:61): pid=13207 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir019979848/syzkaller.S08c7S/92/bus" dev="sda1" ino=16872 res=1 03:18:40 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000180)=""/171, 0xab}], 0x1) 03:18:41 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000480)) [ 471.185414][T13205] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 03:18:41 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) fcntl$addseals(r0, 0x409, 0x0) 03:18:41 executing program 5: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000002c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="bf"], 0x1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000001, 0x0) [ 471.260301][ T27] audit: type=1800 audit(1583291920.913:62): pid=13204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16872 res=0 03:18:41 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@unhide='unhide'}]}) 03:18:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x36}, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev={0xfe, 0x80, [0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a3, r4}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x4}, @mcast1, @rand_addr="657261c70996f4e1596272e2ec4688fa", 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c204c6, r4}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000140)={r5}) [ 471.406288][ T27] audit: type=1804 audit(1583291920.943:63): pid=13207 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir019979848/syzkaller.S08c7S/92/bus" dev="sda1" ino=16872 res=1 03:18:41 executing program 1: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:18:41 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) [ 471.534538][ T27] audit: type=1804 audit(1583291921.003:64): pid=13211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir019979848/syzkaller.S08c7S/92/bus" dev="sda1" ino=16872 res=1 [ 471.654522][T13246] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 471.707337][T13235] ISOFS: Unable to identify CD-ROM format. [ 471.715940][ T27] audit: type=1800 audit(1583291921.003:65): pid=13207 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16872 res=0 [ 471.854304][T13235] ISOFS: Unable to identify CD-ROM format. 03:18:42 executing program 4: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)='b', 0x1, 0xfffffffffffffffe) 03:18:42 executing program 5: write$USERIO_CMD_REGISTER(0xffffffffffffffff, 0x0, 0x0) 03:18:42 executing program 1: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x42, 0x0) 03:18:42 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0) 03:18:42 executing program 0: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x1a14c2) 03:18:42 executing program 2: getresuid(0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000480), 0x80002, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00004b7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:18:42 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 03:18:42 executing program 3: r0 = io_uring_setup(0x2fc, &(0x7f0000000040)={0x0, 0x0, 0x2}) io_uring_enter(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 03:18:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) 03:18:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000440)) 03:18:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x40, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x40}}, 0x0) 03:18:42 executing program 2: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x0, 0x1) write$midi(r0, &(0x7f0000000080)="fc", 0x1) 03:18:42 executing program 4: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x48}}, 0x0) 03:18:42 executing program 3: r0 = eventfd(0x6f) read$eventfd(r0, &(0x7f0000000000), 0x8) 03:18:42 executing program 1: getpid() openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 03:18:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) statx(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)) 03:18:42 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:42 executing program 5: socket(0x22, 0x0, 0x3) 03:18:42 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 03:18:42 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x18, 0x0, 0xb7) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x8, 0x0, "6836c192e99b4c602271f98163af57ac912819ada87f6a778576f2b11b6cda6bb495d5de96c765a0b50df21cb1440d593138769987fb3f77cd2e47a429a6df88ff0615612d7732e5a9d1942cef734eb2"}, 0xd8) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x5) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffe) sendmsg$AUDIT_USER(r3, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)={0x14, 0x3ed, 0x10, 0x0, 0x0, 'V', [""]}, 0x14}}, 0x800) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$nl_crypto(r4, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xf8}, 0x1, 0x0, 0x0, 0x10}, 0x94) 03:18:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x5, 0x201085400b409c52) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) 03:18:42 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, r3) keyctl$search(0xa, r2, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, r1) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r4) request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='/dev/ion\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="b3fd4100", 0x4, r0) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$search(0xa, r5, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, r6) add_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r5) openat$ion(0xffffffffffffff9c, 0x0, 0x8000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) openat$drirender128(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dri/renderD128\x00', 0x42040, 0x0) keyctl$get_persistent(0x16, r9, 0x0) write$binfmt_elf64(r8, &(0x7f00000008c0)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR], 0x22) sendfile(r8, r7, 0x0, 0x4000000003) 03:18:43 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000004600)={&(0x7f0000003280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000045c0)={&(0x7f0000003400)={0xec4, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xe75, 0x1, "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"}]}, 0xec4}}, 0x0) 03:18:43 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) openat$nvram(0xffffffffffffff9c, 0x0, 0x101880, 0x0) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 03:18:43 executing program 4: waitid(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 03:18:43 executing program 0: openat$userio(0xffffffffffffff9c, 0x0, 0x591980, 0x0) 03:18:43 executing program 2: getsockname$llc(0xffffffffffffffff, 0x0, 0x0) [ 473.290355][ T27] audit: type=1800 audit(1583291923.223:66): pid=13338 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16896 res=0 03:18:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 03:18:43 executing program 4: open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) 03:18:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 03:18:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8936, &(0x7f0000000000)) 03:18:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 03:18:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000001100270d000000000000002c82c9749600000000006fb6db093bc81ae410ce44327f012feaa4a51e4c65b2d9234dd79eca77c64e7f39e2c2062958a180fb0d6ea10b132337c0149678a7529d963d903ffc45c067ed548e0031ac5cb9fa186652b99f0538e8355e7477dd151166", @ANYRES32, @ANYBLOB="000000000078a605003ad1800000"], 0x24}}, 0x0) 03:18:44 executing program 5: r0 = open(&(0x7f0000000440)='./bus\x00', 0x161143, 0x0) ftruncate(r0, 0x0) 03:18:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000005100)) 03:18:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) 03:18:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) 03:18:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0x1bffffff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef6202309ded8974895abeaf4b4834ff909b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) [ 474.128878][T13380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:18:44 executing program 4: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x1, 0x50e9}) 03:18:44 executing program 1: socket(0x40000000015, 0x5, 0x0) 03:18:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000980)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x0, 0xc, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ad66e02b"}, 0x0, 0x0, @planes=0x0}) 03:18:44 executing program 0: mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:18:44 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) 03:18:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) 03:18:44 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x40002) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x210, 0x0, 0x0, [{{}, {0x0, 0x0, 0x4, 0x0, ',(&/'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {0x0, 0x0, 0x21, 0x0, '.securitynodev.\\$posix_acl_access'}}, {{}, {0x0, 0x0, 0x5, 0x0, 'ppp0~'}}]}, 0x210) 03:18:44 executing program 2: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece400ea, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000004c80)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x44c, 0x21, 0x0, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @mcast2, [{0x0, 0x5, "fa295ba38efaa66f5942dd4d701b0a53804dd8c587749f831cafa728e6274ebc81eb4d6fedb40be1"}, {0x0, 0x81, "3ce1279f0fb73876785500e4739be9601142c65c84b90f4b001b86db1e65a6af2e0a8a8008449d56e68f20fc254760894eb4ccea94cb488d658226e1db7b0c3a4c523666fb0f5f28cba1c9ffe8abe8225f6f361b6a2e23940886566c25b30c9e9a4344f2bd3c5e16f5c0dee35d54309a9bbd239cc6e66a66cc4acc7aa118dfa8bdbf3c3e6a0e5b154b9ff939debe8d37b60a7fdd9571a95c277c5c257c8ed900359345c6fb34d8ef3ec72ac8c85c3ba1b4d1c47166b59deb2317adeac0258131b1aba4ffeebe648af34390da12197b071d7bffd2a7d416b2cb7d87f071d2d52a9fe666e5a3896610b789315fbf2e1b48868af53cbf408aba7c478c55f6458ff4adbeac29d5ff98090af9bb985e23b33d7853cf71f15a0ab22c86df5b6a0e35607c4795b57b62131a783866662f78be47383db8504b5f877690ab25fbd58016b37fe49e12e25d6a878cd74a50b0c551538aa59ba715459e200db174c3c382eaad6b0346474e89ce67fd9ad5141eb69d04da8f8abb555b6ddeef14d6be5e586f1058f2f4cf0d56e63e6a2e228dd1179546687f1c5d002212bc37fa10d81f757a6dd351fbe3be3208e34ccaa93b6c27e2bdc6c8d199f1808ba9cfe8992a0c3ef635ca1074536b0d24f62d01651d06cb78017f8a712b748e4280399a6b770261d6fcf26aebed86b2b6811115a9bf0257e469cc97c0aa221ab5c1152379e3d8eb94f02988f748a2d52f1cb61be19b8e2234b6391ca6741d49939d6b29070730b1bcf0eaeb6f96352c9d4612159d6010c2c8e14ca32efb971e1623cb4d3636cb84d52fd49ad73e928defcf229f1b3e355995e28f36411f66232457e96141130b3145dffd10954949bdcb8e34b144aa5e4ebc17750d95e85fade2fbf03260ca015ed4cf828476f379c466cb0f650f9200f3b2546e1011fb06bfe1bdc524dc889b55e44bc0900ffe09dd51e2989ee5186d604add5e00f9f9840798d9dc0a6c6612e2c61169a337cfef79c67c010aba8fd550968069aecbf77e3cd992f2eead3b39d573f041f97b0636e57336c1bbc9db39d0a38d2033d44a368f988d077248805e2f0eddfe6e3b264edb5819fd125e7417b0dbd3b75450c0a4dd76e4ed7b8c48502b0e58cee70667999e7a45490f29f6c6943baf337ac581b0b033bac212e844342675935fd394a0cd6d48b5093232dac032958db905fa976daed6755917dbda7ebf14112a1b8c3865f518d215958b1612a33b4fd9b9a9f36dfdfa43e1042236046800e89e556900f7940d5e4385e7dc2c14784d07e9eba66b380c9e08c7b55bf2886a42ff930be67c1c7260a16336bee506dd70220be1c0c45b31db873346fb5d0b80578fd3c4bd7b6eb504dd2251bbefe149c4ac3eb756858c7da00c8bc610ea432e86953f6d2a4fed4d3184e6beba911f13dd1e64874d1dcc2cdbb5de19cafd4c8cdb87300bf3bfb0fd6b"}]}}}}}, 0x47e) getgid() setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 03:18:44 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x6, 0x0, 0xb5}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000023c0)={0x0, 0xc1, "aa02de2a8af70d11f798656b1d143594585349a80084bfb13dd7a795df09135b4677b1d9910bb4bfcdeb8356662c7a2e75099e33e3348d857a0a83856e8d6bd80ff8bc3c0e73c17e9ab2a0e315148cdb66e4e5e6dc700306979854e35fb28694b5f2d1e2ac37e8a616f6f688591ac4e0233db15c9ee25fc2bb1a23d28192be6c25ec6eaa4a5bf4a7d31cd9445584b4d981474302a6b56a02462275b0d12487ee288177253897bb69faab3f0e103e87af9890e5eba0730cead30192ce9f1fab2665"}, &(0x7f00000024c0)=0xc9) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x6023c1, 0x0) 03:18:44 executing program 5: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0x0, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 03:18:44 executing program 1: clock_gettime(0x0, &(0x7f0000002340)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000023c0)={0x0, 0xc1, "aa02de2a8af70d11f798656b1d143594585349a80084bfb13dd7a795df09135b4677b1d9910bb4bfcdeb8356662c7a2e75099e33e3348d857a0a83856e8d6bd80ff8bc3c0e73c17e9ab2a0e315148cdb66e4e5e6dc700306979854e35fb28694b5f2d1e2ac37e8a616f6f688591ac4e0233db15c9ee25fc2bb1a23d28192be6c25ec6eaa4a5bf4a7d31cd9445584b4d981474302a6b56a02462275b0d12487ee288177253897bb69faab3f0e103e87af9890e5eba0730cead30192ce9f1fab2665"}, &(0x7f00000024c0)=0xc9) 03:18:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0x1bffffff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef6202309ded8974895abeaf4b4834ff909b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 03:18:45 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/adsp1\x00', 0x0, 0x0) read$dsp(r0, 0x0, 0x0) 03:18:45 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x19}}, 0x0) 03:18:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x100, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}}, 0x20000000) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, 0x0) 03:18:45 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x800000) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, 0x0, 0x4040001) waitid(0x2, 0x0, 0x0, 0x20000000, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f00000018c0)=[{&(0x7f00000004c0)="6468e850949cddf5e925c62f6fe77a6ce523ef01bfeab2cd1ae420544804494f532c8fbb62b2ec27dd5fa77622221b67046e42dc6ae7a4c1", 0x38, 0x80000000}, {0x0, 0x0, 0x48acd292}, {0x0, 0x0, 0x2}, {&(0x7f0000001580)="37cab7b507f4155a672e4d4a7be786bac558ba5b3cbff845d555a19e4112036055d2a63d1c634f41b59f3f09f531728c6f67885c36ed81b22625fd96245ee6a3", 0x40}, {0x0}], 0x8006, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 03:18:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@nat={'nat\x00', 0x1b, 0x5, 0x41c, 0x254, 0x254, 0x254, 0x254, 0x254, 0x388, 0x388, 0x388, 0x388, 0x388, 0x5, 0x0, {[{{@ip={@local, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth1_to_bridge\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@ip={@remote, @multicast1, 0x0, 0x0, 'veth0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xa4}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key}}}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'ip_vti0\x00', 'ip_vti0\x00'}, 0x0, 0xb0, 0xe4, 0x0, {}, [@common=@set={{0x40, 'set\x00'}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x0, @local, @loopback, @icmp_id, @gre_key}}}}, {{@uncond, 0x0, 0x100, 0x134, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}, @common=@set={{0x40, 'set\x00'}}]}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x0, @loopback, @multicast2, @port, @icmp_id}}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x478) 03:18:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev={0xfe, 0x80, [0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, r3}) 03:18:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) 03:18:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000001c0), 0x4) 03:18:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'batadv_slave_1\x00'}) [ 476.003089][T13478] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 03:18:46 executing program 1: r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) 03:18:46 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, 0x0, 0x181000) [ 476.237547][T13488] batman_adv: batadv0: Interface deactivated: batadv_slave_1 03:18:46 executing program 3: syz_open_dev$vcsa(0x0, 0x0, 0x0) 03:18:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 03:18:46 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x8, 0x0, "6836c192e99b4c602271f98163af57ac912819ada87f6a778576f2b11b6cda6bb495d5de96c765a0b50df21cb1440d593138769987fb3f77cd2e47a429a6df88ff0615612d7732e5a9d1942cef734eb2"}, 0xd8) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x5) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) sendmsg$AUDIT_USER(r2, &(0x7f00000001c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000500)={0x14, 0x3ed, 0x10, 0x0, 0x0, 'V', [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) sendmsg$nl_crypto(r3, 0x0, 0x0) 03:18:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 03:18:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r3, @ANYBLOB="0000000000000000080000000900010072737670000000000c00020008000200e0000001ec7210dacea2d1f27f221f619372305ecd21701f72006b721303de"], 0x3c}}, 0x0) 03:18:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 03:18:46 executing program 3: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) 03:18:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000340)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600b42e006000a0090040300001af5c96824", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 03:18:46 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETISPACE(0xffffffffffffffff, 0x8010500d, &(0x7f0000000140)) 03:18:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 03:18:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80080d8c560a117fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010009080800418e00000004fcff", 0x58}], 0x1) 03:18:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 477.064209][T13526] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:18:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4$packet(r1, 0x0, 0x0, 0x0) 03:18:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@caif=@util={0x25, "ced68ca94c8de8c965f1435f1100850f"}, 0x80) 03:18:47 executing program 4: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) accept4$bt_l2cap(r0, 0x0, 0x0, 0x0) 03:18:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r0) [ 477.431323][T13535] minix_free_inode: bit 1 already cleared 03:18:47 executing program 5: clock_gettime(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r1}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xb5}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000023c0)={r1, 0xc1, "aa02de2a8af70d11f798656b1d143594585349a80084bfb13dd7a795df09135b4677b1d9910bb4bfcdeb8356662c7a2e75099e33e3348d857a0a83856e8d6bd80ff8bc3c0e73c17e9ab2a0e315148cdb66e4e5e6dc700306979854e35fb28694b5f2d1e2ac37e8a616f6f688591ac4e0233db15c9ee25fc2bb1a23d28192be6c25ec6eaa4a5bf4a7d31cd9445584b4d981474302a6b56a02462275b0d12487ee288177253897bb69faab3f0e103e87af9890e5eba0730cead30192ce9f1fab2665"}, &(0x7f00000024c0)=0xc9) 03:18:47 executing program 4: fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0) 03:18:47 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000980)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000100", @ANYRES32=0x0, @ANYBLOB="0000b20000000000d6b158f055b07fdedc1ae33a9cc019e88c8ccf13b7f198d44114796c14cce2b65956f1b3b6a6077c6e651ee55d12b3a17fb3ca01eb6834c2fb7f292c660404d009ab6529fde64f459ae4ff59244ff040f7693118c4955f81a8ac8700caee35d49bd3504d6b19af868dd9c2d4930be2d6f56cef1fe1c24603771f9c34156e35f0ede67bf797c0e21a95139c095b911427e018c045f4b37222d89b52e129df2ac458c0e60d7f8f2d5b960b9be50110066eca1a43a06174791bb1905923e720799de1d31f45206ab5cbca579abdccb2312edf4d415b8daa267a1e1c71458d921a18c3a659e4808b1a24aac474ccacb2cfb47c35602804"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)}, 0x0) [ 477.561261][T13535] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:18:47 executing program 0: openat$nvram(0xffffffffffffff9c, 0x0, 0x101880, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) mknod(0x0, 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000340)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600b42e006000a0090040300001af5c96824", 0x12, 0x400}], 0x0, 0x0) 03:18:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, 0x0, 0x0) 03:18:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, r0) 03:18:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind(r0, &(0x7f0000000540)=@tipc=@id, 0x80) [ 477.836530][T10698] minix_free_inode: bit 1 already cleared 03:18:47 executing program 5: unshare(0x24020400) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 03:18:47 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) mmap$binder(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 03:18:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) 03:18:48 executing program 4: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r1, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='+,bdevem1\x00', r3}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = open(0x0, 0x0, 0x0) fchdir(r6) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {0x0, r4, 0x7}}, 0x18) 03:18:48 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000740)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) [ 478.225975][T13595] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 478.251353][T13595] minix_free_inode: bit 1 already cleared 03:18:48 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000004600)={0x0, 0x0, &(0x7f00000045c0)={&(0x7f0000003400)={0xec4, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xe75, 0x1, "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"}]}, 0xec4}}, 0x0) 03:18:48 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 03:18:48 executing program 3: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 03:18:48 executing program 5: clock_gettime(0x0, &(0x7f0000002340)) recvmmsg(0xffffffffffffffff, &(0x7f0000002240)=[{{&(0x7f0000000540)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000880)=[{&(0x7f00000005c0)}, {&(0x7f0000000600)=""/78, 0x4e}, {&(0x7f0000000680)=""/146, 0x92}, {&(0x7f0000000740)=""/16, 0x10}, {&(0x7f0000000780)=""/176, 0xb0}, {&(0x7f0000000840)=""/24, 0x18}], 0x6, &(0x7f0000000900)=""/7, 0x7}, 0x3}, {{0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)=""/192, 0xc0}}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/156, 0x9c}, {&(0x7f0000000b80)=""/51, 0x33}, {&(0x7f0000000cc0)=""/11, 0xb}, {&(0x7f0000000d80)=""/103, 0x67}, {&(0x7f0000000e00)=""/57, 0x39}, {&(0x7f0000000f00)=""/211, 0xd3}], 0x6, &(0x7f00000010c0)=""/31, 0x1f}, 0x1}, {{&(0x7f0000001100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002180)}, 0xffffffff}], 0x4, 0x10000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r2, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x56, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c83"}, &(0x7f0000000440)=0x5e) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x6, 0x0, 0xb5}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000023c0)={0x0, 0x8f, "aa02de2a8af70d11f798656b1d143594585349a80084bfb13dd7a795df09135b4677b1d9910bb4bfcdeb8356662c7a2e75099e33e3348d857a0a83856e8d6bd80ff8bc3c0e73c17e9ab2a0e315148cdb66e4e5e6dc700306979854e35fb28694b5f2d1e2ac37e8a616f6f688591ac4e0233db15c9ee25fc2bb1a23d28192be6c25ec6eaa4a5bf4a7d31cd9445584b4"}, &(0x7f00000024c0)=0x97) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000002500)={r3, 0xfff, 0xc000}, 0x8) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f0000000000)) 03:18:48 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) mount$9p_tcp(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x209008, 0x0) 03:18:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev={0xfe, 0x80, [0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 03:18:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba72764f460593d41d43e9f589502652fe815ef1da2c0975e828d69536eb96c2c27f564dcc44d2a18bf98a8698f09764ff95bda5a0520964e8e84670e557cc255a621254e23c5e3afd68721e31a0caa4ac9e40a612dd4bff3553cc00a47f618b8289ce1086193ea338ae5473fc048d1e696a52f65d00d34ed03cfb8125020463ba3054af5f7a2fd4c733242927960b07d0d81f303157417af8907b820d74a1dc84ea78e317584a11da56d5842dec5823a376d939a621adf86c8297db303ab14b7fa0cfa4316987c1ac3303f6acdaa8a946496cb09a6a0785a49f67cfe7725ff477933e4f38d99e6062f1bec6c4e857d64a8ba966cc4c024177bb10e4f5c05db8e7d4cd2437cff4067d9c6f68d8faf4342112a53e640e2c070ed68a364a209139ad", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xfffd}, &(0x7f0000000040)=0x90) 03:18:48 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), 0x4) fcntl$setstatus(r0, 0x4, 0x4b800) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) 03:18:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 03:18:51 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) 03:18:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x40000000) 03:18:51 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) mmap$snddsp_status(&(0x7f0000ffb000/0x4000)=nil, 0x1000, 0x0, 0x10, r0, 0x82000000) 03:18:51 executing program 5: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000100)=0x4000) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0}) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000001b00)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$dsp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x4000041) accept$unix(0xffffffffffffffff, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) 03:18:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xfffd}, &(0x7f0000000040)=0x90) 03:18:51 executing program 3: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r2}, 0x1d) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x13f}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}}}, 0x20) r5 = open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) fchdir(r5) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}, r4}}, 0x48) 03:18:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000025c0)=[{{&(0x7f0000000180)={0xa, 0x4e20, 0x0, @dev}, 0x1c, &(0x7f00000013c0)=[{&(0x7f00000001c0)="85525f6b0196a105342ca2c910a031", 0xf}, {&(0x7f0000000240)="f1348694b932cfbbab283c8be2797df57e39d64989c3ed83d71c62f61bd032ff68bb18ff40a18a99d2ac03bb6cdc09e8ce6ad932837d6e0612e0b53cb78c0bd7d52a40d252ced3da01379a62632d2267e555bac364a3df956f9850e36c87cbba70bd66da0f2356d01d32985012495b59a7e4e4cdc7313cb7b12890e00365d574c6804c34f31598df58f49d03845ca84d40b0b46e77f7b64e908d25f5eee7e8235adcf69adf030b73ca8e9d1c959b3994383824978102647ef1d1b0f16b762f26be7cdeb4325f3a383ee43f7c363dc0da55241ec1d97b", 0xd6}, {&(0x7f0000000340)="77a841e4d9aa8a158e7785f3ddbbc2a8821606282b01260d16a74edb09dbe0d350cb95ed7bdc44c46fd75a40c9bd3a9672ac61e390de5b1158ed900f471501da829d0a9e7c89d6133fb8db", 0x4b}, {&(0x7f00000003c0)="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", 0x464}], 0x4, &(0x7f0000001440)=ANY=[@ANYBLOB="300000000000000029000000040000000002000000000053ffffffffffffff0000000000000000000c01000000000000"], 0x30}}, {{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000001500)="e6", 0x1}], 0x1}}], 0x4000393, 0x2004c840) 03:18:51 executing program 0: r0 = fsopen(&(0x7f0000000000)='9p\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 03:18:51 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0)='nl80211\x00') 03:18:51 executing program 5: getgroups(0x1, &(0x7f0000002840)=[0x0]) 03:18:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0x18) 03:18:51 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) pipe(&(0x7f0000000200)) 03:18:51 executing program 4: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0xe082) 03:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4b, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x15, 0x6, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"10"}}}}}}}, 0x0) 03:18:52 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) 03:18:52 executing program 1: socket$packet(0x11, 0x0, 0x300) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) sendfile(r0, r1, 0x0, 0x8000fffffffe) 03:18:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xfffd}, &(0x7f0000000040)=0x90) 03:18:52 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, 0x0, 0x0) 03:18:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 03:18:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x1269, 0x0) 03:18:52 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:18:52 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 03:18:52 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={0x0}}, 0x0) 03:18:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000005f80)={0x5, 0x2a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x2) 03:18:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 03:18:52 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getpid() openat$drirender128(0xffffffffffffff9c, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x4) io_uring_setup(0x5b2, &(0x7f0000003400)={0x0, 0x0, 0x5}) getgid() 03:18:52 executing program 0: r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, r0) 03:18:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x10000, &(0x7f00000001c0)='i<\xd1\x01\xa91\xc0\x83ATI\xf7\t@c\xf6\xe47\x95\xe7j\xa3\x91\x85V\x9em\xe0\x17\"\xe9\xf5\xe0r\xce\x94=\xb7T\xd0%\xe1\x7f\x06Y\xe6\\\x03\x14_T\xd8\xaf@\xee\xd9\x83\n*\xb4\x8bidt:\xb6\xf3J\xa5c\xdb\x12\x9fDF#\xcf\xb0G\x8d \x84\xd0\xa8_!\xac\xd8\x9a\xa4\xbc\xe3\x19\x84\xcf\x99K \x82\x8bIC\xf8\xc3~V\x90\xc3\xc6\xb0\xd8\xb3\x82}\xb6\x02\xc2cw\xf6\xcd\xb3\xc2l\x04\xc4\xf3\x9e-EE\xa5\xe1\xbd\xa2\xd1v\xc3\xd0\x83CU\xf37\xbf\xd8\x98.\xbf\x8be5pyz\x1e\xbfm\xfa\xd9\xaf\x8e\x1dL') [ 482.959434][T13756] ion_buffer_destroy: buffer still mapped in the kernel 03:18:53 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getdents(r0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:18:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) getdents(r0, 0x0, 0x0) 03:18:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)="6f6ab4d3befa658fb24d2a8e80215bf0", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000540)="bf", 0x1}], 0x1}}], 0x2, 0x0) 03:18:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008900)=[{0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000001500)="b7", 0x1}, {&(0x7f0000000240)="91", 0x1}], 0x2}], 0x1, 0x0) dup(0xffffffffffffffff) 03:18:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x20}, 0x20}}, 0x0) [ 483.541672][T13795] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x18d, 0x4800) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x50d000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000200)={0x800}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000300)=""/31, 0x1f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmmsg(r3, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000000740)}}], 0x1, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="740000006404200029bd7000fcdbdf250303cce61ec5b62f08c052b8367f4a358efe6b1f911103fc9d3ef6944378f6db0c739d8c1f70cf0e3a797782af11dbf1ae10925aabeecca991a425fcd2fa235fee216ed62f240a5a7c9a2d5af949234dddbafdad807d4cf4fb8e62a8139bc88121ee50e2"], 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x2002c010) 03:18:53 executing program 3: clone(0x2000d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x300, 0x190, 0x0, 0x0, 0x190, 0x0, 0x268, 0x268, 0x268, 0x268, 0x268, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0cbc8f0d864040bc25b2b73a59aa64cab6b1d2cc0506efeb70b5bc8c2d4ba3a94a2d2393e3182f64694d7d05fb478c8f56627a5cf905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x1}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x360) 03:18:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)="6f6ab4d3befa658fb24d2a8e80215bf0", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000540)="bf", 0x1}, {&(0x7f0000000580)="f929d17d6e67b54a96d3c978073fdc", 0xf}], 0x2}}], 0x2, 0x0) 03:18:53 executing program 4: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) [ 483.824584][T13811] Cannot find add_set index 0 as target 03:18:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="6f6aced3befa658fb24d62b32a8e8021573bdce1fd3c98cb99c84e52acb069063a6ec3de3e2d5509a5fa393ecbab840e3a9938a84175d4a2b9b49195909fa77872dd4e9f26575b075f1c2cdf766a7208f545d6e785f089cc527208f7a555e39e8176ed49d790737d73593281dbc6bdcd2d1d98f4240148cbe855bca0abaafd5504e042eb547b6df70cd94b77ddb121efb1a56948631ed5261f118f3edd859b45b797056d6166cfc1234f3f9023148dc897603492f7e6c073b9a11b3043b309ee49a6d9d968970c7ad4cda64b8433714503d23f49ff736ad7b8e61c5194a3c238278cf17f04af2500"/242, 0xf2}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000040)="bf3a44dcada9379429b4f21797c76967d2fc8a0847824b8501010000d80d4678913107bfb59126a8306116d87a9b93e62275a9ca3c7cc1f8d11f5db27706995849ead3c26afe7bcabd6fe017fd0f1eefd5016d6dada13c6eb104f9935672be62226bf965e1e370637f83e27059e4e55ec9d2bc0ea2b59af41aa1443a93b64b2f75d7bf5315a9a7552cf1d7d2e0add191cdd713edd82056060000002c4cb56f68b7a05944b696d4c8f6b0ec194822416efbb1c4343bb1acc62a2cad5b5a3b24817eb0", 0xc2}], 0x1}}], 0x2, 0x0) 03:18:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r3, r4, 0x0, 0x7ffffe0f) 03:18:53 executing program 0: clock_gettime(0x0, &(0x7f0000002340)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002240)=[{{&(0x7f0000000540)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000880)=[{&(0x7f00000005c0)}, {&(0x7f0000000680)=""/146, 0x92}, {0x0}, {&(0x7f0000000780)=""/176, 0xb0}, {0x0}], 0x5, &(0x7f0000000900)=""/7, 0x7}, 0x3}, {{0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)=""/192, 0xc0}, 0x1f}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/156, 0x9c}, {&(0x7f0000000b80)=""/51, 0x33}, {&(0x7f0000000bc0)=""/234, 0xea}, {&(0x7f0000000cc0)=""/11, 0xb}, {&(0x7f0000000d00)=""/93, 0x5d}, {&(0x7f0000000d80)=""/103, 0x67}, {&(0x7f0000000e00)=""/57, 0x39}, {&(0x7f0000000e40)=""/183, 0xb7}, {&(0x7f0000000f00)=""/211, 0xd3}], 0x9, &(0x7f00000010c0)=""/31, 0x1f}}, {{&(0x7f0000001100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001180)=""/4096, 0x1000}], 0x1, &(0x7f00000021c0)=""/67, 0x43}, 0xffffffff}], 0x4, 0x10000, &(0x7f0000002380)={r0, r1+10000000}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42800) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r4, &(0x7f0000000640)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba72764f460593d41d43e9f589502652fe815ef1da2c0975e828d69536eb96c2c27f564dcc44d2a18bf98a8698f09764ff95bda5a0520964e8e84670e557cc255a621254e23c5e3afd68721e31a0caa4ac9e40a612dd4bff3553cc00a47f618b8289ce1086193ea338ae5473fc048d1e696a52f65d00d34ed03cfb8125020463ba3054af5f7a2fd4c733242927960b07d0d81f303157417af8907b820d74a1dc84ea78e317584a11da56d5842dec5823a376d939a621adf86c8297db303ab14b7fa0cfa4316987c1ac3303f6acdaa8a946496cb09a6a0785a49f67cfe7725ff477933e4f38d99e6062f1bec6c4e857d64a8ba966cc4c024177bb10e4f5c05db8e7d4cd2437cff4067d9c6f68d8faf4342112a53e640e2c070ed68a364a209139ad", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r5, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r5, 0x56, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c83"}, &(0x7f0000000440)=0x5e) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000100)={r5, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000023c0)={r5, 0xbb, "aa02de2a8af70d11f798656b1d143594585349a80084bfb13dd7a795df09135b4677b1d9910bb4bfcdeb8356662c7a2e75099e33e3348d857a0a83856e8d6bd80ff8bc3c0e73c17e9ab2a0e315148cdb66e4e5e6dc700306979854e35fb28694b5f2d1e2ac37e8a616f6f688591ac4e0233db15c9ee25fc2bb1a23d28192be6c25ec6eaa4a5bf4a7d31cd9445584b4d981474302a6b56a02462275b0d12487ee288177253897bb69faab3f0e103e87af9890e5eba0730cead30192"}, &(0x7f00000024c0)=0xc3) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000002500)={r6, 0xfff, 0xc000}, 0x8) r7 = openat$kvm(0xffffffffffffff9c, 0x0, 0x6023c1, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_CLOCK(r8, 0x8030ae7c, &(0x7f0000000000)) ioctl$FS_IOC_GETFLAGS(r7, 0x80086601, &(0x7f0000000100)) 03:18:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x18d, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x50d000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000200)={0x800}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000300)=""/31, 0x1f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmmsg(r3, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000000740)}}], 0x1, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="740000006404200029bd7000fcdbdf250303cce61ec5b62f08c052b8367f4a358efe6b1f911103fc9d3ef6944378f6db0c739d8c1f70cf0e3a797782af11dbf1ae10925aabeecca991a425fcd2fa235fee216ed62f240a5a7c9a2d5af949234dddbafdad807d4cf4fb8e62a8139bc88121ee50e2"], 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x2002c010) [ 484.230194][T13836] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="6f6aced3befa658fb24d62b32a8e8021", 0x10}], 0x1}}], 0x1, 0x0) 03:18:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:54 executing program 2: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) [ 484.675206][T13856] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:54 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) 03:18:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:54 executing program 3: [ 485.029770][T13870] xt_CT: You must specify a L4 protocol and not use inversions on it [ 485.074858][T13873] input: syz1 as /devices/virtual/input/input7 03:18:55 executing program 5: 03:18:55 executing program 4: 03:18:55 executing program 3: 03:18:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:55 executing program 5: [ 485.264517][T13873] input: syz1 as /devices/virtual/input/input8 03:18:55 executing program 3: 03:18:55 executing program 4: 03:18:55 executing program 5: 03:18:55 executing program 2: 03:18:55 executing program 0: 03:18:55 executing program 3: 03:18:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:55 executing program 4: 03:18:55 executing program 5: 03:18:55 executing program 3: 03:18:55 executing program 0: 03:18:55 executing program 2: 03:18:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:56 executing program 4: 03:18:56 executing program 5: 03:18:56 executing program 3: 03:18:56 executing program 0: 03:18:56 executing program 2: 03:18:56 executing program 5: 03:18:56 executing program 4: 03:18:56 executing program 0: 03:18:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:56 executing program 3: 03:18:56 executing program 5: 03:18:56 executing program 2: 03:18:56 executing program 4: [ 486.616476][T13937] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:56 executing program 0: 03:18:56 executing program 3: 03:18:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:56 executing program 5: 03:18:56 executing program 2: 03:18:56 executing program 4: 03:18:56 executing program 0: 03:18:57 executing program 5: 03:18:57 executing program 3: [ 487.078279][T13955] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:57 executing program 4: 03:18:57 executing program 2: 03:18:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:57 executing program 0: 03:18:57 executing program 5: 03:18:57 executing program 3: 03:18:57 executing program 4: 03:18:57 executing program 2: [ 487.554567][T13977] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:57 executing program 5: 03:18:57 executing program 0: 03:18:57 executing program 3: 03:18:57 executing program 4: 03:18:57 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:57 executing program 2: 03:18:57 executing program 5: [ 487.896291][T13991] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:57 executing program 3: 03:18:57 executing program 4: 03:18:57 executing program 0: 03:18:58 executing program 2: 03:18:58 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:58 executing program 5: 03:18:58 executing program 3: 03:18:58 executing program 0: 03:18:58 executing program 4: 03:18:58 executing program 2: [ 488.306543][T14006] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:58 executing program 3: 03:18:58 executing program 5: 03:18:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000040)) 03:18:58 executing program 0: 03:18:58 executing program 2: 03:18:58 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:58 executing program 5: 03:18:58 executing program 3: 03:18:58 executing program 4: 03:18:58 executing program 0: [ 488.772627][T14030] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:58 executing program 2: 03:18:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:58 executing program 3: 03:18:59 executing program 2: 03:18:59 executing program 0: 03:18:59 executing program 4: 03:18:59 executing program 5: [ 489.109910][T14045] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:59 executing program 3: 03:18:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:59 executing program 2: 03:18:59 executing program 5: 03:18:59 executing program 4: 03:18:59 executing program 0: 03:18:59 executing program 3: 03:18:59 executing program 2: [ 489.481500][T14064] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:59 executing program 5: 03:18:59 executing program 4: 03:18:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:18:59 executing program 2: 03:18:59 executing program 0: 03:18:59 executing program 3: 03:18:59 executing program 5: 03:18:59 executing program 4: [ 489.867920][T14078] xt_CT: You must specify a L4 protocol and not use inversions on it 03:18:59 executing program 2: 03:18:59 executing program 5: 03:18:59 executing program 0: 03:18:59 executing program 3: 03:18:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:00 executing program 4: 03:19:00 executing program 2: 03:19:00 executing program 3: 03:19:00 executing program 0: [ 490.288828][T14100] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:00 executing program 5: 03:19:00 executing program 4: 03:19:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:00 executing program 2: 03:19:00 executing program 3: 03:19:00 executing program 0: 03:19:00 executing program 5: 03:19:00 executing program 4: [ 490.684435][T14120] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:00 executing program 2: 03:19:00 executing program 3: 03:19:00 executing program 0: 03:19:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:00 executing program 5: 03:19:00 executing program 4: 03:19:00 executing program 2: 03:19:00 executing program 0: 03:19:01 executing program 3: [ 491.026654][T14134] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:01 executing program 5: 03:19:01 executing program 4: 03:19:01 executing program 2: 03:19:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:01 executing program 3: 03:19:01 executing program 0: 03:19:01 executing program 5: 03:19:01 executing program 4: 03:19:01 executing program 2: 03:19:01 executing program 3: [ 491.507076][T14156] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:01 executing program 0: 03:19:01 executing program 5: 03:19:01 executing program 4: 03:19:01 executing program 3: 03:19:01 executing program 2: 03:19:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:01 executing program 0: 03:19:01 executing program 4: 03:19:01 executing program 5: 03:19:01 executing program 3: 03:19:02 executing program 0: 03:19:02 executing program 2: 03:19:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:02 executing program 4: 03:19:02 executing program 5: 03:19:02 executing program 3: 03:19:02 executing program 0: 03:19:02 executing program 2: 03:19:02 executing program 3: 03:19:02 executing program 4: 03:19:02 executing program 5: 03:19:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:02 executing program 2: 03:19:02 executing program 3: 03:19:02 executing program 0: 03:19:02 executing program 4: 03:19:02 executing program 5: 03:19:02 executing program 2: 03:19:02 executing program 3: 03:19:02 executing program 4: 03:19:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 03:19:02 executing program 5: 03:19:02 executing program 0: 03:19:03 executing program 2: 03:19:03 executing program 3: 03:19:03 executing program 4: 03:19:03 executing program 0: 03:19:03 executing program 5: 03:19:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 03:19:03 executing program 2: 03:19:03 executing program 4: 03:19:03 executing program 3: 03:19:03 executing program 0: 03:19:03 executing program 5: 03:19:03 executing program 2: 03:19:03 executing program 4: 03:19:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 03:19:03 executing program 3: 03:19:03 executing program 5: 03:19:03 executing program 0: 03:19:03 executing program 2: 03:19:03 executing program 4: 03:19:03 executing program 3: 03:19:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) 03:19:04 executing program 2: 03:19:04 executing program 5: 03:19:04 executing program 0: 03:19:04 executing program 4: 03:19:04 executing program 2: 03:19:04 executing program 3: 03:19:04 executing program 5: 03:19:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) 03:19:04 executing program 0: 03:19:04 executing program 4: 03:19:04 executing program 2: 03:19:04 executing program 3: 03:19:04 executing program 5: 03:19:04 executing program 4: 03:19:04 executing program 0: 03:19:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) 03:19:04 executing program 3: 03:19:04 executing program 2: 03:19:04 executing program 5: 03:19:04 executing program 4: 03:19:04 executing program 0: 03:19:05 executing program 2: 03:19:05 executing program 3: 03:19:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xa8, 0xf0, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:19:05 executing program 5: 03:19:05 executing program 0: 03:19:05 executing program 4: 03:19:05 executing program 3: 03:19:05 executing program 2: 03:19:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xa8, 0xf0, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:19:05 executing program 0: 03:19:05 executing program 4: 03:19:05 executing program 5: 03:19:05 executing program 2: 03:19:05 executing program 3: 03:19:05 executing program 5: 03:19:05 executing program 4: 03:19:05 executing program 0: 03:19:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xa8, 0xf0, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:19:05 executing program 3: 03:19:05 executing program 2: 03:19:05 executing program 4: 03:19:05 executing program 5: 03:19:05 executing program 0: 03:19:06 executing program 2: 03:19:06 executing program 3: 03:19:06 executing program 0: 03:19:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:06 executing program 5: 03:19:06 executing program 4: 03:19:06 executing program 2: 03:19:06 executing program 3: [ 496.495237][T14384] xt_limit: Overflow, try lower: 0/0 03:19:06 executing program 0: 03:19:06 executing program 5: 03:19:06 executing program 4: 03:19:06 executing program 3: 03:19:06 executing program 2: 03:19:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:06 executing program 3: 03:19:06 executing program 5: 03:19:06 executing program 0: 03:19:06 executing program 4: [ 496.919051][T14402] xt_limit: Overflow, try lower: 0/0 03:19:06 executing program 2: 03:19:07 executing program 5: 03:19:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:07 executing program 3: 03:19:07 executing program 4: 03:19:07 executing program 0: 03:19:07 executing program 2: [ 497.328031][T14417] xt_limit: Overflow, try lower: 0/0 03:19:07 executing program 3: 03:19:07 executing program 5: 03:19:07 executing program 4: 03:19:07 executing program 1: 03:19:07 executing program 3: 03:19:07 executing program 2: 03:19:07 executing program 0: 03:19:07 executing program 5: 03:19:07 executing program 4: 03:19:07 executing program 1: 03:19:07 executing program 5: 03:19:07 executing program 2: 03:19:07 executing program 3: 03:19:07 executing program 0: 03:19:08 executing program 4: 03:19:08 executing program 1: 03:19:08 executing program 2: 03:19:08 executing program 5: 03:19:08 executing program 3: 03:19:08 executing program 4: 03:19:08 executing program 0: 03:19:08 executing program 1: 03:19:08 executing program 2: 03:19:08 executing program 5: 03:19:08 executing program 4: 03:19:08 executing program 0: 03:19:08 executing program 3: 03:19:08 executing program 1: 03:19:08 executing program 5: 03:19:08 executing program 2: 03:19:08 executing program 3: 03:19:08 executing program 4: 03:19:08 executing program 1: 03:19:08 executing program 0: 03:19:08 executing program 2: 03:19:09 executing program 5: 03:19:09 executing program 4: 03:19:09 executing program 3: 03:19:09 executing program 1: 03:19:09 executing program 2: 03:19:09 executing program 0: 03:19:09 executing program 3: 03:19:09 executing program 5: 03:19:09 executing program 1: 03:19:09 executing program 4: 03:19:09 executing program 2: 03:19:09 executing program 5: 03:19:09 executing program 0: 03:19:09 executing program 3: 03:19:09 executing program 4: 03:19:09 executing program 1: 03:19:09 executing program 2: 03:19:09 executing program 0: 03:19:09 executing program 3: 03:19:09 executing program 1: 03:19:09 executing program 2: 03:19:09 executing program 5: 03:19:09 executing program 4: 03:19:10 executing program 0: 03:19:10 executing program 1: 03:19:10 executing program 2: 03:19:10 executing program 3: 03:19:10 executing program 5: 03:19:10 executing program 4: 03:19:10 executing program 0: 03:19:10 executing program 2: 03:19:10 executing program 4: 03:19:10 executing program 1: 03:19:10 executing program 3: 03:19:10 executing program 5: 03:19:10 executing program 0: 03:19:10 executing program 2: 03:19:10 executing program 4: 03:19:10 executing program 5: 03:19:10 executing program 3: 03:19:10 executing program 1: 03:19:10 executing program 0: 03:19:11 executing program 2: 03:19:11 executing program 4: 03:19:11 executing program 5: 03:19:11 executing program 3: 03:19:11 executing program 1: 03:19:11 executing program 0: 03:19:11 executing program 4: 03:19:11 executing program 5: 03:19:11 executing program 2: 03:19:11 executing program 3: 03:19:11 executing program 1: 03:19:11 executing program 4: 03:19:11 executing program 3: 03:19:11 executing program 2: 03:19:11 executing program 5: 03:19:11 executing program 1: 03:19:11 executing program 0: 03:19:11 executing program 3: 03:19:11 executing program 2: 03:19:11 executing program 1: 03:19:11 executing program 4: 03:19:11 executing program 5: 03:19:12 executing program 0: 03:19:12 executing program 2: 03:19:12 executing program 3: 03:19:12 executing program 5: 03:19:12 executing program 4: 03:19:12 executing program 1: 03:19:12 executing program 0: 03:19:12 executing program 3: 03:19:12 executing program 2: 03:19:12 executing program 4: 03:19:12 executing program 5: 03:19:12 executing program 1: 03:19:12 executing program 0: 03:19:12 executing program 3: 03:19:12 executing program 2: 03:19:12 executing program 5: 03:19:12 executing program 4: 03:19:12 executing program 1: 03:19:12 executing program 2: 03:19:12 executing program 0: 03:19:12 executing program 4: 03:19:12 executing program 3: 03:19:12 executing program 5: 03:19:13 executing program 1: 03:19:13 executing program 3: 03:19:13 executing program 2: 03:19:13 executing program 4: 03:19:13 executing program 0: 03:19:13 executing program 5: 03:19:13 executing program 1: 03:19:13 executing program 3: 03:19:13 executing program 5: 03:19:13 executing program 2: 03:19:13 executing program 4: 03:19:13 executing program 0: 03:19:13 executing program 4: 03:19:13 executing program 3: 03:19:13 executing program 1: 03:19:13 executing program 5: 03:19:13 executing program 2: 03:19:13 executing program 0: 03:19:13 executing program 3: 03:19:14 executing program 4: 03:19:14 executing program 1: 03:19:14 executing program 2: 03:19:14 executing program 5: 03:19:14 executing program 0: 03:19:14 executing program 4: 03:19:14 executing program 1: 03:19:14 executing program 2: 03:19:14 executing program 5: 03:19:14 executing program 3: 03:19:14 executing program 0: 03:19:14 executing program 4: 03:19:14 executing program 1: 03:19:14 executing program 2: 03:19:14 executing program 5: 03:19:14 executing program 3: 03:19:14 executing program 0: 03:19:14 executing program 4: 03:19:14 executing program 2: 03:19:14 executing program 1: 03:19:14 executing program 5: 03:19:14 executing program 3: 03:19:15 executing program 0: 03:19:15 executing program 5: 03:19:15 executing program 4: 03:19:15 executing program 1: 03:19:15 executing program 3: 03:19:15 executing program 2: 03:19:15 executing program 4: 03:19:15 executing program 5: 03:19:15 executing program 0: 03:19:15 executing program 1: 03:19:15 executing program 3: 03:19:15 executing program 2: 03:19:15 executing program 5: 03:19:15 executing program 4: 03:19:15 executing program 0: 03:19:15 executing program 1: 03:19:15 executing program 3: 03:19:15 executing program 2: 03:19:16 executing program 5: 03:19:16 executing program 0: 03:19:16 executing program 4: 03:19:16 executing program 1: 03:19:16 executing program 3: 03:19:16 executing program 5: 03:19:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000200)) timer_delete(0x0) 03:19:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) setitimer(0x0, 0x0, &(0x7f0000000080)) 03:19:16 executing program 4: 03:19:16 executing program 5: 03:19:16 executing program 0: 03:19:16 executing program 2: 03:19:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x3ffe, 0x4) sendto$inet6(r0, 0x0, 0xffffffffffffffad, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @rand_addr="ffd6f1b9201348544de96b337da295b8"}, 0x1c) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) [ 506.762695][T14803] syz-executor.1 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 03:19:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ftruncate(r3, 0x400) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), 0x4) 03:19:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000001600)={&(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000001480)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3, 0xc0}]}}}], 0x18}, 0x0) 03:19:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 03:19:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x5) 03:19:17 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/key-users\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:19:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setfsuid(0x0) 03:19:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000280)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 03:19:17 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 03:19:17 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(0xffffffffffffffff) ioctl$void(0xffffffffffffffff, 0xc0045878) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 03:19:17 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 507.385434][ T27] audit: type=1800 audit(1583291957.323:67): pid=14836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17083 res=0 03:19:17 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) [ 507.473470][ T27] audit: type=1804 audit(1583291957.363:68): pid=14843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/210/file0" dev="sda1" ino=17083 res=1 03:19:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3c4, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000340)={'batadv0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000400"/42]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:19:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) clone(0x2000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x2, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0x0, 0x0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@broadcast, @broadcast, 0x0, 0xffffffff, 'ip6gre0\x00', 'batadv0\x00', {}, {}, 0x0, 0x0, 0x25}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x9, 0xd, [0x30, 0x29, 0x31, 0x32, 0x7, 0x2d, 0x4, 0x39, 0x2c, 0x32, 0x4, 0x9, 0x1c, 0x4, 0x2a, 0x4025], 0x1, 0x7e, 0x7fffffff}}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) 03:19:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000001380)=""/178, 0xb2}], 0x1, 0x0) 03:19:17 executing program 1: setreuid(0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB='mpol=']) 03:19:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x218}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x400000000000117, 0x0) [ 507.825450][T14864] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead [ 507.876587][T14864] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 507.957635][T14873] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 03:19:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x4000, 0x0) [ 508.082672][T14879] tmpfs: Bad value for 'mpol' 03:19:18 executing program 4: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 03:19:18 executing program 3: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2000842, 0x0) open$dir(&(0x7f0000000100)='./file0/bus\x00', 0x90040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(&(0x7f0000000000)='./file0/bus\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 03:19:18 executing program 0: sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="0be4bbdb39a40000004807e80ac35af0c76ec46d3f2956cacd88a56cc8558ae820cb3e60ac6450dcc26915e13e", @ANYRES16=0x0, @ANYBLOB="00000000000000000000110000002c00038008000200000000000800020000000000080002000000000008000200000000000800010000000000100001800c0001006574683a776731002400038008000300000000000800010000000000080003000000000008000100000000003000058008000100756470001c0002800800020000000000080001000000000008000200000000000800010065746800"], 0xa4}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:19:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@nodiscard='nodiscard'}]}) 03:19:18 executing program 5: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x40, 0x0) open$dir(&(0x7f00000000c0)='./file0/bus\x00', 0x40, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(&(0x7f0000000000)='./file0/bus\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 03:19:18 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x40000000002, 0x3, 0x80000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket(0x40000000002, 0x3, 0x80000000002) socket(0x40000000002, 0x3, 0x80000000002) socket(0x40000000002, 0x3, 0x80000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x1b, 0x5d, 0x50, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x7}, [{}]}, 0x320) [ 508.595405][ T27] audit: type=1804 audit(1583291958.523:69): pid=14897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir404338830/syzkaller.U75z0B/162/file0/bus" dev="ramfs" ino=52501 res=1 [ 508.645783][T14907] Process accounting resumed [ 508.669734][T14897] Process accounting resumed [ 508.697161][T14904] Process accounting resumed [ 508.825138][ T27] audit: type=1804 audit(1583291958.603:70): pid=14907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir404338830/syzkaller.U75z0B/162/file0/bus" dev="ramfs" ino=52509 res=1 03:19:18 executing program 3: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2000842, 0x0) open$dir(&(0x7f0000000100)='./file0/bus\x00', 0x90040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(&(0x7f0000000000)='./file0/bus\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 03:19:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000002000070700fffd946f61050002000000fe0208010001080008000c000400ff7e", 0x24}], 0x1}, 0x0) 03:19:18 executing program 2: socket(0x22, 0x2, 0x4) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e22, 0x80000000, @loopback, 0x10000}, {0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xb}, 0xef69}, 0x9, [0x101, 0x6, 0x1, 0x9, 0x8, 0x3f, 0x9a, 0x2]}, 0x5c) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ptrace$setregs(0xf, r0, 0x80, &(0x7f0000000380)="31c9424bcccfbb53c869a9252cc2385e891df4b477ae6c1db138e1402bad4201a97a33fac1526622db3aff0c4e5595b8c417a5a2bead0e403588e2d2f99aeed7d148dc2cbd25b280c75e902162bdad60c75aac359111ec") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}, 0x0, 0x0, 0x0, 0x6, 0x1000000000000000}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x6, 0xc201) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x6c, r4, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffffd}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc0}, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="20000020363c32feef11d6da7ba600", @ANYRES16=r4, @ANYBLOB="10002bbd7000fedbdf25050000000c0004000100000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x8800}, 0x4000000) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socket(0x2000000000000021, 0x0, 0x10000000000002) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f0000000700)={0x2, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0]}) clone(0x80000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r5, r2, 0x0, 0x100000700) [ 508.963930][ T27] audit: type=1804 audit(1583291958.633:71): pid=14904 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir221353625/syzkaller.4UEHni/152/file0/bus" dev="ramfs" ino=52186 res=1 03:19:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000002, 0x3, 0x80000000002) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000580)={'wg0\x00', {0x2, 0x0, @local}}) [ 509.050812][T14912] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 03:19:19 executing program 1: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="7d0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c000b"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet6(0xa, 0x3, 0x2f) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) [ 509.128707][T14912] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 509.147024][T14912] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 03:19:19 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="7d0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) [ 509.197858][T14912] EXT4-fs (loop0): orphan cleanup on readonly fs [ 509.220915][T14912] EXT4-fs error (device loop0): ext4_orphan_get:1256: comm syz-executor.0: bad orphan inode 16781312 [ 509.309136][T14912] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 03:19:19 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x8, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000480)="6537493f8c1fa17570ccc646baba07d10e5e861c78bdc2d6836a75094b2026903343bd1fa5f283f9b0d4cd644694d0d226b845100456193d95e74bf86fc41040f1372d", 0x43, 0x7}, {&(0x7f0000000500)="b2a31a0e40bca3d48b305ed2095300"/25, 0x19}, {&(0x7f0000000540)="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", 0x236}, {&(0x7f0000000b40)="1b3f095dfffdcabc51bb6216f279d8eaf0c0b6f9c0828336c76758e08db1e400c5d5fc0884daa58457cd878896da7c3deab48f2754604ef6bbb02b86fedc64a32fe6afbdc3d542399ef285e135679aa8cac80ab40697502d6afe31f5951de92ddb4728f998f209d65672c28826a40af359581e1fa15f4a05477ef079d2e081d23a5f07fc9d765143de42ad016b4daf85f78cb7bdb581b846703cbffcb37afd2d01c13202667adcb9bcf523115b9e1301679db8", 0xb3, 0xe5}, {&(0x7f0000000c40)="8eca098d821745e7f6c4ca5ae698f4ce65b5b6b4c06b1a7589a9b1509b435cc9a8a3c5ccde179a2421d69868a4eb70c97ef4a0bdb811a5049091173fe6e66ea52740592e3d4d4bc70f3ea11280008794cec2c21db8ff32c09543ecc611c1f294016e946e1a198cea88ac1738dfda793f7944625f477b168a360c9a", 0x7b, 0x401}, {&(0x7f0000000cc0)="fe11c12521a6a7c94f371821a5690eefd3fe71c3badb13f00dda60354948b2df11a525720dd3e22edfb7683f7a6c20e2460b5eba3822a8e44aabd9cf266dfc8484fb3c724e414b1e82d0f2bbefd8449d786fc5fcdf4c2867cf7b440684604d8d2e194f521126988563cc5c26cfe9866ea87bd443446aad75f000597a559cfb998576b6990e8789bc99dc96335dccd94a4a26ecd1175597d4aed2f18845712e2430125af574a899716dc3fab8220df724a43c075fce8136ae5f5f0a87df28ca69ff66dbf938ad8c622f135880ae58c0e63abdda3773874bfb", 0xd8, 0xf6ef}, {&(0x7f0000000dc0)="0cc22d8b921d1665482033eb66fce31a906c6f1db07fc88d957f82a1615c1238674698228c6a9daa6a5fbfa094", 0xffffffffffffff24}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6f726f636b2c626c6f636b3d0078303030303030303030303030303030302c6d61703d61636f726e2c6d61703d6e6f726d616c2c6e6f6a6f6c6965742c73657373696f6e3d307830303030303030303030303030303030287769643da1684991915789a37a14a1d84e1c0e951b65c0b006a025f811ee7f3a651dd5582723d43b76", @ANYRESHEX=0x0, @ANYBLOB=',dmode=0x0000000000000000,\x00']) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) [ 509.431834][T14943] netlink: 89 bytes leftover after parsing attributes in process `syz-executor.4'. [ 509.486619][T14946] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 509.546834][T14946] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 509.681822][ T27] audit: type=1804 audit(1583291959.593:72): pid=14937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir404338830/syzkaller.U75z0B/163/file0/bus" dev="ramfs" ino=52593 res=1 [ 509.693006][T14937] Process accounting resumed 03:19:19 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb4181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffc96, 0x200007fe, &(0x7f0000000180)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) [ 509.848075][ T2624] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 509.883088][T14953] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 509.911331][T14953] unable to read squashfs_super_block 03:19:19 executing program 3: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2000842, 0x0) open$dir(&(0x7f0000000100)='./file0/bus\x00', 0x90040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(&(0x7f0000000000)='./file0/bus\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) [ 510.082638][ T2624] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 510.105734][T14963] SQUASHFS error: squashfs_read_data failed to read block 0x0 03:19:20 executing program 4: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='f']) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, &(0x7f0000000400)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 510.209547][T14963] unable to read squashfs_super_block 03:19:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb7", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:19:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 03:19:20 executing program 2: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) [ 510.539479][T14975] autofs4:pid:14975:autofs_fill_super: called with bogus options [ 510.549073][ T27] audit: type=1804 audit(1583291960.483:73): pid=14969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir404338830/syzkaller.U75z0B/164/file0/bus" dev="ramfs" ino=53335 res=1 [ 510.586687][T14969] Process accounting resumed [ 510.602288][T14975] autofs4:pid:14975:autofs_fill_super: called with bogus options 03:19:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0xa8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:19:20 executing program 1: 03:19:20 executing program 3: syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) socket(0x40000000002, 0x3, 0x80000000002) socket$nl_generic(0x10, 0x3, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000000)={0x0, r2+30000000}, 0x0) 03:19:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175a", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:19:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000002000070700fffd946f61050002000000fe0208010001080008000c000400ff7e", 0x24}], 0x1}, 0x0) 03:19:21 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="7d0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c0002"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 03:19:21 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x8, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000480)="6537493f8c1fa17570ccc646baba07d10e5e861c78bdc2d6836a75094b2026903343bd1fa5f283f9b0d4cd644694d0d226b845100456193d95e74bf86fc41040f1372d", 0x43, 0x7}, {&(0x7f0000000500)="b2a31a0e40bca3d48b305ed2095300"/25, 0x19}, {&(0x7f0000000540)="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", 0x236}, {&(0x7f0000000b40)="1b3f095dfffdcabc51bb6216f279d8eaf0c0b6f9c0828336c76758e08db1e400c5d5fc0884daa58457cd878896da7c3deab48f2754604ef6bbb02b86fedc64a32fe6afbdc3d542399ef285e135679aa8cac80ab40697502d6afe31f5951de92ddb4728f998f209d65672c28826a40af359581e1fa15f4a05477ef079d2e081d23a5f07fc9d765143de42ad016b4daf85f78cb7bdb581b846703cbffcb37afd2d01c13202667adcb9bcf523115b9e1301679db8", 0xb3, 0xe5}, {&(0x7f0000000c40)="8eca098d821745e7f6c4ca5ae698f4ce65b5b6b4c06b1a7589a9b1509b435cc9a8a3c5ccde179a2421d69868a4eb70c97ef4a0bdb811a5049091173fe6e66ea52740592e3d4d4bc70f3ea11280008794cec2c21db8ff32c09543ecc611c1f294016e946e1a198cea88ac1738dfda793f7944625f477b168a360c9a", 0x7b, 0x401}, {&(0x7f0000000cc0)="fe11c12521a6a7c94f371821a5690eefd3fe71c3badb13f00dda60354948b2df11a525720dd3e22edfb7683f7a6c20e2460b5eba3822a8e44aabd9cf266dfc8484fb3c724e414b1e82d0f2bbefd8449d786fc5fcdf4c2867cf7b440684604d8d2e194f521126988563cc5c26cfe9866ea87bd443446aad75f000597a559cfb998576b6990e8789bc99dc96335dccd94a4a26ecd1175597d4aed2f18845712e2430125af574a899716dc3fab8220df724a43c075fce8136ae5f5f0a87df28ca69ff66dbf938ad8c622f135880ae58c0e63abdda3773874bfb", 0xd8, 0xf6ef}, {&(0x7f0000000dc0)="0cc22d8b921d1665482033eb66fce31a906c6f1db07fc88d957f82a1615c1238674698228c6a9daa6a5fbfa094", 0xffffffffffffff24}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6f726f636b2c626c6f636b3d0078303030303030303030303030303030302c6d61703d61636f726e2c6d61703d6e6f726d616c2c6e6f6a6f6c6965742c73657373696f6e3d307830303030303030303030303030303030287769643da1684991915789a37a14a1d84e1c0e951b65c0b006a025f811ee7f3a651dd5582723d43b76", @ANYRESHEX=0x0, @ANYBLOB=',dmode=0x0000000000000000,\x00']) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:19:21 executing program 1: [ 511.398021][ T2624] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 511.409384][T15017] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 511.449996][T15017] unable to read squashfs_super_block 03:19:21 executing program 1: [ 511.482293][T15022] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.5'. [ 511.521425][T15022] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 511.554489][ T2625] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 511.591604][T15023] SQUASHFS error: squashfs_read_data failed to read block 0x0 03:19:21 executing program 1: [ 511.694578][T15023] unable to read squashfs_super_block 03:19:21 executing program 3: 03:19:21 executing program 0: 03:19:23 executing program 4: 03:19:23 executing program 1: 03:19:23 executing program 3: 03:19:24 executing program 2: 03:19:24 executing program 0: 03:19:24 executing program 5: 03:19:24 executing program 3: 03:19:24 executing program 1: 03:19:24 executing program 4: 03:19:24 executing program 4: 03:19:24 executing program 5: 03:19:24 executing program 3: 03:19:24 executing program 1: 03:19:24 executing program 0: 03:19:24 executing program 2: 03:19:24 executing program 3: 03:19:24 executing program 5: 03:19:24 executing program 0: 03:19:24 executing program 4: 03:19:24 executing program 1: 03:19:24 executing program 2: 03:19:24 executing program 0: 03:19:24 executing program 5: 03:19:24 executing program 3: 03:19:24 executing program 4: 03:19:24 executing program 1: 03:19:24 executing program 2: 03:19:25 executing program 3: 03:19:25 executing program 4: 03:19:25 executing program 0: 03:19:25 executing program 5: 03:19:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) ustat(0x3, &(0x7f0000000000)) 03:19:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0}, 0x4000080) bind$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d1325b556528e9b790b74053d1ed631c6ec8126d37c87216173138c00cef396868029af5b76bebac5e38b74d8bbc6ae66b6e202b6d505710377710ea7d43edf00e1a4c1c670bb4c263ce777da81abdd5ba5a5c82f67232f9b4d6f21b2e6afa8b38e4642b0daa2acbc0478d89b88e8b2094d4248855e5e81992e60be3afff0f3c3799350615489a901a659abdeca0c615a622ebf64175f990320e0356d4a11ed62eff72b709c23dd65942e8b534d7d775d370c1e435654a2634e6ee3649c4c3bcbe39e866f1eb9972af1a9cef42e701798a53dc92a242aadbac343e1765cf8ea5665e22deda69777e52b1e9e5d3edc022256939e1eee013448294911139d5b9c6241049fecdf9b31f4cdf6cff65d71b5071ef70e1798347c8846aa5b905e83050e3e606986ed3f603d18c5cdeb11cda1ce3abddea9376231af130e19fc7601ec1ab8cb5a7de9e2174547f18225b09a54fc8720dbb91eb69c1be88e601c3c9df4f2758f39a5151951b9c6dbb419ffd783a34c9fad10f201b8724d31865e2fc1fcf48db2be713053b43a0e3943c1e2b08e8a26e946c439d891db2a80b5ffa054bc8d0177d3214056250c61a537d2ec7630fb90395df2cd6aa9c5e573365db580520bdc3f1c6b2be992e1516a4b810a11935dc780699e461d9715f70c6d103ff49bf168f3cff4c0d0d6ba5671fcd2975450b0e1a3474139cb0f2d3476fcd87a8bccbeb2f5f8a821017b879aa5b9d1fafa9f4c429a74cd2da782114d97bf031746a817dd0293c4eddc3a9ecb5afe496f4971474ccd827449409f07cf94dda2e7dbe8520b5afff10a7e3b0b4289a167fc692635b5b7426d9e771b95860b09a3e752c867213c772e48ba30a78feecc7ff26e63e1749c62b52d377ac5cc52db830c965e04ccfcfb24ceacc69cfdc2094124dd27b2d68f699476a2562bab1de117ffc2b0702ee8b0b77f85fecec3a25b37ab7eb06232c9a73b4470f1727c82581d81942abf42d3ea37957927ad3dbd0ebe46678a9f4d25c47acaac83c14210a54b71fed40df017e2be27f01e3e6ea3ea381ca14efd202858e6535ad4f79a8cdf47e385b740a70c14e3651731a45cc0ca4a56f2e903cad0384efcc364caf67e09551d35c682ebc90a9286c4d274ba1b8ced742ede4e55a62db7ef9a96fde2add05b41599fd72a79ba280cc125cb266ef21b7eeafe3ee6aa78eef33fc66454549c3ec298cb683a55a32208cf6ce88b560166159d59e65f30540f62c5437652ea7f2a02f87ca242dd2250f58e75938a9a3ded51ae6598c2aba53287ff5cdaab17be7f4310f8e07e310d52778de79e1c2e4391b254be38910aa1cf6e1ca0e75d24be97d59f7025f16c6fbd549529b74e319c58f50438765ef0e3dc394eeb75dec41b3d80435b17520c97f5cd7ee692fb86d188fb0089fbf737dc1b96b9cc49be23a38a8cd92e5075f349993d7866369dd25eccbe1481477a05fee14e0edd1617921d7fcaa8fdc642e63b64388fa5b63442ff1466b1938d02546750b01ed9c980282ccbe10f204741249aed88c555ed6fdf7f68af9209807a71bbf4f31bef5a4223466da74ba8b034df529aef6ec6610a0d25973961e50e02af22d0ca8be1b9804a5918acbdb536e8f2f441ec9d640ed15133ee747440c86fc4526c9195954528673d25c8390170f3c19cb0b0c30b9e634c7ebae96946ae97c19eabca92226da925d22be37abbe0740938ea899ec42fd529a3b1063981e4c154219df5cf5af60a29b5a8ee530905725a14b28900eae937e705401ba8f632a7bca00d9724a992afdc9ed14aac71b8e3a7ee5ca095888feb195b4e083c3b611a1c2f8d092febe3b9f5f0df61e8d3c31a643c935b76bc1ad4265164e755484beb06610510bc51e8c6da8d71123bbe83a5e4128f41cf5c486d6a60496c300c406f990bee485cbdef794f2663ee66d2b18d8e55210c25c04b1a0c6d9c5f904e72806d2d4f5e5439bcdf146343cdffe4d0d70d42a9959cff9bd50c37cd478b0b0add16aae4dc839b46bca2ac7547144b6a422aed5e2db661bcb31a82bc0fc678e71a6cb090ef772860f3008b4152b5d281033be4a77b367baec3ab8ce7c83c601b11c8199bafcd15161a5454a6a982dbc3c2e3a5172b6a63e4904817075754eccbb0188c9cb2e5da9600f567485014887463b40f189b7ec3c5c0f36d502509e402c285765c78417ce6b3aab130ee79622dcd8ada842233e73a14554ee5e4995e32b3fe4075e247eb9bdeef64d1a7436c9b5782fb2f84f74e4c6e976289729c37b5bb8200a9480d181a6b11f5ec229b818134b8334967ae935ac1d81be4776fae4cb68b6fa330e93bd8de388b38455d569159bcd166df030a6dfedf28caf4608de7243f5df2c76f6680c301d819dc67d24d2f780432a931700a253b0a5b075195c6dbfd1fe17a1c11a3dffa872a07b877adc66d069fffb6d8326e1998c5a337c3d530250cae335ceffcf81dc438a47e73490d050a053813dbe6674e42c91ae94b4a88144f36adc1b08b4bcd6ddf4058c4e08d4dc83d5fbd843ee27eaf50b297c220350260d9abbeeb6deb921e50cae0ea590cfb6f00fb3c71520f565bb769705e2481ef27cf537d29f163c9fe3d39ed9fd18dc8b0c976cd302283e430807a9d751357f89092532d89fe280c69ad36e3541b5da9dea13fd19d0434c760fe295dfd9b9e63453c7853914c50b1b77ccd4b33c8b1f31fcb1aec040ffe2f9d728d8ea84297bac2e22230ebd1488c503b05b2e433cc37ce9fc123b7d3eb244b4549e9a841e73b664c8f6621ea5a4c9ff9c1da032255311f2c063a682baf4c97e7ba552bf71af4bd64f43872b846d15c65c487089be272cfa24a33f8c50930ea0bc4b089505fb8e9e688d35a978813c38add66548d7575727ded0e7e64a5ce897da6b940df4c3dddb8b4871d773f6ebf02058518c55c19aadb0f266caf18777ae68d2bfcfb2225961fcd10538ba664fd053a443320072707533ab761b9397bd0559126b84fe9196463ae50633017ea2d80940311d9c867102b1017f34af1965d8eb61be616a0d40656e2bbb750aee6f74f788c8acb2578e8686f5f8da6a19e979c152b7ee7c7f16902120588e2ff630144b5f929ffc593e946d9717c5968aa16c2d73d689fb5cce117acda3e23e5e0116de1cb6bddfa1a84cefb22c1e2c3753017696f27b9aec5d44f15411247643b84dd4410e784b4eb5b9c68fea671976f9b51c6526e2ddb40659611b0b3bcc7e249c77396fdb8c864ea9318f9de7fd3936fcbdc732c2f8b9556ec9afeb15d5e2df890351d66074d53dddc6e8dba8c91d733623ac95a49eb69c7de37ff2364ccddb01f6500750a012c2acf32a9f6bbd9e92d17ef858fbc34575db414ea42ad87a65b11ae5506469db256c421328f45aec73bdf18562447dc2840bbe9fc84dedd0fe6276fa174f21210d40193530ec7a70a9e60bfd6b00cba4d483be59950f16fa0dbd089b5fd0bb078badfcf42270cc62fe37be22b0d81f755263d74636fa466d2574ca62b58c649936d21e949de73ea45df3acade6609413f56fc218d6f11947bf1fd629d38d8acce90ee3c1a51117601ae126bec537e3e76ce7ecc53cfeefee8aaa104aa853a65aadf27bac9849ee0122793b11cd8e4f32fb07afa39e439cb738c30a6df958160aac15c26032a61aaf614b2e6601581fb0ab8d115e045005dee3df8ea42643cbcbb0b111130c42c94b7e874cfee50d5c2eb13b3a38c417fce9d740b7d43120431a7d44bc3934ee87b112401cbee3553837b6a0b4b3faaceb46eca4064301c8060870350e256ac9d5557f674536b9d9717a82fa211e7dfb52ca410d8a4f2f6b733c2a082f247538a6c40f56cf64204e62515db692f32733ff6f4b0787ef305d5e80881375467ae603ac3600e688c42f89a4fea4fdda09a8d59e19457c654a98c8129a8c65bae3310af2b170729e18400c915d0a2f4c4fc51747846630b95ec181228bda7ef48ad389815aa82de6c4a3b0746c28c01f9ec697ff17f095e1cf9d2fe78fdab9cbb1ca7aefc8af6a0cd98444735fad79e394a8f9c2fd358c3cde4ca6d57a620d0bb52dc6ff93f034b596f407c21511cc2c5ec8b0ede7f5c0acca61939ac7f2cad820c15133e69507eaa739e9a88936f4a74f0ad1574a1591f31f582a76157d89805cb3ba5e8d10509bf7a08e928653b4f05ba797a06765b74c8759fc34178624c08a2b99e59bcff5d33af2b0f9176b56c35f4da31c751a4c2fd88a1997cd9fc9bbf78220731d4c8cea23be1fd29c36b34d8458b7021ebcfafdc7e54096e517da3eb684298f742532d776164d9c9658e5faca0a3b08afca1bc27ed357884f49fe51bd0c38057f4288f1917e36e3865310b5eed140aef6150ae363293cf7467abd5e06cd7af5e2c49e7c5253a1155741e380bccb023a0faed93d9a64512d72436f1ef4ac0904a413e45164c23413bd57274a0a951c41a9a43aed094d4ea5c480ce64663cc9d36723179e2b19a48e9277a6591bbd888a06e0f2f142cd4495be4ba7274d69ba32a2788b935b2f18c5f336cb9de062829e2e0bb476efb36c3f53a766c14314f31637a464ac59d378ad7f51bef8d88715613653a427038e0d3e4dc3948bb1d70eb55c91c92f7510b1c0387253b458d2c90d17238f9eb239c680179a6c1e0759be367963e3b4d7395fd3911626582a094e6a8d0e746242f94267a4c57d5b2360ce3a6f7f3e3c10e124a54ed24d1585bc7b731cf731c94ee00ebf070b999b9bf28d76bfec9dcf12fcce2b9c4444c706ec6b943b5f39e9151a764ba1cd0cd6c1c7cdc3aa824cf17da705be27a18fbee41be39d6ae4dd4312f5f4bfee2c5bb21d941666f9d79b0f80c9b1bace84a05d2b0e3be1c3fd04d72b4b0124595c435813969d413960fddc858730a433383f3bc0472cb7683ea569e001f", 0xe00) open(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000240)) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x400000, 0x0) dup3(0xffffffffffffffff, r5, 0x0) sendfile(r2, r3, 0x0, 0x12000) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000040), &(0x7f0000000100)=0x1) 03:19:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) 03:19:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) 03:19:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) [ 515.428046][ T27] audit: type=1326 audit(1583291965.363:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 03:19:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = dup2(r1, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) [ 515.582664][ T27] audit: type=1326 audit(1583291965.523:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15103 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 [ 515.669527][ T27] audit: type=1326 audit(1583291965.563:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15106 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 [ 515.758534][ T27] audit: type=1800 audit(1583291965.693:77): pid=15107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17156 res=0 03:19:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 03:19:26 executing program 5: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000380)) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RSTATu(r0, &(0x7f0000000040)=ANY=[], 0x445144e9) chdir(0x0) [ 516.036591][ T27] audit: type=1326 audit(1583291965.973:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 [ 516.208954][ T27] audit: type=1326 audit(1583291966.143:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15099 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 03:19:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffdc3, 0x0, 0x0, 0x0) 03:19:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x80002, 0x0) r3 = dup2(r1, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) [ 516.354226][ T27] audit: type=1326 audit(1583291966.293:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15103 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 03:19:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) [ 516.413499][ T27] audit: type=1326 audit(1583291966.343:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15106 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 03:19:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) select(0x0, 0x0, 0x0, 0x0, 0x0) [ 516.637969][ T27] audit: type=1326 audit(1583291966.573:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15141 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 03:19:26 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'syz_tun\x00', &(0x7f0000000300)=@ethtool_wolinfo={0x2, 0x0, 0x0, "44f5932004f3"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffff9) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) [ 516.706138][ T27] audit: type=1326 audit(1583291966.623:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15144 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0xffff0000 03:19:26 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 03:19:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 03:19:27 executing program 1: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000580)='fuse\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000380)="0acb438dbf660568abeb22494f13f30759011ed55b66c0e88efdba2518d69f9bdcba904987d7f62b4de2653b8f07553bc59fd3b85e9dafab91d2ba3143c7f3c7ec0bb1c8e83cee7a99a9c71c5fcb20318c0d1c813616fad510740e778c2b88158ec1d4d895aae301886fc1cefff7d95eee8c636f69280697cda3b407231f514d7defc8a757d36ddf25e252d00e6baed9e4fff21e7b5b05cfe3841feb472c93d76cf7aad6a731fd13296947df64d6fa1c78e24e81ace59c6b5fb552aeee825df23f9d9d227200328e23dce55daafb8405d61c78", 0xd3}, {&(0x7f0000000480)="e92f316bd762183efa51ba058b00ac08ce22ac8a498385c5a978e3faf3278e9da1306b60385e20a96b123e90c951d1dd6040ba08a84eb6142a30ba3987d0661d715772ef8ea253b35d7b3df424727f583e043f22b241a53b52c4e10dc1eb94d56ac2ccc61aced923a31f5c773b6397937dadfdeec453365e4e78e40b4506d365477b1bb7da3093033aced2b028e8b42dbf9e5ed93dad00a7c4188d035845ce8d8e4539e3ce3ce9fe82b8227b7d7809131a1649b12ae87025e70502b3c3bdb462f7517dedbc3b7e728da025c39a0b16f838", 0xd1}, {&(0x7f0000000740)="5c8f54d73a48941899f4e5d3149f84081af9c920d695f3aa50a5d700b14a0d7d6500bebc2e000000b2334373354b5f288a99cccf44f0327c3a759c1bd5077227105cf9b364c09a5d249c5130b04dffe1af2d229ef523907f1edffbc29f66cbd865e86d7812207016581e655c50c75623c5582ad1bf871ee8c3ea578d2a8724c6f7c997af5613d5b318a9f918df33690d239d2e0b2ec017735ba1409fd022cde8f4e130cc0eb69e623a0cba90f7b6099cffc903fe", 0xb4}, {&(0x7f00000005c0)="278ba8268e5b1d3159442798046dd9cef2673d002944860a93d0f085844e75164d9c18ff5683a043a0d31e4ddf1cc5b8db289f1e5d433e394757f633dc16b9bface804e36db063edd311b47cacf9a3dd91fb44091b079ea419ae4145d12111ce48604822e9bbddecc90968f02f9fc9d49c0e45d619f0a37ec5215719bacdde977eedc184897896d073a1fbeaca08b93f4e6dec9cddaf9f0b613a67babecf3ff642d44af9fa905372ca1c4628d8e14a31b1e6e688caa1d3816150c693cc56b2c47e1aafffb5d980b897c86ee1f91f1a510e337387311f4afd9fb328c60fa69d47db64ef424ba707755833962a791785c0", 0xf0}, {&(0x7f0000000280)="3e15bd5f8180f9bd2a8c56981cf0985642938c083c5052bcc3b04b025aaa2f33f6dca2864eec92ccf8ff21de3141e2f5df54dda1024887f46304dd8c79556f4e5aa492d66424ad950ae1b5878785a2426ef881e75e96", 0x56}], 0x5, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8c, 0xfffffffd}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = memfd_create(&(0x7f0000000080)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca3\'\x12xY!\xa4\x9c\x97\xf1\xfc\xb0\xe8~\x91\xd5\x04i}\x03\x00@\x0e\xe6\x995b\x00\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) ftruncate(r7, 0x40001) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x0, 0x0) dup3(r8, r9, 0x0) sendfile(r6, r8, 0x0, 0x800000ffe4) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) setsockopt$inet_tcp_int(r10, 0x6, 0x17, &(0x7f0000000300)=0x1, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 517.381609][T15172] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 03:19:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000180)={0x18, r1, 0x703, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) socket(0x0, 0x0, 0x0) 03:19:27 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) process_vm_writev(0x0, &(0x7f0000003880)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f00000001c0), 0x0, 0x0) gettid() capget(&(0x7f00000002c0)={0x20071026}, &(0x7f0000000340)={0x2, 0x7, 0x3, 0x0, 0x2000}) mmap(&(0x7f0000600000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000004c0)) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') 03:19:27 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mmap(&(0x7f0000600000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000280)=0x80) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={{0x14}, [], {0x14}}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x1, 'gre0\x00'}) 03:19:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/msg\x00', 0x0, 0x0) r4 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) ioctl$TIOCSPGRP(r3, 0x5410, 0x0) pipe(0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffda4, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) 03:19:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000080)="08418330e91000105ab071") openat$bsg(0xffffffffffffff9c, &(0x7f0000000800)='/dev/bsg\x00', 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000800)='/dev/bsg\x00', 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) setregid(0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 03:19:27 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x972f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) process_vm_writev(r1, &(0x7f0000003880)=[{0x0}, {0x0}, {&(0x7f00000016c0)=""/247, 0xf7}, {&(0x7f00000017c0)=""/187, 0xbb}, {0x0}], 0x5, &(0x7f00000001c0)=[{&(0x7f0000003900)=""/171, 0xab}], 0x1, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = gettid() r3 = syz_open_procfs(r2, 0x0) mmap(&(0x7f0000600000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000280)=0x80) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000004c0)) accept$alg(r3, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') write$cgroup_subtree(r4, &(0x7f0000000300)={[{0x0, 'io'}]}, 0x4) 03:19:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 03:19:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000001c0)={[{@max_dir_size_kb={'max_dir_size_kb'}}]}) 03:19:28 executing program 0: 03:19:28 executing program 3: 03:19:28 executing program 2: 03:19:28 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000080)={0x0, 0x0, 0xfff0fbff, 0x0, 0x0, "f8023800000000000a350ba13a9f87df00"}) [ 518.781599][T15219] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 03:19:28 executing program 2: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@local, @link_local, @val={@void}, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x6000, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x7, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) [ 518.896205][T15219] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 03:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_submit(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getegid() sendto$inet6(r0, &(0x7f0000000040)='F', 0x1, 0x20000003, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) 03:19:29 executing program 3: 03:19:29 executing program 5: [ 519.162812][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 519.334891][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:19:29 executing program 1: 03:19:29 executing program 2: 03:19:29 executing program 4: 03:19:29 executing program 3: 03:19:29 executing program 5: 03:19:29 executing program 0: 03:19:29 executing program 0: 03:19:29 executing program 3: 03:19:29 executing program 5: 03:19:29 executing program 2: 03:19:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[]], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x1000) 03:19:30 executing program 1: 03:19:30 executing program 3: 03:19:30 executing program 0: 03:19:30 executing program 2: 03:19:30 executing program 5: 03:19:30 executing program 1: 03:19:30 executing program 3: 03:19:30 executing program 0: 03:19:30 executing program 4: 03:19:30 executing program 2: 03:19:30 executing program 5: 03:19:30 executing program 1: 03:19:30 executing program 4: 03:19:30 executing program 3: 03:19:30 executing program 5: 03:19:30 executing program 0: 03:19:30 executing program 2: 03:19:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) r3 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x31, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000560007031dfffd946f610500070000006700000077eaf000421ba3a20400ff7e280000001100ffffba16a0aa1c090000000000002b000000000000eff24d8238cfa4036dfec3fb65", 0x4c}], 0x1}, 0x0) 03:19:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x328100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x100000d, 0x10031, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000012c0)={'filter\x00'}, &(0x7f0000000000)=0x54) 03:19:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000d00)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000dd000000000000000009000000030000005802000000000000f8000000f80000000000000000000000c0010000c0010000c0010000c0010000c0010000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0000000000000000000000000000000000000000b000f80000000058ee0000000000000000000000000000004000636f6e6e6c696d69740000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000efff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000a800c80000000000000000000000000000000000000000003800636f6e6e627974657300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020005452414345000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800"/649], 0x1) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2}, 0x235) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x3e8}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 03:19:31 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="f0000000000000000000000000000000fe880000000000000000000000000001ac1e000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000000000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000da47772a0e009a84ac8dc6f28a189b5302a843d7fe8d60f498662c313bd865976a27d1033524e86d4fa2abc63e7a732c70d4c52b243dfdc6108935c0112a368129185d619d3023f7093465858c105db4e697f8e96aa46ed4bc5127358369d920ca72b0c9ed8caccbf6bb564bdb525efd5d6fe6111eac3277154852f686df93649e63e6b7e6b612675035dfc0c8a02ab0ce7ab78dc3e88e151d02eb0005606088315b10d1516f64e4ed080541af067bb8459f703f4b28a729b7843ef6eaa4b7b45d164f1aaf0a786f1517975588a9dfa603086a85b81b8da294ed678cfe482e23040b969e02af2f472baa0f5237fac194fbc331826bf1ba493f36c59876be021bb8fa3f2df8bfb4da589c"], 0xf0}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6, 0x0, 0x0, 0x40}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x2509893935c573c3, 0x0) 03:19:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000000)="240000001e005f0214fffffffffffff8070000000000000000000000080008000d000000", 0x24) 03:19:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_key={0x1}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}]}, 0x30}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x135}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xa1}, {0x0}, {&(0x7f0000000140)=""/62, 0x3b}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 521.179702][T15309] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:19:31 executing program 3: shutdown(0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f0000000040)=[{r0, 0x4}], 0x1, 0x4c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r2, 0x0) accept(r2, 0x0, 0x0) shutdown(r1, 0x0) [ 521.251022][T15309] batman_adv: batadv0: Interface deactivated: batadv_slave_1 03:19:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/125, 0x7d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e0051e) shutdown(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{}, {}], 0x2, &(0x7f0000000080)={0x5}, &(0x7f0000000280), 0x8) shutdown(r1, 0x0) 03:19:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/125, 0x7d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e0051e) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x0) 03:19:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/125, 0x7d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e0051e) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/182, 0xb6}], 0x1}, 0x0) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r3, 0x0) accept(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfded, 0x0, 0x0, 0x800e00515) r5 = dup(r2) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r5, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) nanosleep(&(0x7f0000000300)={0x7}, &(0x7f0000000340)) shutdown(r4, 0x0) shutdown(r1, 0x0) 03:19:32 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x255, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 522.157613][T15309] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 522.182352][T15354] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:19:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000300)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"134bc76ca289d616"}}}}}, 0x3a) [ 522.320483][T15361] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 03:19:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:19:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0xc0e, &(0x7f0000000100)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xbd8, 0x3a, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, [{0x0, 0xb, "a78c000005dc791153d5dea6b259b8e3cd2c8038336823493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430397754db3e340a14a2a1328c5f93037dc1435c11b37adac1508419af736b41e5a8"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x84, "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"}, {0x0, 0x1, "b20360609ee68487"}, {0x0, 0x9, "c139276371aea9b7cdbd32b0a978030a03d23d9fca26dd1213e1010898b256e481da1018059f850b91347107a9dd38da31c1a16267a090b62089ee0d776d581b1bd756ff9010"}, {0x0, 0xc7, "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"}]}}}}}}, 0x0) 03:19:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000029c0)=[{&(0x7f0000001740)='H', 0x1}, {&(0x7f0000001800)='-', 0x1}], 0x2, 0x0) 03:19:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 03:19:33 executing program 4: syz_emit_ethernet(0xc0e, &(0x7f0000000100)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000300", 0xbd8, 0x3a, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x1f, 0xb, "a78c000005dc791153d5dea6b259b8e3cd2c8038336823493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430397754db3e340a14a2a1328c5f93037dc1435c11b37adac1508419af736b41e5a8"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x84, "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"}, {0x0, 0x1, "b20360609ee68487"}, {0x0, 0x9, "c139276371aea9b7cdbd32b0a978030a03d23d9fca26dd1213e1010898b256e481da1018059f850b91347107a9dd38da31c1a16267a090b62089ee0d776d581b1bd756ff9010"}, {0x0, 0xc7, "54039a033f4f77534f4bac9b017e6f036a3926d6f8fccce6346d4b2516060f8bd635c5865582d3719faeec25f880fc5389a4b89149982545ca3ada77fa9a5dab4cca6b1fb34b5a1cedd01f84a8e1b3c6a4b81ec194d3614e6871868cb3056fa3efc3fb593c6b253a3cbc359c648545203250cc70142ef9f25442d254391a03d44e148e9edd7dcc853d258bc2e88e31651f6eb8cbd4400f200c6d949766494a3890cbbd8b7ccc097f6879c8b2daf199ff9ff030dea73f14d75feb2384c5a840dc61c808a392c20cd35f66210b705863bed38be4eb2821f7f904a17ab5c1d36fd200feeec9091ffa2b1515aefc87f1d5e24c3e57eba0932df5962e8beda60998d42686563b56239930af024a0b7ca850c92f0267e8b52e3891479d2e40081202f256f698f6c88c0d6a0348b58c84668341f5456b108dd1488f528423d569131c9d74b37a55ddf0c0b33b8773097104cd9f93f05302af7ed7bf15f8160bdbde75102d2c530e5dfd3186122928c46e933adf2e7aeab562ef9126a35c60d550dc34af969eff4168a35d1cb22d52b43b5c73c84e6b5688a1f47d88cba3fd4f2e13ead5a1ca9d2b52ddab1ed995a75baf025bf1a37ce5ca0ec73d5012c87981839a2d62e62e4acad61ecb3f979f9d26e526472661e888d0f622f8f15e1f3b63f4392b37810c1fc1800ccff21bb5c5ad062ed1557b0ecc2d92a6b11bd6fefaea38f79ae0956fcd2539e92f5b6e6bab73d96b4ddf955faeb9ac05cc50fd6d34fbb5f5ac5bcd014006b2dc0c4aa4299e37d8bb69e6733107b0fc681118fb37babc35619e5e73b6e7ce772d61ffafdc72314cd66b38b94b0979e5ee382af539c2a69a1f5722a22df3935226d1260bc19317894be1e04954034c0a2ae466f45d4e3eca7e1e1014f4014038366031d4908158554d30bd544f3049da8ee828568da44d4e9807bf92ba8a09d3fc116b59eb27a531e1d98e8ec08c31ffb42b148f5f215a601ea54ab59fd622353302790c4765dd06c8bb5fb2b29f5ff8d0101f816af4d741e8fa953af087654dc2a83517eae123f1269e4ba639d8f402902ddb60b04d2cf650676220389a49fa9b2519959fb1d4dbd1f739d0c64e75644ec08f4791f0701c1a48afa89e02407cb8d92cb71f79a45318b37fe6b1ec6827aad511eb1ede5f0b488d69e562fb10d0f693272eaa3442ad0b43eb9ccaa28861a523f82d3bc9183ae4aa91be1086609d7f1ee82c40453f4feae886250a16a9c28ab719c33a029c2a8c3d38d7e14accd81794e7afa9e9d3a54dc0135680048e1180c5b3b5f765eb6c72eaa470cea40d399b4224afc99616511c379aafe6bd3988aabb26646ff60384a6f207bbe1cfea2e313a3e3db82390ed9afed4c59f543911c759a6d66d1cb6ba3a7852fdb2f4080256ecc34dd41e2f33b4b049019178285acb4b73d9143a1036dbfc401543652bd1aeae0671080bfc2e51420bdf0603a81137ec37e20e20346f0933dd681a902593308d582ee5b8d5966440a997316ef86375aa384bf2826ede7f50358c05736d75f79df1c6b1cbe48edc9d0878b18f8db681116a2528946c3948ebd95a6aefdc7191009163d9aea38488c440f16cca33666acf1c56613cfa34fb45b6886511c985cfd45b426271da579372b16ade924634ea30901e6a661f3544ac33ca3d4f7cbc7280758f2728b1c2d8aaa4f07a488afb72c5385e71703136a93edac8a37a0f605ad0c7e8f887804e66873c5bbe2dd91412972f9b8cf6ee0f0baa12c8c6df8d7072f92e3758c57203eaf8cda12efbcf97eb7e4250f2226dc83b7343038c9a4b246b36a45e00ba6bf2106a8a01a27565dffdc23e6693626b1bd39cf7aab52838dc13b0f97f48ec26fd2b68e590077a89f5a4500fc223bcf9be91fa7b9a1f96bbbb0baac1232d1574957dcaf76f65fa75fda2d3fda114ddc135f53fbe4112fb8929dc9ba709d6fd703d3182bb9fa9df542a312047225449cbbdcc376ddef3ad46ec3f96873bcf058f13e87b2c6775cd38735ae0c07a20c27c23e5fd581365ee633cc8115e3a53ac132a792f48fe6dc5b021df6aaeb0584063966d6969b477dbe50a1a5bf178a4b1bf1c1e3063e4de4c3d9918739401ea94b10c8b9e5e1da68b06f1a9fa46d8845f9c3cd01f0093cd54f10e3625ae269c4331e4ee8f699b463b356ad9102d0ce7087489ffd6232ac0c622f6e0929b1355033e12e417256cd08ca4961a3bfff689244f0519a76296feef3a0035ba87669cfe"}]}}}}}}, 0x0) 03:19:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0xc0e, &(0x7f0000000100)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000300", 0xbd8, 0x3a, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f3, [{0x1f, 0xb, "a78c000005dc791153d5dea6b259b8e3cd2c8038336823493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430397754db3e340a14a2a1328c5f93037dc1435c11b37adac1508419af736b41e5a8"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x84, "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"}, {0x0, 0x1, "b20360609ee68487"}, {0x0, 0x9, "c139276371aea9b7cdbd32b0a978030a03d23d9fca26dd1213e1010898b256e481da1018059f850b91347107a9dd38da31c1a16267a090b62089ee0d776d581b1bd756ff9010"}, {0x0, 0xc7, "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"}]}}}}}}, 0x0) 03:19:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r4, 0x8200) sendmmsg(0xffffffffffffffff, &(0x7f0000005840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000009040)=ANY=[@ANYBLOB='F'], 0x1}}], 0x1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0xe0b7}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 03:19:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x18, 0x5, 0x8, 0x319, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) 03:19:33 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000500), 0xfffffffffffffd45}, {&(0x7f0000000040)="d56a0ce6d8f00149d463ffb321c9aac260de3521ad38edefc0f2d7d7ed3419efbdaae30747cb014463370c63516135d09381ffc081d2080b1a57e482831c68178389b03b1fde048d3c873cd19853564e76ca5a72061e3566beaf1051b13fee062fb5b39368cd58891eac0597d2cd0bccecc00eb13d341a393aafe7aee9d9faa1d29d980c913297265b3e711d3cd7755db5204b616d9fad293c090740de0016422c94b80bb86336680d597a9993d98d9e81960981efbe2caf1de2d76de733d4c8740c2a9911676f11bce53ee450ba7ad6aa6a5187454a4f079d2c283918b5", 0xde}, {&(0x7f0000000180)="2567ae4d8db5cc86380642ce3e5472689fc56c6db77a72b9eb43cb1804e678986c73ce2dd640f47df2d3d10bc454ed1e81832d9d3fcf20e083e2e5f3881dfa9f6ddce353f32bc6404f57ae18b6cb9d2561a68fd6bd16a51994c634a25b74b8bc77340954c432117de3babca243af582f80d929fc317eb63c850426a0b4925f2dc104d47294be", 0x86}], 0x3, 0x0) 03:19:33 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000080)={0x0, 0x0, 0xfff0fc03, 0x0, 0x0, "f8023800000000000a350ba13a9f87df00", 0x0, 0x2}) 03:19:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r4, 0x8200) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r5, &(0x7f0000007fc0), 0x400000000000030, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000009040)=ANY=[@ANYBLOB='F'], 0x1}}], 0x1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0xe0b7}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 03:19:33 executing program 0: lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="757365722e7f"], &(0x7f0000fc0000)='//selinux\x00\x00\x01\x10', 0x56, 0x0) 03:19:33 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) 03:19:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) 03:19:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r3, 0x8200) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0xe0b7}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 03:19:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) dup2(0xffffffffffffffff, r0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r3 = socket(0x40000000002, 0x3, 0x80000000002) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) sendto$unix(r3, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs, 0x33) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) shmctl$SHM_LOCK(0x0, 0xb) r4 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) sendto$unix(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs, 0x33) fchdir(r4) r5 = socket(0x0, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) sendto$unix(r5, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = creat(0x0, 0xc0) r7 = syz_genetlink_get_family_id$gtp(&(0x7f0000000780)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r6, &(0x7f0000000840)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x20, r7, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@GTPA_TID={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) r9 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r12}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x0) r15 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r15, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) sendto$unix(r15, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs, 0x33) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) sendmsg$GTP_CMD_NEWPDP(r5, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r7, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8, 0x1, r8}, @GTPA_LINK={0x8, 0x1, r12}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}, @GTPA_NET_NS_FD={0x8, 0x7, r14}, @GTPA_LINK={0x8, 0x1, r16}, @GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x11}}, @GTPA_O_TEI={0x8, 0x9, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x20044}, 0x10) 03:19:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@multicast, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, 'Hk\\', 0x14, 0x6, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:19:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c467144d2fa833"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x2}, {}, {0xfff1}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 03:19:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f00000015db5df948da20646050526600e625d86800278dcff47d010000805ae64f8f36460234432479aed75d492b416d15441e002ea3200ded0907d7aadeb384bf51c944bd477d7d7b58144930f81b54fc7470d6458d6d33f0a8d6b27f402da7610707d70c2663f2c54adcb274ad76479e5d9364e9f3aee4e3df22bbd9f0b35ffaaeb756cbc012fa90ce41fb9e81b2c5046e0750e66cb81b0b63b14773ec55435617b166e3a4eedec405e0120500000000000000f639", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 524.140640][T15436] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 03:19:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r4, 0x8200) sendmmsg(0xffffffffffffffff, &(0x7f0000005840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0xe0b7}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 03:19:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f00000015db5df948da20646050526600e625d86800278dcff47d010000805ae64f8f36460234432479aed75d492b416d15441e002ea3200ded0907d7aadeb384bf51c944bd477d7d7b58144930f81b54fc7470d6458d6d33f0a8d6b27f402da7610707d70c2663f2c54adcb274ad76479e5d9364e9f3aee4e3df22bbd9f0b35ffaaeb756cbc012fa90ce41fb9e81b2c5046e0750e66cb81b0b63b14773ec55435617b166e3a4eedec405e01205000000000000", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:19:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:19:34 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_buf(r3, 0x29, 0x44, &(0x7f0000001a40)=""/57, &(0x7f0000001a80)=0x39) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r4, &(0x7f0000a00000/0x600000)=nil, 0x1e76b3f7e83c4d66) r5 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r5, &(0x7f0000a00000/0x600000)=nil, 0x1e76b3f7e83c4d66) r6 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r6, &(0x7f0000a00000/0x600000)=nil, 0x1e76b3f7e83c4d66) shmget(0x1, 0x4000, 0x100, &(0x7f0000ffc000/0x4000)=nil) r7 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000e89000/0x2000)=nil) shmat(r5, &(0x7f0000a00000/0x600000)=nil, 0x1e76b3f7e83c4d66) shmctl$SHM_LOCK(r7, 0xb) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') sendmsg$sock(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000000)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}, 0x80, &(0x7f0000001640)=[{&(0x7f00000000c0)="e6efbc3f77f12537fcee2538e4c0ca816a4ac111d07d02bd145feb5fdc021a802289d695f9534de6e6fc0e5d6ae39318be624c0255a5cf9d7c816d86abaafa550c5ec3949d00b89a483a53c6d2ab92e16120a00393c4208e54b6e51d57803c03fc799dca78eb986bb92c9a976321a8bd7f65a9ceaa04b0a1deebca030ebaff6ed8e91a509dceb565c1a85b8e71d09b3f7fc2617f99a6331213cc50fdf9fe52f3653e6e3f340471ae3bce87f2b6ffdc69569e652519aeb6a8ee065f39bc", 0xbd}, {&(0x7f0000000200)="1179acea708e4227b4cbc62d753ca14a84d202b87c294172227b398137eec8aa0f9c3b1cc591e2a1591b447ca6a187061277a8ae6438c67b35982141b383bd16064db5991cd515fb6041bf125118f01a470ff526ff18ed5613fbc38ca6673d90069895343dd2", 0x66}, {&(0x7f0000000280)="be152eb7df8640290cc35f3ae78a7c30aefc31cbdde871f681288e33b0f48cfc2d212fde191028ca043538008de8acdb5e22d3aff323bdfcc7da9635a917e74d65f24c4d2bc6c38a3cf36d4235064eee85c062976ba04290c4e02b1e0a01db2adcd3d463368ab0aa08e460826e4b2839a8987f1f72b1e0ae34219bbc05dfbbb814c00cb739533a3bca48f3ad19d45df1d6b89f6b7d2ffe27105529501c9b4739b0f9085a17c5bbd402c9a365d49bea641c28f238af5a0b10ba99ff9df04cebc4d832c1e407bf2f7d6b090c1725d5746949bebbc757b7a1ca1e176d38", 0xdc}, {&(0x7f0000000380)="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", 0xfa}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="20fe2ef3576e42b712fddd64f0a13cceab108722e328c5539cc0516fb68b1126e3a9a5968c2e802177261cda826ebd6d0a61670bc2b3125c283e17a8c8e76d2ab4a315285f0f0de7fabae5a84d9adb96cd1689344cc5a6413b1b9b053c891d10300ca3a998d08dc34c835eb8474796b8d2eecb7e70fbc101bf50216eb001812e7a9d0009cf963e055220e4eca4a95f9842a17c3454993e6996bd7c6515e8b1c5dde78336a086f8e5efb3eae8bcd4a543b9db872ad806cefc1d1ea131ca66c19a185d13c2469d66aca097a57429ce", 0xce}, {&(0x7f0000001580)="d00300cb3ac0e153c0e4bde693987f376fe81615d6a810e1fd3a15fac30683f9deef3013d17979b7cc5b9ac4081e2f42027dafb3fdfc5f19c40beb841034ff80edbba904a02f0230914ed041eac13402aa9fd8aaeb78098ae5e42ea36edda73e2311f59b053468a86768e6438eddbeb8813b8567a0574197ee85f5198a4707998e17c2c60a8ea39a5ab411a3d404c06915fecad349398576437e06bd14def25d6a10e892b31ed088b125ece21bf9cefc8a7528fc2892", 0xb6}], 0x7, &(0x7f00000016c0)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x60}, 0x24000001) getsockopt$inet6_udp_int(r8, 0x11, 0x65, &(0x7f0000001840), &(0x7f0000001880)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) r11 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_int(r11, 0x1, 0x4, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r12 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001980)='/dev/nvram\x00', 0x50001, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r12, 0x541b, &(0x7f0000001ac0)) socket$inet6_tcp(0xa, 0x1, 0x0) 03:19:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2200cff9, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmmsg$inet(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000003540)="50d7eadc9a140035ef04a93780ade355d396eb44d415d779f240509496e84138747151b30923aa8bf34f00a8bb4465df960800e619464867820fceabc6eda2321714f6ad48f3fc3bd4ac7510081ae1c9920ee49a5e5b44f39e4a6ae3f1f2febfe66db5d275995816cc39f345d8b7295b9a62ca4833cc14080ad7c1f38c85e3435e809f5760b6cb7f0c57d99c2d2dd68d391474ce4712ef22e267e3d91b000000e4b7a279425778039c2554fa3a167805870000000000000000c53703f2e3a9840eb349d18caf7f48c96c732aabd86830af4f4e2368dff29528f6c82e64455aea4f74ec77c5a8d01560ef", 0xea}, {&(0x7f0000002600)="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", 0x537}], 0x2}}, {{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000300)="b2", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002480)="c4", 0x1}], 0x1}}], 0x3, 0x488d5) 03:19:34 executing program 3: 03:19:34 executing program 0: 03:19:34 executing program 1: 03:19:34 executing program 5: 03:19:34 executing program 3: 03:19:34 executing program 1: 03:19:37 executing program 2: 03:19:37 executing program 0: 03:19:37 executing program 4: 03:19:37 executing program 5: 03:19:37 executing program 3: 03:19:37 executing program 1: 03:19:37 executing program 0: 03:19:37 executing program 2: 03:19:37 executing program 1: 03:19:37 executing program 5: 03:19:37 executing program 2: 03:19:37 executing program 0: 03:19:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 03:19:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB=',']) 03:19:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000002040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:19:37 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, &(0x7f00000002c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:19:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='tz=UTC']) 03:19:37 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000000)=0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000140)="f4"}) clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper], 0x1, 0x0, &(0x7f0000000080)='2'}) 03:19:37 executing program 3: [ 527.831743][T15524] FAT-fs (loop4): bogus number of reserved sectors [ 527.854932][T15524] FAT-fs (loop4): Can't find a valid FAT filesystem [ 527.978760][T15524] FAT-fs (loop4): bogus number of reserved sectors [ 527.992715][T15524] FAT-fs (loop4): Can't find a valid FAT filesystem 03:19:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0, "bb291a3508aebeadca7239b6ffff660ae7ca9107b003339bd0eddf804cfc4dc2183a4187182ae94a2a21eb060261dfaa78352ce2a27f19034130c913dea76a0f", "efeb3f7d0a54288cbb52af3397afa2c25ec3519386257649246be36844cf41f45a1093eab178d81a8c04aedcbf022b462e3accef8b2ab38cd2817e07028521a4", "1a07b519ed7b6f90f42bfb206855c1bcc0de0f55b44462cd9d542bfe5222287f"}) 03:19:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 03:19:38 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb8824800000000000000004c6d6e511dcdc6041c8d8a0957939950c15c4dea53577820e1d5957ba4167f17600b58767db91e29eb92a20f86dd9fb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcd00000000000000006ddfdd", 0x8c}], 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:19:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x200000, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001000)=""/4087, 0xfffffffffffffeeb) r0 = add_key$keyring(0x0, &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, 0x0, r0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) io_setup(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000002d40)=""/41, 0x29}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r3, &(0x7f00000017c0), 0x375, 0x0) [ 528.253160][T15548] FAT-fs (loop2): bogus number of reserved sectors [ 528.335652][T15548] FAT-fs (loop2): Can't find a valid FAT filesystem [ 528.520293][T15548] FAT-fs (loop2): bogus number of reserved sectors [ 528.543632][T15548] FAT-fs (loop2): Can't find a valid FAT filesystem 03:19:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23bb21d35b39fb65cb867b27f0d421f36e3c958b1d0104000000000000ffff11080000ad5e5eaa07dc"], 0xfdef) 03:19:38 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 528.740113][T15571] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 528.832909][T15571] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 03:19:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[], 0xffffffef) shutdown(r0, 0x1) [ 528.937418][T15571] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 529.032260][T15571] EXT4-fs error (device loop3): ext4_fill_super:4560: inode #2: comm syz-executor.3: iget: root inode unallocated 03:19:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/231, 0xe7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0x0) [ 529.210920][T15571] EXT4-fs (loop3): get root inode failed 03:19:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@flowinfo={{0x14, 0x29, 0xb, 0x101}}], 0x18}, 0x0) [ 529.328212][T15571] EXT4-fs (loop3): mount failed 03:19:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bb291a3508aebeadca7239b6ffff660ae7ca9107b003339bd0eddf804cfc4dc2183a4187182ae94a2a21eb060261dfaa78352ce2a27f19034130c913dea76a0f", "efeb3f7d0a54288cbb52af3397afa2c25ec3519386257649246be36844cf41f45a1093eab178d81a8c04aedcbf022b462e3accef8b2ab38cd2817e07028521a4", "1a07b519ed7b6f90f42bfb206855c1bcc0de0f55b44462cd9d542bfe5222287f", [0x0, 0x1]}) 03:19:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bb291a3508aebeadca7239b6ffff660ae7ca9107b003339bd0eddf804cfc4dc2183a4187182ae94a2a21eb060261dfaa78352ce2a27f19034130c913dea76a0f", "efeb3f7d0a54288cbb52af3397afa2c25ec3519386257649246be36844cf41f45a1093eab178d81a8c04aedcbf022b462e3accef8b2ab38cd2817e07028521a4", "1a07b519ed7b6f90f42bfb206855c1bcc0de0f55b44462cd9d542bfe5222287f"}) 03:19:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x127d, 0x0) 03:19:39 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 03:19:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00001, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)={[{@fat=@usefree='usefree'}]}) 03:19:39 executing program 5: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:39 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000000)=0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000140)="f4"}) unshare(0x2000400) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper], 0x1, 0x0, &(0x7f0000000080)='2'}) 03:19:40 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 03:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x125f, 0x0) 03:19:40 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000340)=""/238, 0xee) 03:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r2, 0x1267, &(0x7f0000000080)) 03:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 03:19:40 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1081004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000100)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}, {@block_validity='block_validity'}]}) 03:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 03:19:41 executing program 5: openat$ion(0xffffffffffffff9c, &(0x7f0000002080)='/dev/ion\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="07000000000000001c001a8018000a8014000700debb0000000000000000000000000001b2c3414e631cb154b5276dd2c4ac"], 0x3c}}, 0x0) 03:19:41 executing program 0: 03:19:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 03:19:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 03:19:41 executing program 5: 03:19:41 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 531.303959][T15767] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1,block_validity, 03:19:41 executing program 3: 03:19:41 executing program 0: 03:19:41 executing program 5: [ 531.500949][T15791] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1,block_validity, 03:19:41 executing program 0: 03:19:41 executing program 2: 03:19:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x200000, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001000)=""/4087, 0xfffffffffffffeeb) r1 = add_key$keyring(&(0x7f0000000640)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, 0x0, r1) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) io_setup(0x1, &(0x7f0000000000)=0x0) dup(0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/stat\x00', 0x0, 0x0) io_cancel(r2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000002d40)=""/41, 0x29}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) preadv(r3, &(0x7f00000017c0), 0x375, 0x0) 03:19:41 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 03:19:41 executing program 0: 03:19:41 executing program 1: 03:19:41 executing program 3: 03:19:42 executing program 0: 03:19:42 executing program 2: 03:19:42 executing program 1: 03:19:42 executing program 3: 03:19:42 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 03:19:42 executing program 0: 03:19:42 executing program 2: 03:19:42 executing program 5: 03:19:42 executing program 3: 03:19:42 executing program 1: 03:19:42 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 03:19:42 executing program 2: 03:19:42 executing program 0: 03:19:42 executing program 2: 03:19:43 executing program 3: 03:19:43 executing program 1: 03:19:43 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) write$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 03:19:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, &(0x7f0000000040)='\xdc\x8c\x91G\x03\x9a\'\xa6\xbe~\xfe\xf00j\xe8E\xdcjn\xbf') 03:19:43 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 03:19:43 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(r0, r1, 0x0, 0xedc0) 03:19:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@gettfilter={0x23, 0x2e, 0x1}, 0x24}}, 0x0) 03:19:43 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x16200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0xfeffff, 0x56, 0x0, &(0x7f0000000700)="c45c57ce395de5b289f07d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f12089055", 0x0, 0xf0, 0x0, 0x0, 0x0, 0x0}, 0x40) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESOCT], 0x17) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffff9c, 0x0) fstat(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) wait4(0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) lremovexattr(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="73797274d91e2e00"]) clone(0x21000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:19:43 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 03:19:43 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./bus\x00', 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x64, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x79b40bd7, 0x16200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) symlinkat(0x0, 0xffffffffffffff9c, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000800)='/dev/bsg\x00', 0x0, 0x0) fstat(r1, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) open$dir(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) lremovexattr(0x0, 0x0) clone(0x21000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 03:19:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:19:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x5f, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000380)='/dev/vcsu#\x00', 0x3a, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000040)={{0xeb9f, 0x2, 0x0, 0x2f, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x9, 0x1}]}}, &(0x7f0000000280)=""/222, 0x26, 0xde, 0x8}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 533.643534][T15884] overlayfs: overlapping lowerdir path 03:19:43 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 533.743998][T15890] overlayfs: overlapping lowerdir path 03:19:43 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./bus\x00', 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x79b40bd7, 0x16200) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000580)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xfeffff, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESOCT], 0x17) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8001) fchdir(r2) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffff9c, 0x0) fstat(0xffffffffffffffff, 0x0) fcntl$getown(r4, 0x9) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_vlan\x00', {0x2, 0x0, @multicast1}}) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r5, &(0x7f0000077000)=""/133, 0x2800) lremovexattr(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="73797274d91e2e00"]) clone(0x21000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_capability(0x0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) [ 533.896629][T15899] BPF:btf_header not found 03:19:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(0x0, 0x80000001, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000001c0)={@loopback}, &(0x7f0000000200)=0x14) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 534.018416][T15884] overlayfs: overlapping lowerdir path 03:19:44 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./bus\x00', 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000c80)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x79b40bd7, 0x16200) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000580)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xfeffff, 0xe0, 0x0, &(0x7f0000000700)="c45c57ce395de5b289f07d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e", 0x0, 0xf0}, 0x40) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESOCT], 0x17) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8001) fchdir(r1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffff9c, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000800)='/dev/bsg\x00', 0x0, 0x0) fstat(r4, 0x0) fcntl$getown(r3, 0x9) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_vlan\x00', {0x2, 0x0, @multicast1}}) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r5, &(0x7f0000077000)=""/133, 0x2800) lremovexattr(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="73797274d91e2e00"]) clone(0x21000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_capability(0x0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 03:19:44 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 03:19:44 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r2 = semget$private(0x0, 0x2000000010a, 0x0) semop(r2, &(0x7f00000000c0)=[{0x3, 0x6ff8}, {0x0, 0x0, 0x1000}], 0x5c) semop(r2, &(0x7f00000000c0)=[{0x3, 0x420}], 0x1) 03:19:44 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$read(0xb, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001280)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="1474df", @ANYRES16=r7, @ANYBLOB], 0x3}}, 0x0) accept4$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14, 0x80800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'veth1_virt_wifi\x00', r8}) [ 534.211903][T15921] overlayfs: overlapping lowerdir path 03:19:44 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x2000000010a, 0x0) semop(r2, &(0x7f00000000c0)=[{0x3, 0x6ff8}, {0x0, 0x0, 0x1000}], 0x5c) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}], 0x1) 03:19:44 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 534.464074][T15929] overlayfs: overlapping lowerdir path 03:19:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) write$binfmt_aout(r0, 0x0, 0x0) 03:19:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r3, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1100000042000506000000366ab1001000ed623c087dcbffa241ee19776b1d9ada6676c7517f97b2d3add33b040000004c651514f99a98a2863c7c3935f1a5550000000000000000000001535240b091e8b4b507f70000000000009ad7b06becbf9abd5c2e059ff3f6546b9e2b12ea0ca054fb97b05be546deff7f72208235fcfd2dce9c50454c7012ba98d96188e7243469f14ec61078bdf4fa2ae9d6b50b93e02cba4a9a319cddbe699cf8cd8f9be20000000000005453769cbb9113e1158ccc2bffa68a79b7fb95273e2cc1decde899de90fae974d6917a88583f592797e0879b2a8377be70aaef08ed7d9f312ae162e32aa3bc5207410e67ce6ca85b42511710e49c31277e7ed445c1eaa4ea6d13d65c2d47e34f9c8f36cb47ae408ffffc794ae1b9f1797dcaa0832e23a7d318993003dd57e4cb8d5e1262173020010000000000009e6ef016696a197039f18903238af9e17868cd9bb7299fa8470d561f1f8706c9106d8fbbd60061c2fa490a490000000000bda821496096836c39c41d63cac09ac76b36808bdb774cf50e2bfca9835fcd50d4f2249efc7026d259a166f71b0000000000000000000000000000002422e9c16798953eceddee1c072a580fa7bb4b375543971407971c737e39ab37d9756cf5a47a2a4a1b891dbcffc9509ebc056bbfe155cec6cab0b547b513093b2675f8dfaa9dec85440a682853643c97d1abc2be473818f1b9fa3ae5cddd50f86dea649207676102b8c0478c1e29338144a12cd3d3ca2a4606ecf248abcf2a5297b878174959c3371e24295342ab935eee990ef35dc0811f0902298e0936493cddc70733ca04a08a205331306f2cbb47292d5894419f2fc3e80baf20844271109916c4d00e26988f2e04fea3dd8affb97a82b968f8d7510a8b82e77ef6c759204799e1d904c5c26f04b13c7eb763cdbbd93ee8163db307669216804da27a859fde8abe1a575c313866cf3c760568b604dd269427d237cdd592c01b703f791f3451864ca762fe291c9da71cdb006fd5043f72a66f31884e63751cc399b1ae72f2510430182c873a1fbb938738f85df52e3c0499b13856e34c5c3a7fc8843cfacfaf8129b20a3b973783f8fe3e0326c23c3af59be50e03f76321866dd5ba1c6441c6420000000086f94545c9b3c5dd65fd62900142fa8d4eb7da8dcfcf97677be111607f3c0dc6a48686d4cb92a3dcacc1f1798eea2ee659b9a27e76d4319683dc0dcf6ade88f6292dccab2ac234575b981b3469f812d74e8e98180a25d37faf4217f7d694fae0d7dc4655d0a844a2844d56694797b7a365a247f93c42bc1b2d835b000000000000000000000000001be761ba54518718cde93b60d5f1c579fbcec7a25feb8fce460f3eb76fcea05a31236861712462f716a493ed783b139bcf740a377475195b31201e344186371e1c0d38898545c3f010704401f5c48ee9016868391c05cdfe9666a8449601e45a23dfe064e1734fd2edcb442e408f9d0d3c98d7a4f0e94fad201c4942bf3d648728e1f2a02d92e43d25a843f7184591d083ef3bfc58a90756c81191f6a7511cdffd6b59fb36d6791c762ea25dc174778992f6cb44b1adf7f0fcf471a0d53d33c31efaddea6e29978ca33c46"], 0x14}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:19:44 executing program 1: sysfs$1(0x1, &(0x7f0000000140)='hfsplus\x00') 03:19:44 executing program 5: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x54da9dbb87d932af) 03:19:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:44 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @broadcast, @void, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local, {[@timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bce307", 0x0, "d01b05"}}}}}}, 0x0) 03:19:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r2, 0x541e, 0x0) 03:19:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:19:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) setgid(0x0) 03:19:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setgid(0x0) 03:19:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:45 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb8824800000000000000004c6d6e511dcdc6041c8d8a0957939950c15c4dea53577820e1d5957ba4167f17600b58767db91e29eb92a20f86dd9fb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcd00000000000000006ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="f57859353cdb0ea1d11cc082677f6ec99654c341ef5556dbf349f990fcaa3845c6c12e727eb0f4afa4fb356cf6aeebd361bc006f246bee0c826d37d322fc06e3164284ab34d6e5066f6940ce639658f167e562fb0e85f8b9aeeb111a1521f945940f48110179df39a0", 0x69) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:19:45 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='creator=6']) 03:19:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x100000c, 0x0, 0x0) 03:19:45 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init() chdir(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000300)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') 03:19:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)) 03:19:45 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000100), 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) fsetxattr$system_posix_acl(r1, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="02", @ANYPTR, @ANYRESHEX, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="080001"], 0x7, 0x2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/231, 0xe7}, 0x8}, {{0x0, 0x0, 0x0}, 0x1008}, {{&(0x7f0000000e00)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000001040)=""/99, 0x63}, 0xfffff258}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000010c0)=""/101, 0x65}, {0x0}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001240)=""/51, 0x33}, {&(0x7f0000003dc0)=""/4096, 0x1000}, {&(0x7f0000001280)=""/242, 0xf2}], 0x6, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, &(0x7f0000002880)=[{0x0}, {&(0x7f0000002600)=""/112, 0x70}, {0x0}, {&(0x7f0000002780)=""/201, 0xc9}], 0x4}, 0xc28}], 0x5, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet(0x2, 0x803, 0xa0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_int(r3, 0x0, 0xf, &(0x7f0000000000)=0x6, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$inet6(0xa, 0x10000000000001, 0x0) dup2(r4, r4) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000000)=0x6, 0x4) fcntl$getown(0xffffffffffffffff, 0x9) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='timerslack_ns\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r5, &(0x7f00000017c0), 0x1a0, 0xf0ffff) recvmsg(0xffffffffffffffff, 0x0, 0x100) [ 535.791043][T16000] hfsplus: creator requires a 4 character value 03:19:45 executing program 0: 03:19:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 535.875192][T16005] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 535.896581][T16000] hfsplus: unable to parse mount options [ 535.915650][T16005] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 535.960309][T16005] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 535.989190][T16000] hfsplus: creator requires a 4 character value [ 536.012213][T16005] EXT4-fs (loop5): orphan cleanup on readonly fs [ 536.019251][T16005] EXT4-fs error (device loop5): ext4_orphan_get:1256: comm syz-executor.5: bad orphan inode 160 [ 536.021959][T16000] hfsplus: unable to parse mount options [ 536.065356][T16005] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 03:19:46 executing program 0: 03:19:46 executing program 1: 03:19:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:46 executing program 5: 03:19:46 executing program 2: 03:19:46 executing program 0: 03:19:46 executing program 1: 03:19:46 executing program 5: 03:19:46 executing program 2: 03:19:46 executing program 3: 03:19:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:46 executing program 0: 03:19:46 executing program 1: 03:19:46 executing program 5: 03:19:46 executing program 2: 03:19:46 executing program 2: 03:19:46 executing program 1: 03:19:46 executing program 0: 03:19:46 executing program 5: 03:19:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:47 executing program 3: 03:19:47 executing program 0: 03:19:47 executing program 2: 03:19:47 executing program 1: 03:19:47 executing program 5: 03:19:47 executing program 3: 03:19:47 executing program 3: 03:19:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:47 executing program 0: 03:19:47 executing program 1: 03:19:47 executing program 2: 03:19:47 executing program 5: 03:19:47 executing program 3: 03:19:47 executing program 1: io_setup(0x5f, &(0x7f00000000c0)) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2000, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0xedc0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xb, 0x2, [@struct={0x0, 0x0, 0x0, 0x9, 0x1}]}}, &(0x7f0000000280)=""/222, 0x26, 0xde, 0x8}, 0x20) 03:19:47 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xac, 0x0) read$midi(r0, 0x0, 0x0) 03:19:47 executing program 0: 03:19:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0b") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:47 executing program 3: 03:19:48 executing program 2: 03:19:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0xfde5}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, "f426e6", 0x0, "3237fb"}}}}}, 0xfdef) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'osx.', '/dev/net/tun\x00'}, &(0x7f0000000100)='/dev/net/tun\x00', 0xd, 0x3) 03:19:48 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0b") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) fcntl$addseals(r0, 0x409, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r2 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000040), 0x4) sendmsg$tipc(r2, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000340)=""/202, 0xca}], 0x1, &(0x7f0000000980)=""/100, 0x64}}], 0x2, 0x0, 0x0) [ 538.346937][T16127] xt_CT: You must specify a L4 protocol and not use inversions on it [ 538.545722][T16135] FAULT_INJECTION: forcing a failure. [ 538.545722][T16135] name failslab, interval 1, probability 0, space 0, times 1 [ 538.601036][T16135] CPU: 1 PID: 16135 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 538.611033][T16135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.621125][T16135] Call Trace: [ 538.624567][T16135] dump_stack+0x197/0x210 [ 538.629020][T16135] should_fail.cold+0x5/0xf [ 538.633583][T16135] ? setup_fault_attr+0x1f0/0x1f0 [ 538.638770][T16135] ? ___might_sleep+0x163/0x2c0 [ 538.643789][T16135] __should_failslab+0xb7/0x100 [ 538.648766][T16135] should_failslab+0x9/0x14 [ 538.653401][T16135] kmem_cache_alloc_node_trace+0x274/0x750 [ 538.659316][T16135] ? lock_downgrade+0x920/0x920 [ 538.664336][T16135] __kmalloc_node+0x3d/0x70 [ 538.668974][T16135] kvmalloc_node+0x68/0x100 [ 538.673637][T16135] xt_alloc_table_info+0x41/0xa0 [ 538.678748][T16135] do_ipt_set_ctl+0x260/0x4c2 [ 538.683487][T16135] ? compat_do_ipt_set_ctl+0x170/0x170 [ 538.689098][T16135] ? mutex_unlock+0xd/0x10 [ 538.693643][T16135] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 538.699685][T16135] nf_setsockopt+0x77/0xd0 [ 538.704345][T16135] ip_setsockopt+0xdf/0x100 [ 538.708934][T16135] tcp_setsockopt+0x8f/0xe0 [ 538.713557][T16135] sock_common_setsockopt+0x94/0xd0 [ 538.718879][T16135] __sys_setsockopt+0x261/0x4c0 [ 538.723794][T16135] ? sock_create_kern+0x50/0x50 [ 538.728757][T16135] ? fput+0x1b/0x20 [ 538.732829][T16135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.738333][T16135] ? do_syscall_64+0x26/0x790 [ 538.743145][T16135] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.749259][T16135] ? do_syscall_64+0x26/0x790 [ 538.753999][T16135] __x64_sys_setsockopt+0xbe/0x150 [ 538.759204][T16135] do_syscall_64+0xfa/0x790 [ 538.763758][T16135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.769734][T16135] RIP: 0033:0x45c479 [ 538.773725][T16135] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:19:48 executing program 0: r0 = socket(0x10, 0x800000000080003, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/551, @ANYRES32=0x0], 0x20}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r4, &(0x7f0000000000)={0x18}, 0x18) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000080)={0x0, 0x6, 0x7f, [], &(0x7f0000000040)=0x4}) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:19:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0b") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:48 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000001740)=ANY=[@ANYBLOB="2b10022000000000fe8000000000000020000000000029fe8000000000000000000000000000aafe8000000000000000000000000000aafe80000000000000000000000000c9688fe7000000000000000000000000000100000000000000000000ffffe000000200000000000000000000000000000000fe800000853f000000000000000000bb"], 0x88) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000000, 0x0}}], 0x400000000000085, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) [ 538.795042][T16135] RSP: 002b:00007f37ca585c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 538.803503][T16135] RAX: ffffffffffffffda RBX: 00007f37ca5866d4 RCX: 000000000045c479 [ 538.811587][T16135] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000004 [ 538.819598][T16135] RBP: 000000000076bf20 R08: 0000000000000308 R09: 0000000000000000 [ 538.827692][T16135] R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000005 [ 538.835698][T16135] R13: 0000000000000a34 R14: 00000000004cc9d4 R15: 0000000000000000 03:19:48 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2a0182, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x20000014}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="26b42456c882a878b40fb67043890dae80339729ff7929b681c9b066d23b476456624622d9ed50bc0e0a40bb98108282405e436269dc34a58297bfb5f9eebba531f43035b41dbcfe53e7acc72740013a7372e068b4688f4eaf40894092d5f827dc8f6579d176eeb377cccb48f0e0c8b42a73b2260995599a94273b4addba92280b2cff41fca742229ec48cf36fbf6ab651764f7c65f027180404ef", @ANYBLOB="5fbb683a6579e740ec388b24f95e47bbeece526f524c13671626a255bade73c1e2d299213fe7a217e0bdb6879ce44ca4cc3181d4f4cda1b5539d8a1def79a7ba16b14e8108cbb06da3be24a1956fa5a1fe297a9c4720347a5873625d8d0c315b2239f52ec13cc853b341f52f905dc1a599f204ee9494143eec548e9ead3dd5c56fdf4851e18261b1e36450748c66a682faebe28da783a1c04e2a5fd1a32dc814b385a1af608cdccfd9deda2e3ceff1bbd465e0480ee7f8d8c8ac3be94fd3db52521dc3f54b90f750504986f1c8e6979761bbf21f317d9bece299dd603498eae115eeeb670bda9f0ea25aa37621cafab547197a8447f9", @ANYRESOCT], 0x3}, 0x1, 0x0, 0x0, 0x40041d1}, 0x8010) 03:19:49 executing program 3 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:49 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pwrite64(r1, &(0x7f0000000040)="49d1c893731b3c31b5ddacb4534cef940347c2a587fbce30ff14b93dbf7c3dd95a58abb02b8d333696861c1c0dbeec336e0c50a8ce5a", 0x36, 0xfffffffffffff000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="2400000018002551075c0165ff0f021c14100100100f0500e1000c0800160000000000d54ea279b307bf4021c6f64701002ebabb168194c1f07394203ae5f2987a7b12a477131e75dcf7b9e37ca0c10caec73c846650a5433b9636ffaf6e4ee1fa0d1d5deaaba44fef4656b6264e0915d53e93634e083a9b0457e79427f61125e4f3f6c3038827be351a3bc2871f8000d587fdaa49553ce23b778977e551cc30a7efc67a76b2fcbb276c48c7123a555b1f65c10fdddf3f2035dd82e6297ba00af211f993", 0xc4) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x240040, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r3, 0x8010550e, &(0x7f00000001c0)={0x8, &(0x7f0000000340)="fcbb1e8f069e549f01fe4dde0cf08fda34847cf6ee3dd4ac9e2a01336be8450c10c4357649c1e787cac293b7ea6a68968f9f2ae308aab79c8918fe4a38f7fed965c9be055c5db0bb7f4a9960ced0daa3feb9a030e6c6b9d38a44d424c43eea3dd4a4a5a4303ec27762690c75070f4cc6b112122c061eafa7343e925254aeddcc619ccb632a2841630b4d63bd7ef590fe4ee97f5da67c"}) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448dd, &(0x7f0000000100)="23fee419333b7c6496a8085c9b4d589871a4fcb6ddb6c80f7ba6419f2c40fc127056f3ad6af641cf671309b5d06e84622c56aab96997160e7e14b5532bd2f7e461e56337e5b77f86ed5a9745126c8bd81d2a86fef77b7b49def135d3d0440a1260192256afaf5f03324d2b884466d574559343e24ba8d3172ed9db14046d0f9fb8dc5e81a81b1cbbcc76364910ceadfe376445a4412fc9480d601f5752b37af4be58ea2c33223af6170284ecaed8429c1cd8dae099641e217cdde5") r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x6) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 03:19:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e1d, @loopback}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b00000000007e4754c2f0f4e06efab1350aff00000000000000035c8d63dd359a7a758587200be38d99ee431f24670097683c3ed4e599233cd981817cc50e04811611b75deb"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000280)=0x36e, 0x4) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) recvmmsg(r2, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000340)}}], 0x1, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x8200, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000002c0)={0x2, [0xfff9, 0x3]}, 0x8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000380)={r4, r5}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f00000003c0)={0x0, 0x0, [], @raw_data=[0x20d, 0x1, 0x1, 0x2, 0x4, 0x7, 0x5, 0x1, 0x80000000, 0x3, 0x101, 0x7ff, 0x2, 0x2, 0x5, 0x0, 0x9, 0xffff978b, 0x7, 0x4, 0x6, 0x1de7, 0x9, 0xffffffff, 0x80, 0x4000000, 0x8, 0x0, 0x738, 0x7f, 0x0, 0x3]}) [ 539.283851][T16159] FAULT_INJECTION: forcing a failure. [ 539.283851][T16159] name failslab, interval 1, probability 0, space 0, times 0 [ 539.346561][T16159] CPU: 0 PID: 16159 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 539.356550][T16159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.366778][T16159] Call Trace: [ 539.370147][T16159] dump_stack+0x197/0x210 [ 539.374580][T16159] should_fail.cold+0x5/0xf [ 539.379166][T16159] ? setup_fault_attr+0x1f0/0x1f0 [ 539.384309][T16159] ? ___might_sleep+0x163/0x2c0 [ 539.389383][T16159] __should_failslab+0xb7/0x100 [ 539.394322][T16159] should_failslab+0x9/0x14 [ 539.399003][T16159] kmem_cache_alloc_node_trace+0x274/0x750 [ 539.404882][T16159] ? __kasan_check_read+0x11/0x20 [ 539.409961][T16159] ? __lock_acquire+0x1af3/0x6320 [ 539.415098][T16159] __kmalloc_node+0x3d/0x70 [ 539.419688][T16159] kvmalloc_node+0x68/0x100 [ 539.424250][T16159] xt_alloc_entry_offsets+0x3f/0x50 [ 539.429514][T16159] translate_table+0x21c/0x17d0 [ 539.434436][T16159] ? lock_downgrade+0x920/0x920 [ 539.439345][T16159] ? compat_do_ipt_get_ctl+0x910/0x910 [ 539.444946][T16159] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.451329][T16159] ? _copy_from_user+0x12c/0x1a0 [ 539.456339][T16159] do_ipt_set_ctl+0x2fe/0x4c2 [ 539.461086][T16159] ? compat_do_ipt_set_ctl+0x170/0x170 [ 539.466610][T16159] ? mutex_unlock+0xd/0x10 [ 539.471071][T16159] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 539.477230][T16159] nf_setsockopt+0x77/0xd0 [ 539.481708][T16159] ip_setsockopt+0xdf/0x100 [ 539.486323][T16159] tcp_setsockopt+0x8f/0xe0 [ 539.490881][T16159] sock_common_setsockopt+0x94/0xd0 [ 539.496157][T16159] __sys_setsockopt+0x261/0x4c0 [ 539.501183][T16159] ? sock_create_kern+0x50/0x50 [ 539.506094][T16159] ? fput+0x1b/0x20 [ 539.509949][T16159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.515459][T16159] ? do_syscall_64+0x26/0x790 [ 539.520168][T16159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.526288][T16159] ? do_syscall_64+0x26/0x790 [ 539.531040][T16159] __x64_sys_setsockopt+0xbe/0x150 [ 539.536245][T16159] do_syscall_64+0xfa/0x790 [ 539.540818][T16159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.546738][T16159] RIP: 0033:0x45c479 [ 539.550661][T16159] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.570829][T16159] RSP: 002b:00007f37ca585c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 539.579295][T16159] RAX: ffffffffffffffda RBX: 00007f37ca5866d4 RCX: 000000000045c479 [ 539.587285][T16159] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000004 [ 539.595411][T16159] RBP: 000000000076bf20 R08: 0000000000000308 R09: 0000000000000000 [ 539.603459][T16159] R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000005 [ 539.611478][T16159] R13: 0000000000000a34 R14: 00000000004cc9d4 R15: 0000000000000001 03:19:49 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) writev(r1, &(0x7f0000001280)=[{&(0x7f00000001c0)="e1", 0x1}, {&(0x7f00000012c0)="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", 0x1041}], 0x2) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000080)) 03:19:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x400000000010, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x43, 0x1}}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x32, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106c, 0x40}, [{}]}, 0x78) 03:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:50 executing program 3 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x18000, 0x0) bind$l2tp(r0, &(0x7f00000000c0)={0x2, 0x0, @remote, 0x3}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x9f977eeb479dce8a, 0x0, &(0x7f0000000000)) [ 540.132130][T16179] FAULT_INJECTION: forcing a failure. [ 540.132130][T16179] name failslab, interval 1, probability 0, space 0, times 0 [ 540.215928][T16179] CPU: 1 PID: 16179 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 540.225904][T16179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.235987][T16179] Call Trace: [ 540.239468][T16179] dump_stack+0x197/0x210 [ 540.243881][T16179] should_fail.cold+0x5/0xf [ 540.243911][T16179] ? setup_fault_attr+0x1f0/0x1f0 [ 540.243942][T16179] ? ___might_sleep+0x163/0x2c0 [ 540.243976][T16179] __should_failslab+0xb7/0x100 [ 540.244000][T16179] should_failslab+0x9/0x14 [ 540.244024][T16179] kmem_cache_alloc_trace+0x2d3/0x790 [ 540.244041][T16179] ? xt_find_match+0xa6/0x280 [ 540.244065][T16179] ? __kasan_check_write+0x14/0x20 [ 540.244179][T16179] limit_mt_check+0x161/0x4c0 [ 540.244198][T16179] ? limit_mt_destroy+0x70/0x70 [ 540.244223][T16179] xt_check_match+0x280/0x690 [ 540.244249][T16179] ? xt_check_target+0x690/0x690 [ 540.244274][T16179] ? mutex_unlock+0xd/0x10 [ 540.244290][T16179] ? xt_find_match+0x73/0x280 [ 540.244319][T16179] ? xt_find_match+0x73/0x280 [ 540.244351][T16179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 540.244382][T16179] find_check_entry.isra.0+0x32f/0x920 [ 540.244419][T16179] ? ipt_do_table+0x1b80/0x1b80 [ 540.244449][T16179] ? lockdep_hardirqs_on+0x421/0x5e0 [ 540.244513][T16179] ? trace_hardirqs_on+0x67/0x240 [ 540.244539][T16179] ? kvfree+0x4a/0x60 [ 540.244574][T16179] translate_table+0xcb4/0x17d0 [ 540.244643][T16179] ? compat_do_ipt_get_ctl+0x910/0x910 [ 540.244671][T16179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 540.244691][T16179] ? _copy_from_user+0x12c/0x1a0 [ 540.244712][T16179] do_ipt_set_ctl+0x2fe/0x4c2 [ 540.244735][T16179] ? compat_do_ipt_set_ctl+0x170/0x170 [ 540.244775][T16179] ? mutex_unlock+0xd/0x10 [ 540.244794][T16179] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 540.244813][T16179] nf_setsockopt+0x77/0xd0 [ 540.244836][T16179] ip_setsockopt+0xdf/0x100 [ 540.244860][T16179] tcp_setsockopt+0x8f/0xe0 [ 540.244885][T16179] sock_common_setsockopt+0x94/0xd0 [ 540.244911][T16179] __sys_setsockopt+0x261/0x4c0 [ 540.244934][T16179] ? sock_create_kern+0x50/0x50 [ 540.244955][T16179] ? fput+0x1b/0x20 [ 540.244988][T16179] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.245005][T16179] ? do_syscall_64+0x26/0x790 [ 540.245019][T16179] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.245034][T16179] ? do_syscall_64+0x26/0x790 [ 540.245059][T16179] __x64_sys_setsockopt+0xbe/0x150 [ 540.245086][T16179] do_syscall_64+0xfa/0x790 [ 540.245112][T16179] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:19:50 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000040)) r0 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = getpid() sched_getaffinity(r2, 0x8, &(0x7f00000000c0)) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000001c0)=0x3217, 0x4) write$cgroup_pid(r1, &(0x7f00000002c0)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r3, &(0x7f0000000000)={0x18}, 0x18) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x40, 0x1f, 0x8, 0x8e, 0x0, 0x40, 0x18200, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080)}, 0x201, 0x100000000, 0xf3, 0x7, 0x2, 0xc7c4, 0x9}, r2, 0xd, r3, 0x8) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000180)=0x9) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a", 0x66, 0x10000}], 0x0, 0x0) 03:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:50 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x214a00, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d441e03c9c8f0f82", "0ee6789e06c2fd95f6c0d67dd714de13", "12b56a41", "184291d28c7f3be8"}, 0x28) write(r0, &(0x7f00000000c0)="240000001a005f0023b3f40700090400020040030010000000ff0000080001007f020001", 0x24) r2 = socket(0x400000000010, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) accept4$netrom(r2, &(0x7f0000000000)={{0x3, @rose}, [@bcast, @remote, @rose, @rose, @remote, @bcast, @default, @rose]}, &(0x7f0000000080)=0x48, 0x80000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss={0x2, 0xc6f}, @mss={0x2, 0x3}], 0x2) [ 540.245216][T16179] RIP: 0033:0x45c479 [ 540.245247][T16179] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.245258][T16179] RSP: 002b:00007f37ca585c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 540.497335][T16179] RAX: ffffffffffffffda RBX: 00007f37ca5866d4 RCX: 000000000045c479 03:19:50 executing program 3 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 540.497344][T16179] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000004 [ 540.497351][T16179] RBP: 000000000076bf20 R08: 0000000000000308 R09: 0000000000000000 03:19:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x1}, 0x8) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x104000000000000, 0x40, &(0x7f0000001a80)=@raw={'raw\x00', 0x2, 0x3, 0x208, 0x0, 0x0, 0x0, 0x1130, 0x1130, 0x11e8, 0x11e8, 0x11e8, 0x11e8, 0x11e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x7, 0x4, 0x410, 0x220, 0x110, 0x220, 0x328, 0x328, 0x328, 0x4, 0x0, {[{{@arp={@multicast1, @broadcast, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'hsr0\x00', 'veth0_virt_wifi\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@multicast, @loopback}}}, {{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x460) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000200)=ANY=[@ANYBLOB="c80000001000010000000000000000000000000a20000000000a05140000000000000000010000000900010073797a30000000006c000000160a7fd40670000000000000010000000900010073797a30000000000900020073797a3200000000400003802c000380140001007369743000000000000000000000000014000100766c616e3000000000000000000000000800024000000000080001400000000014000000020a0500000000000000000000000000140000001100010000000000000000000000000a"], 0xc8}}, 0x0) [ 540.497357][T16179] R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000005 03:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x0, 0xfffffffe, 0x0, 0x8000, 0xfffffff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="88000000100001e5ffffff000000000000003183144b3b47eede9a0536cba98410d8f4ed4d16a8d9737c434d70da04e0f61afe0f6708568907e8cc8dd9cbc1ff5b2ae938f1acc818b391471742b150963577759cdb6e457b3e68d8b2dbac7e0fa66a95657065b71d3bb32f0996499a2a36b1cb27ebfe2b2d79f2f7588a799dce8c727f548cca932da0c7586a8159600908f447ce9dddae15f8b5ebd15bf0242e88606795d81a26d585da5b4f0f5c3d028d7473c38d9e", @ANYRES32=0x0, @ANYBLOB="000000000000000044001a80400002803c00018008001200ffffffff08418f3a9d0000000800010005000000080016000900000008001c0000000000088681886fd699b310000000000000000000080029000000000014001400626f6e645f736c6176655f3000"/112], 0x88}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 03:19:50 executing program 3 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 540.497363][T16179] R13: 0000000000000a34 R14: 00000000004cc9d4 R15: 0000000000000002 [ 540.730268][T16197] FAULT_INJECTION: forcing a failure. [ 540.730268][T16197] name failslab, interval 1, probability 0, space 0, times 0 [ 540.730298][T16197] CPU: 1 PID: 16197 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 540.730311][T16197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.730319][T16197] Call Trace: [ 540.730347][T16197] dump_stack+0x197/0x210 [ 540.730380][T16197] should_fail.cold+0x5/0xf [ 540.730405][T16197] ? setup_fault_attr+0x1f0/0x1f0 [ 540.730436][T16197] ? ___might_sleep+0x163/0x2c0 [ 540.730465][T16197] __should_failslab+0xb7/0x100 [ 540.730489][T16197] should_failslab+0x9/0x14 [ 540.730511][T16197] kmem_cache_alloc_trace+0x2d3/0x790 [ 540.730647][T16197] ? rcu_read_lock_held+0x9c/0xb0 [ 540.730682][T16197] ? __kasan_check_read+0x11/0x20 [ 540.730709][T16197] tee_tg_check+0x295/0x6f0 [ 540.730726][T16197] ? tee_tg_destroy+0x510/0x510 [ 540.730749][T16197] xt_check_target+0x283/0x690 [ 540.730772][T16197] ? textify_hooks.constprop.0+0x1a0/0x1a0 [ 540.730794][T16197] ? mutex_unlock+0xd/0x10 [ 540.730840][T16197] ? mutex_unlock+0xd/0x10 [ 540.730857][T16197] ? xt_find_target+0x73/0x280 [ 540.730888][T16197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 540.730914][T16197] find_check_entry.isra.0+0x71e/0x920 [ 540.730947][T16197] ? ipt_do_table+0x1b80/0x1b80 [ 540.730974][T16197] ? lockdep_hardirqs_on+0x421/0x5e0 [ 540.730996][T16197] ? kvfree+0x4a/0x60 [ 540.731027][T16197] translate_table+0xcb4/0x17d0 [ 540.731079][T16197] ? compat_do_ipt_get_ctl+0x910/0x910 [ 540.731104][T16197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 540.731123][T16197] ? _copy_from_user+0x12c/0x1a0 [ 540.731154][T16197] do_ipt_set_ctl+0x2fe/0x4c2 [ 540.731186][T16197] ? compat_do_ipt_set_ctl+0x170/0x170 [ 540.731234][T16197] ? mutex_unlock+0xd/0x10 [ 540.731259][T16197] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 540.731282][T16197] nf_setsockopt+0x77/0xd0 [ 540.731307][T16197] ip_setsockopt+0xdf/0x100 [ 540.731331][T16197] tcp_setsockopt+0x8f/0xe0 [ 540.731356][T16197] sock_common_setsockopt+0x94/0xd0 [ 540.731381][T16197] __sys_setsockopt+0x261/0x4c0 [ 540.731405][T16197] ? sock_create_kern+0x50/0x50 [ 540.731427][T16197] ? fput+0x1b/0x20 [ 540.731461][T16197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.731478][T16197] ? do_syscall_64+0x26/0x790 [ 540.731494][T16197] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.731510][T16197] ? do_syscall_64+0x26/0x790 [ 540.731538][T16197] __x64_sys_setsockopt+0xbe/0x150 [ 540.731565][T16197] do_syscall_64+0xfa/0x790 [ 540.731591][T16197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.731605][T16197] RIP: 0033:0x45c479 [ 540.731624][T16197] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.731633][T16197] RSP: 002b:00007f37ca585c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 540.731650][T16197] RAX: ffffffffffffffda RBX: 00007f37ca5866d4 RCX: 000000000045c479 [ 540.731660][T16197] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000004 [ 540.731670][T16197] RBP: 000000000076bf20 R08: 0000000000000308 R09: 0000000000000000 [ 540.731681][T16197] R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000005 [ 540.731692][T16197] R13: 0000000000000a34 R14: 00000000004cc9d4 R15: 0000000000000003 [ 540.756094][T16186] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684277 /dev/loop2 scanned by syz-executor.2 (16186) [ 541.105960][T16217] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 541.122401][T16216] FAULT_INJECTION: forcing a failure. [ 541.122401][T16216] name failslab, interval 1, probability 0, space 0, times 0 [ 541.122429][T16216] CPU: 1 PID: 16216 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 541.122442][T16216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.122448][T16216] Call Trace: [ 541.122478][T16216] dump_stack+0x197/0x210 [ 541.122513][T16216] should_fail.cold+0x5/0xf [ 541.122540][T16216] ? setup_fault_attr+0x1f0/0x1f0 [ 541.122569][T16216] ? ___might_sleep+0x163/0x2c0 [ 541.122593][T16216] __should_failslab+0xb7/0x100 [ 541.122661][T16216] should_failslab+0x9/0x14 [ 541.122697][T16216] kmem_cache_alloc_trace+0x2d3/0x790 [ 541.122724][T16216] ? mutex_unlock+0xd/0x10 [ 541.122755][T16216] nf_ct_tmpl_alloc+0x90/0x2f0 [ 541.122789][T16216] xt_ct_tg_check+0x28a/0xf00 [ 541.122819][T16216] ? xt_ct_tg_destroy_v0+0x2a0/0x2a0 [ 541.122843][T16216] ? xt_find_target+0xa6/0x280 [ 541.122869][T16216] ? __kasan_check_write+0x14/0x20 [ 541.122903][T16216] xt_ct_tg_check_v1+0x74/0xa0 [ 541.122922][T16216] ? xt_ct_tg_check_v2+0xa0/0xa0 [ 541.122943][T16216] xt_check_target+0x283/0x690 [ 541.122974][T16216] ? textify_hooks.constprop.0+0x1a0/0x1a0 [ 541.123000][T16216] ? mutex_unlock+0xd/0x10 [ 541.123018][T16216] ? xt_find_target+0x73/0x280 [ 541.123053][T16216] ? xt_find_target+0x73/0x280 [ 541.123100][T16216] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.123137][T16216] find_check_entry.isra.0+0x71e/0x920 [ 541.123182][T16216] ? ipt_do_table+0x1b80/0x1b80 [ 541.123217][T16216] ? lockdep_hardirqs_on+0x421/0x5e0 [ 541.123248][T16216] ? kvfree+0x4a/0x60 [ 541.123288][T16216] translate_table+0xcb4/0x17d0 [ 541.123346][T16216] ? compat_do_ipt_get_ctl+0x910/0x910 [ 541.123373][T16216] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.123394][T16216] ? _copy_from_user+0x12c/0x1a0 [ 541.123422][T16216] do_ipt_set_ctl+0x2fe/0x4c2 [ 541.123448][T16216] ? compat_do_ipt_set_ctl+0x170/0x170 [ 541.123493][T16216] ? mutex_unlock+0xd/0x10 [ 541.123514][T16216] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 541.123542][T16216] nf_setsockopt+0x77/0xd0 [ 541.123568][T16216] ip_setsockopt+0xdf/0x100 [ 541.123594][T16216] tcp_setsockopt+0x8f/0xe0 [ 541.123622][T16216] sock_common_setsockopt+0x94/0xd0 [ 541.123650][T16216] __sys_setsockopt+0x261/0x4c0 [ 541.123675][T16216] ? sock_create_kern+0x50/0x50 [ 541.123695][T16216] ? fput+0x1b/0x20 [ 541.123732][T16216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.123751][T16216] ? do_syscall_64+0x26/0x790 [ 541.123771][T16216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.123792][T16216] ? do_syscall_64+0x26/0x790 [ 541.123822][T16216] __x64_sys_setsockopt+0xbe/0x150 [ 541.123849][T16216] do_syscall_64+0xfa/0x790 [ 541.123876][T16216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.123891][T16216] RIP: 0033:0x45c479 [ 541.123908][T16216] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.123918][T16216] RSP: 002b:00007f37ca585c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 541.123934][T16216] RAX: ffffffffffffffda RBX: 00007f37ca5866d4 RCX: 000000000045c479 [ 541.123944][T16216] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000004 [ 541.123954][T16216] RBP: 000000000076bf20 R08: 0000000000000308 R09: 0000000000000000 03:19:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x1, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x80010, r0, 0x8000000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) r3 = dup(0xffffffffffffffff) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000140)) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000000)) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r6, &(0x7f0000000000)={0x18}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r7, &(0x7f0000000000)={0x18}, 0x18) ioctl$TIOCEXCL(r7, 0x540c) ioctl$SNDCTL_DSP_SETTRIGGER(r6, 0x40045010, &(0x7f0000000100)=0x7fffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_any='access=any'}]}}) ioctl$FBIOGET_FSCREENINFO(0xffffffffffffffff, 0x4602, &(0x7f0000000200)) 03:19:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7cc8f5e6e538ecf8829b08f7f4aae"}) r3 = socket(0x10, 0x3, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}], 0x2, 0x0) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000040)=0x1, 0x4) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:19:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$SIOCRSSCAUSE(r4, 0x89e1, &(0x7f0000000040)=0x5b2e) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:19:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a0") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:51 executing program 3 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x3, 0x2, 0x9, 0xac5, 0x5, "912185f3067c4c835c88621d048e7d16f3c39c"}) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000000)=0x6) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="580000000206010000000000000000000000000011000300686173683a69702c706f72740000000005000400000000000900020073797a3200000000050005000a0000000900080000007a32000000000500050007000000"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) fallocate(r4, 0x34, 0x400, 0x4) [ 541.123964][T16216] R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000005 [ 541.123974][T16216] R13: 0000000000000a34 R14: 00000000004cc9d4 R15: 0000000000000004 [ 541.125109][T16218] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 542.137182][T16237] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a0") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) getrlimit(0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1, 0x0, 0x7, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) pipe2(0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@empty, 0x4e20, 0x4, 0x4e24, 0x3, 0xa, 0x20, 0x0, 0x73, 0x0, r5}, {0x6478, 0x8, 0x9, 0x1, 0x5, 0x80000001, 0x9, 0x9}, {0x8, 0x5, 0x7ff}, 0x9, 0x6e6bbe}, {{@in6=@loopback, 0x4d6, 0x3c}, 0xa, @in=@remote, 0x3506, 0x1, 0x3, 0x41, 0xfffffc01, 0x0, 0x3}}, 0xe8) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000200)={0x3, 0x0, 0x4, 0x20, 0x7, {}, {0x1, 0xd, 0x8, 0x20, 0x6, 0x7f, '!U^['}, 0x8, 0x1, @fd=r2, 0x101, 0x0, r3}) ioctl$SIOCX25SDTEFACILITIES(r6, 0x89eb, &(0x7f0000000040)={0xd880, 0x4, 0x400, 0xff, 0xff, 0x6, 0x22, "8b835d8b66e24151a7ad274fd386090e1730c0e2", "04a2c4723e173ab1b032db0542cf3a53adddd0d5"}) dup(0xffffffffffffffff) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r7) 03:19:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a0") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 542.513594][T16253] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x21) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000500)=@v2={0x2000000, [{0x5}]}, 0x14, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x1, 0x42741) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000040)={0xfffa, 0x8, 0x6, 0x7, 0x1a, "f13e872fa6d67ba0"}) 03:19:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = socket$inet(0x2, 0x80003, 0xf) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setreuid(0x0, r2) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cachefiles\x00', 0x84081, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f00000000c0)=""/162) ioctl$SIOCX25GDTEFACILITIES(r3, 0x89ea, &(0x7f0000000000)) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f0000000880)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xe8, 0x1, 0x9, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x13}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1b}, @NFCTH_TUPLE={0xac, 0x2, [@CTA_TUPLE_ZONE={0xffffff59}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @remote}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x8000}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x11}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3}, 0xa) 03:19:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 542.849016][T16263] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r3 = socket(0x1e, 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)=ANY=[@ANYBLOB='\\\x00\x00\a', @ANYRES16=r5, @ANYBLOB="17090000000000000000010000000500070000000000080009000000000014002000ff02000000000000000000000000000108000a0000000000060002000100000014001f00"/86], 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x54, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x40011) r6 = socket(0x400000000010, 0x3, 0x0) write(r6, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r5, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x4000800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7d5f751302e723bfb667209d7bc278f0c25860741142f8fbd26903c6752982ead10aa0d947ff43b163f7410a5c36"]) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 03:19:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsa\x00', 0x1, 0x0) mmap$perf(&(0x7f0000ff7000/0x6000)=nil, 0x6000, 0x2000002, 0x4010, r2, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x102, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r6}) connect$rose(r6, &(0x7f0000000200)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x40) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40084}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004bc0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @multicast1}]}}]}, 0x3c}}, 0x0) r8 = socket(0x400000000010, 0x3, 0x0) write(r8, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) setsockopt$RDS_CONG_MONITOR(r8, 0x114, 0x6, &(0x7f0000000380), 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004bc0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) [ 542.974260][T16276] xt_CT: You must specify a L4 protocol and not use inversions on it 03:19:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) r2 = dup3(r0, r1, 0x0) accept4$bt_l2cap(r2, 0x0, &(0x7f0000000000), 0x800) 03:19:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0), 0x2) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 543.131249][T16280] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:19:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000002, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 543.279135][T16280] overlayfs: unrecognized mount option "}_uç#¿¶g {ÂxðÂX`tBøûÒiÆu)‚êÑ [ 543.279135][T16280]  ÙGÿC±c÷A [ 543.279135][T16280] \6" or missing value 03:19:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 543.437304][T16289] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:19:53 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r2) r3 = socket(0xa, 0x2, 0x0) getresuid(&(0x7f0000000500), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x8000, &(0x7f0000000800)={[{@metacopy_on='metacopy=on'}, {@metacopy_on='metacopy=on'}, {@workdir={'workdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}], [{@fowner_lt={'fowner<', r4}}, {@subj_type={'subj_type', 0x3d, 'wlan1em1bdevnodev[vmnet1selinuxem0vmnet0wlan1-trusted,@'}}, {@uid_gt={'uid>', r0}}, {@smackfshat={'smackfshat', 0x3d, '(keyringtrusted!eth1#,{proc:cpuset&\''}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[\'eth1-#\x00'}}, {@hash='hash'}]}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) syz_mount_image$erofs(&(0x7f0000000480)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="37785a02bb6265d65008745bd3af933be59376593b8ad6efd1ab3795199309acc3b3f55e7a4d3a785ac4209701dec2d3af7ad6582afe15869bb9e398f3a8339ad5c3290e94fbbbe0669488db936bc44202f18a40492ed24adbf142236f1b789c08540186d6b04c72dfa8cf0daed9bfa47df0050f9dc2892f2fef7863763ea372ebfff604a68f", 0x86, 0x6}, {&(0x7f0000000140)="e60d0e2ae890aefa19f3a7480decc575b87070f9aec717d343e262bc2e85a39fcfa07ea597801e14cdcf083d29eca1ea792ea3", 0x33, 0x8}], 0x2110803, &(0x7f0000000540)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=r0, @ANYRESDEC=r6, @ANYRESDEC=r2, @ANYBLOB="2c657563940f", @ANYRESDEC=r5]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000180)="ee", 0x1) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='erofs\x00'}, 0x10) fcntl$F_SET_RW_HINT(r8, 0x40c, &(0x7f0000000440)=0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 03:19:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmdt(0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000200)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ptrace$poke(0x5, r0, &(0x7f0000000040), 0x80000000) ptrace$peekuser(0x3, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 03:19:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000003, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:53 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x1d7) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) getpid() syz_open_procfs(0x0, &(0x7f0000000340)='fdinfo/3\x00') io_cancel(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_sctp(0x2, 0x801, 0x84) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$void(r4, 0xc0045878) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000240)) sendmsg(r3, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x9000003}, 0x0) fcntl$setflags(r2, 0x2, 0x0) r5 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r6 = openat$cgroup_procs(r5, 0x0, 0x2, 0x0) r7 = getpid() r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r8, &(0x7f0000000000)={0x18}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r9}}, 0x18) sched_getaffinity(r7, 0x8, &(0x7f00000000c0)) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000140)={@bcast, @bcast}) write$cgroup_pid(r6, &(0x7f00000002c0)=r7, 0x12) sched_setscheduler(r7, 0x1, &(0x7f0000000080)=0x3ed) ioctl$SNDRV_PCM_IOCTL_RESET(r2, 0x4141, 0x0) 03:19:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) [ 544.174646][T16289] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:19:55 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7, 0x7b, 0x2}, 0x7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) r4 = open(&(0x7f0000000240)='./file0\x00', 0x20141042, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) 03:19:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 03:19:55 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@ipv4={[], [], @empty}, 0x0, 0x3c}, 0x2, @in6=@local, 0x1, 0x1, 0x0, 0xfc}}, 0xe8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380100001a000108000000000000000054b36ec146b000000000000000000000fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000106c0000007f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020001000000000000000000480003006465666c61746500000000000000000000000000000440000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000706f1eac52c1d2803f99472c9931"], 0x138}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x400000000010, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000140)={r4}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000080)={r4, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r5, 0x8}, 0x8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 03:19:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000004, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:55 executing program 0: sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f0000000000)={0x38, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}, @RDMA_NLDEV_ATTR_STAT_RES, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0xfffffffffffffd77}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x0, 0x4f, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4010090}, 0x0) 03:19:55 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0xa000000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0)=0x9, 0x4) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000280)) rmdir(&(0x7f0000000240)='./file0\x00') sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r3, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x7b}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac00}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 03:19:55 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:55 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r0, 0x8004500f, &(0x7f0000000040)) timer_create(0x3, 0x0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r1+10000000}}, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, 0xfffffffffffffffd, &(0x7f0000000140)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x100000000) socket$inet(0x2, 0x3, 0xd7) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x0) r6 = socket(0x400000000010, 0x3, 0x0) write(r6, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000140)={r7}, 0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000003c0)={r7, 0x200}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r8, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SNDCTL_DSP_RESET(r8, 0x5000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x18, 0x4) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x9}}, &(0x7f0000d43000)) socket$caif_seqpacket(0x25, 0x5, 0x1) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 03:19:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000005, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 545.480480][T16352] FAULT_INJECTION: forcing a failure. [ 545.480480][T16352] name failslab, interval 1, probability 0, space 0, times 0 [ 545.530316][T16352] CPU: 0 PID: 16352 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 545.540304][T16352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.550492][T16352] Call Trace: [ 545.553834][T16352] dump_stack+0x197/0x210 [ 545.558216][T16352] should_fail.cold+0x5/0xf [ 545.562767][T16352] ? setup_fault_attr+0x1f0/0x1f0 [ 545.567834][T16352] ? ___might_sleep+0x163/0x2c0 [ 545.572721][T16352] __should_failslab+0xb7/0x100 [ 545.577775][T16352] should_failslab+0x9/0x14 [ 545.582336][T16352] __kmalloc+0x2e0/0x770 [ 545.586618][T16352] ? mark_held_locks+0xf0/0xf0 [ 545.591532][T16352] ? tomoyo_realpath_from_path+0xc5/0x660 [ 545.597306][T16352] tomoyo_realpath_from_path+0xc5/0x660 [ 545.602921][T16352] ? tomoyo_path_number_perm+0x193/0x520 [ 545.608615][T16352] tomoyo_path_number_perm+0x1dd/0x520 [ 545.614108][T16352] ? tomoyo_path_number_perm+0x193/0x520 [ 545.619882][T16352] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 545.625892][T16352] ? __f_unlock_pos+0x19/0x20 [ 545.630665][T16352] ? __fget_files+0x359/0x520 [ 545.635386][T16352] ? do_dup2+0x4f0/0x4f0 [ 545.639664][T16352] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 545.644832][T16356] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 545.645951][T16352] ? fput_many+0x12c/0x1a0 [ 545.646000][T16352] tomoyo_file_ioctl+0x23/0x30 [ 545.663383][T16352] security_file_ioctl+0x77/0xc0 [ 545.668440][T16352] ksys_ioctl+0x56/0x180 [ 545.672754][T16352] __x64_sys_ioctl+0x73/0xb0 [ 545.677520][T16352] do_syscall_64+0xfa/0x790 [ 545.682069][T16352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.687998][T16352] RIP: 0033:0x45c479 [ 545.691947][T16352] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.711607][T16352] RSP: 002b:00007f8defb60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.720062][T16352] RAX: ffffffffffffffda RBX: 00007f8defb616d4 RCX: 000000000045c479 [ 545.728043][T16352] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 545.736013][T16352] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 545.743993][T16352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 545.752082][T16352] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000000 [ 545.830956][T16353] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 545.866795][T16352] ERROR: Out of memory at tomoyo_realpath_from_path. [ 545.873944][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 545.873961][ T27] audit: type=1800 audit(1583291995.803:86): pid=16349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17315 res=0 03:19:55 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:55 executing program 1: ioctl$SOUND_MIXER_INFO(0xffffffffffffffff, 0x805c4d65, &(0x7f0000000040)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) [ 545.957688][T16359] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:19:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000006, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 546.095082][T16353] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 03:19:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc0bc5310, &(0x7f0000000340)) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x480000, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000200)={0x980000, 0x5, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x990a70, 0x0, [], @p_u8=&(0x7f00000000c0)=0xdd}}) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000280)="ba959bbc71f70b020e95b993a9bcf903067cd8ed2baf581a5987b6654ae72f735915b5a3f3652aad5aef8dcae3a5dcf19794439d253bbcac513624f5eab4d57f") ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x2, 0xffffffffffffffff, 0x1}) tkill(r1, 0x1000000000015) 03:19:56 executing program 2: mknod(&(0x7f0000000280)='./bus\x00', 0x8000, 0xffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xd, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x37}, 0x48) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x9d9840, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x7fff, r0, &(0x7f0000000140)="33a2207d2021c348e741b6df72f55ab2100928b3d1ca2a92e432802a9c9380df6e431d5140a115e5bea77248b536fa591b5edf101f8291de9e58d4645024e2008136d2d71eae02a3ca27948567fcfdf21b9d6b324b3f3afe7e3b", 0x5a, 0x6, 0x0, 0x0, r3}, &(0x7f0000000200)) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000100)=[{{}, {0x2, 0x0, 0x0, 0x1}}, {{0x2, 0x1, 0x0, 0x1}, {0x1, 0x1, 0x0, 0x1}}, {{0x4, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x0, 0x1, 0x0, 0x1}}], 0x20) [ 546.253406][T16378] FAULT_INJECTION: forcing a failure. [ 546.253406][T16378] name failslab, interval 1, probability 0, space 0, times 0 [ 546.336419][T16378] CPU: 0 PID: 16378 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 546.346392][T16378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.356473][T16378] Call Trace: [ 546.359808][T16378] dump_stack+0x197/0x210 [ 546.364215][T16378] should_fail.cold+0x5/0xf [ 546.368777][T16378] ? setup_fault_attr+0x1f0/0x1f0 [ 546.373860][T16378] ? ___might_sleep+0x163/0x2c0 [ 546.378772][T16378] __should_failslab+0xb7/0x100 [ 546.383696][T16378] should_failslab+0x9/0x14 [ 546.388239][T16378] __kmalloc+0x2e0/0x770 [ 546.392513][T16378] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 546.398376][T16378] ? tomoyo_encode2.part.0+0xf5/0x400 [ 546.403818][T16378] tomoyo_encode2.part.0+0xf5/0x400 [ 546.409075][T16378] tomoyo_encode+0x2b/0x50 [ 546.413535][T16378] tomoyo_realpath_from_path+0x19c/0x660 [ 546.419204][T16378] ? tomoyo_path_number_perm+0x193/0x520 [ 546.424888][T16378] tomoyo_path_number_perm+0x1dd/0x520 [ 546.430399][T16378] ? tomoyo_path_number_perm+0x193/0x520 [ 546.436115][T16378] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 546.441963][T16378] ? __f_unlock_pos+0x19/0x20 [ 546.446738][T16378] ? __fget_files+0x359/0x520 [ 546.451461][T16378] ? do_dup2+0x4f0/0x4f0 [ 546.455752][T16378] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 546.461403][T16378] tomoyo_file_ioctl+0x23/0x30 [ 546.466260][T16378] security_file_ioctl+0x77/0xc0 [ 546.471254][T16378] ksys_ioctl+0x56/0x180 [ 546.475547][T16378] __x64_sys_ioctl+0x73/0xb0 [ 546.480210][T16378] do_syscall_64+0xfa/0x790 [ 546.484764][T16378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.490688][T16378] RIP: 0033:0x45c479 [ 546.494624][T16378] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.514259][T16378] RSP: 002b:00007f8defb3fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.522688][T16378] RAX: ffffffffffffffda RBX: 00007f8defb406d4 RCX: 000000000045c479 03:19:56 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000072000162010000ef577c4c0007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000140)={0x1f9, 0x1e, &(0x7f0000000240)="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"}) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0xb, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x1c}}, 0x20000000) 03:19:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000007, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 546.530675][T16378] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 546.538648][T16378] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 546.546631][T16378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 546.554602][T16378] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000001 03:19:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) set_mempolicy(0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r3, &(0x7f0000000000)={0x18}, 0x18) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0x3) close(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x28a5) 03:19:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0xa, 0x4) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r2, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0xc) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x20, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) [ 546.629681][T16390] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.5'. [ 546.648462][T16378] ERROR: Out of memory at tomoyo_realpath_from_path. [ 546.657500][T16390] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.5'. 03:19:56 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000008, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 546.946320][T16408] FAULT_INJECTION: forcing a failure. [ 546.946320][T16408] name failslab, interval 1, probability 0, space 0, times 0 [ 546.960287][T16408] CPU: 1 PID: 16408 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 546.970331][T16408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.980419][T16408] Call Trace: [ 546.983734][T16408] dump_stack+0x197/0x210 [ 546.988084][T16408] should_fail.cold+0x5/0xf [ 546.992606][T16408] ? setup_fault_attr+0x1f0/0x1f0 [ 546.997660][T16408] ? ___might_sleep+0x163/0x2c0 [ 547.002552][T16408] __should_failslab+0xb7/0x100 [ 547.007433][T16408] should_failslab+0x9/0x14 [ 547.011957][T16408] kmem_cache_alloc+0x2aa/0x710 [ 547.016842][T16408] ? lock_downgrade+0x920/0x920 [ 547.021719][T16408] alloc_inode+0x16f/0x1e0 [ 547.026158][T16408] new_inode_pseudo+0x19/0xf0 [ 547.030935][T16408] __ns_get_path.isra.0+0x137/0x760 [ 547.036166][T16408] ? userns_put+0xb0/0xb0 [ 547.040516][T16408] open_related_ns+0xb8/0x200 [ 547.045204][T16408] ? __ns_get_path.isra.0+0x760/0x760 [ 547.050602][T16408] ns_ioctl+0x27d/0x350 [ 547.054762][T16408] ? open_related_ns+0x200/0x200 [ 547.059713][T16408] ksys_ioctl+0x123/0x180 [ 547.064054][T16408] __x64_sys_ioctl+0x73/0xb0 [ 547.068668][T16408] do_syscall_64+0xfa/0x790 [ 547.073183][T16408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.079090][T16408] RIP: 0033:0x45c479 [ 547.082991][T16408] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 547.102595][T16408] RSP: 002b:00007f8defb60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.111013][T16408] RAX: ffffffffffffffda RBX: 00007f8defb616d4 RCX: 000000000045c479 [ 547.118994][T16408] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 547.127110][T16408] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 547.135180][T16408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 03:19:57 executing program 2: getpid() r0 = getpid() ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x1, 'geneve0\x00', {}, 0x1}) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4200, 0x0) r3 = socket(0x11, 0x2, 0x0) setsockopt$packet_buf(r3, 0x107, 0x8, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b3765e7359ae1fcf2d655c9ad81d21bf3d0b22f8ce0e5f78824728f877f9c73a08ce809a4", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x400, 0x8002, 0xb02c, 0xffffffff, r4}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000001400)={{0x0, 0x0, 0x80}}) write(r5, &(0x7f0000000600)="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", 0xe00) fallocate(r5, 0x11, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r5, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000201}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x58, 0x2, 0x7, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fff}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd68}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x4}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xc5}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x9c}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000040}, 0x440088c4) sendfile(r5, r6, 0x0, 0x12000) [ 547.143180][T16408] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000002 03:19:57 executing program 4 (fault-call:3 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000280)=0x7fffffff, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) bind$packet(r5, &(0x7f0000000080)={0x11, 0x0, r8}, 0x14) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r9, @ANYBLOB="000000000000000008000400", @ANYRES32=r4, @ANYBLOB="41a90785949549910fb3c063c3faf4cdfd7b1b0a1208541883bb5707e3f5a1375258075e9160246645eec604477cf7509eeaa0142aabda954eff76dc89d0008fe0aedc6e7d5d8716ea6e5deda3f3e52c7da986b4bb494fce"], 0x28}}, 0x0) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev={[], 0x43}}, 0x14) r10 = socket(0x400000000010, 0x3, 0x0) write(r10, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) r11 = socket(0x400000000010, 0x3, 0x0) write(r11, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000140)={r12, 0x1, 0x6, @multicast}, 0x10) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000200c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 03:19:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001080)={&(0x7f0000001100)=ANY=[@ANYBLOB="140000007da201cf868fa6ae1dae3cda33b69e1177ff2bc40e600707fd9a335b3d916c0737adf2329bcfa0bc27f87f825dfbf6119f8c1ec387da4a6643e01a07fc9640c0e8fa5390171a8fdc14ea87b91ad0993f08bb59a232109e52e50617c9a63b74ee8ff409fb60802e256ccb8a9c5d03533c23acfb213f9613b9e46c85cc54ea92dca19071a9a2bc6221f4", @ANYRES16=0x0, @ANYBLOB="000128bd7000fbdbdf250e000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0xc010) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x20000000107, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000080)=""/4096) 03:19:57 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x128, r1, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_BEARER={0x114, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x20, @loopback, 0x401}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x3}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @mcast1, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x31}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x34}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xb6}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc0000000}]}]}]}, 0x128}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) r3 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = getpid() sched_getaffinity(r5, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r4, &(0x7f00000002c0)=r5, 0x12) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000340)={{0x7, 0x5, 0x40, 0x8, 'syz1\x00', 0x2}, 0x2, 0x0, 0x0, r5, 0x6, 0x101, 'syz1\x00', &(0x7f0000000000)=['\'\x06cpuset+(GPL\x83\'\x00', '@\x00', 'memory.events\x00', 'memory.events\x00', '\x00', 'udp:syz0\x00'], 0x38, [], [0x1, 0x401, 0x0, 0x100]}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 03:19:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000000000c, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 547.497832][T16422] FAULT_INJECTION: forcing a failure. [ 547.497832][T16422] name failslab, interval 1, probability 0, space 0, times 0 [ 547.529919][ T27] audit: type=1800 audit(1583291997.463:87): pid=16415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17314 res=0 [ 547.535403][T16422] CPU: 1 PID: 16422 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 547.560213][T16422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.570299][T16422] Call Trace: [ 547.573626][T16422] dump_stack+0x197/0x210 [ 547.577991][T16422] should_fail.cold+0x5/0xf [ 547.582530][T16422] ? setup_fault_attr+0x1f0/0x1f0 [ 547.587598][T16422] ? ___might_sleep+0x163/0x2c0 [ 547.592499][T16422] __should_failslab+0xb7/0x100 [ 547.597401][T16422] should_failslab+0x9/0x14 [ 547.601948][T16422] kmem_cache_alloc+0x2aa/0x710 [ 547.606841][T16422] ? lock_downgrade+0x920/0x920 [ 547.611741][T16422] alloc_inode+0x16f/0x1e0 [ 547.616200][T16422] new_inode_pseudo+0x19/0xf0 [ 547.620918][T16422] __ns_get_path.isra.0+0x137/0x760 [ 547.626152][T16422] ? userns_put+0xb0/0xb0 [ 547.630514][T16422] open_related_ns+0xb8/0x200 [ 547.635265][T16422] ? __ns_get_path.isra.0+0x760/0x760 [ 547.640698][T16422] ns_ioctl+0x27d/0x350 [ 547.645243][T16422] ? open_related_ns+0x200/0x200 [ 547.650236][T16422] ksys_ioctl+0x123/0x180 [ 547.654657][T16422] __x64_sys_ioctl+0x73/0xb0 [ 547.659323][T16422] do_syscall_64+0xfa/0x790 [ 547.663888][T16422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.669819][T16422] RIP: 0033:0x45c479 [ 547.673781][T16422] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000cc0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000800300000000000030020000300200000000000000000000e8020000e8020000e8020000e8020000e802000003000000000000000000000000000000ac1414bb000000000000000076657468305f746f5f626174616476007665746f5f6873720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c801300200000000000000000000000000000000000000005801686173686c696d69740000000000000000000000000000000000000000037465616d5f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000004100000000000000060000000500000040000080030000200000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000000000000000000000000000006e657462696f732d6e7300000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006bd0e70d8f8100000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000002000545241434500000000000000000000000000000000008fd4f47e9ac40471000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffffe492da160479128090656e1cd29891ad679076aeeda8b459ca0a2fef1c482afd12b1a279f9d91722fd225d1525c3f35871f1000aa7f6608d6d439ef356d9b5412ef14c39fabb410d4d0b623e8f48d8b9493eea5446bee4e8e6478f0c931730d7d35dc922aeba6cd12ec519afea6e2e11fc83c4300b815b4b5d5f39fc259fe7a412821b7b6c4bc1098aea5052b07be2b742c3a8f7eb91ac044c6cd7b62181ac4a4c3801247e3c4f393572b12b208fc56b95d74070d6a9f53fbf13fc89c6bfa5dac55f0d5a17400d073e322c0bd7"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x40000) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000000)={0x7, 0x7, 0xe95, 0x9}, 0x10) 03:19:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6095feb4c6236666) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = getpid() sched_getaffinity(r2, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r1, &(0x7f00000002c0)=r2, 0x12) sched_getattr(r2, &(0x7f00000000c0)={0x38}, 0x38, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) r5 = socket(0x400000000010, 0x3, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r6, &(0x7f0000000000)={0x18}, 0x18) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000300)={0x4}) write(r5, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000780)=ANY=[@ANYRES32=0x0, @ANYBLOB="8d0000008701de1104f87dd135f680de24a526cf9ac5d88676d7a746e9ab70742a0196a4585f5ce1b5f1183d8915d0f0d3c6ea5aa3222bc8bc293bf5b317af7f1ffb960f9bbab29f096d749370b1bf02e0e651bc1f50c07784c75806030cb44f30daa812859207408db3bdf0dd41ee512e2b07060bfcd1f4868c917de20472233f1ac998ca4d9ab525472f30272ba117d3a9b539844d76c380f36300a0357a38bc69f9ab8de22721243de0aa05bd13ab255c430f3d9346f8469a2168bad3bb44bfbcfb16ab0dd1725ff94de3d44c749b5574c6d229e898c9174d60e785bd9193b7fb0af7b63fbdf76783933a33dd7baaea0ca64e46ad2abbcfa3200485a63849cedbbecac8157bc263f06bc25946be96029e1e67182cb8cd821084a3fff04e2f1b38ba35f3a808cbd4170ea1976b894a288362858a9d8b1b2ec8f1537541ba0a97844443fec612a8f473984e1e675e8c57477acaadd55767c64ff4c649ca243886082dfa3d705241a5d500d2ff51755dbe8fafbc0eedbe84dac9c443b48fe8d41c9925e348a6d2a63122cbe18a054e6a921750f76e10eadafb4a90a395dab859742a6c4f0a8c4b8adc3f481ad19a20e7c1a9b19b8b914dbb1d6bd9d37976c4a417b2"], &(0x7f00000001c0)=0x95) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r7, 0x81, 0xbc}, 0xc) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f00000003c0)="14c7efbd61c56f9231daed0077258262bb1faab4c16f1fb6c229167389ec44baa0007f275d0f749ce3eb432fef8dc1c512ec550208ca126b9a93745cdd532ffcdc7aaf7b072164b4c4a7ecfc9f9a9db71231f2aceb1189b294970da987c5b9a0b347f291ffc230921882eb90bb306c4a0f0687baa403a5352786c8d97385f8344de2a3794e5b1bd2d83f45bb6df792d5a64a576777f0456c46ca45c0386a4eee028630bd18832b9ee50c35974ca54945d7b7e6eff2f69db8e61f5e7a26661aab710c195336ee225e817330887828eae43afff931b059f735", 0xd8) fchdir(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x1070c5, 0x28) r9 = open$dir(&(0x7f0000000080)='./file0\x00', 0x8000000000000000, 0x6e) write$9p(r8, &(0x7f0000001400)="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", 0x600) sendfile(r8, r9, 0x0, 0x10000) getsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 547.693526][T16422] RSP: 002b:00007f8defb60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.702063][T16422] RAX: ffffffffffffffda RBX: 00007f8defb616d4 RCX: 000000000045c479 [ 547.710070][T16422] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 547.718275][T16422] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 547.726451][T16422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 547.735011][T16422] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000003 03:19:57 executing program 4 (fault-call:3 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 547.846185][ T27] audit: type=1804 audit(1583291997.783:88): pid=16427 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/273/file0" dev="sda1" ino=17314 res=1 [ 547.858294][T16438] FAULT_INJECTION: forcing a failure. [ 547.858294][T16438] name failslab, interval 1, probability 0, space 0, times 0 03:19:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000048, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 548.008951][ T27] audit: type=1804 audit(1583291997.933:89): pid=16441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir428957987/syzkaller.xY1ljy/274/file0" dev="sda1" ino=17327 res=1 [ 548.059201][T16438] CPU: 1 PID: 16438 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 548.069180][T16438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.079290][T16438] Call Trace: [ 548.082630][T16438] dump_stack+0x197/0x210 [ 548.087027][T16438] should_fail.cold+0x5/0xf [ 548.091582][T16438] ? setup_fault_attr+0x1f0/0x1f0 [ 548.096634][T16438] ? ___might_sleep+0x163/0x2c0 [ 548.101533][T16438] __should_failslab+0xb7/0x100 [ 548.106420][T16438] should_failslab+0x9/0x14 [ 548.110962][T16438] kmem_cache_alloc+0x2aa/0x710 [ 548.116122][T16438] ? ktime_get_coarse_real_ts64+0x1b5/0x2a0 [ 548.122085][T16438] ? rwlock_bug.part.0+0x90/0x90 [ 548.127087][T16438] __d_alloc+0x2e/0x8c0 [ 548.131326][T16438] d_alloc_anon+0x18/0x20 [ 548.135849][T16438] __ns_get_path.isra.0+0x303/0x760 [ 548.141088][T16438] ? userns_put+0xb0/0xb0 [ 548.145471][T16438] open_related_ns+0xb8/0x200 [ 548.150199][T16438] ? __ns_get_path.isra.0+0x760/0x760 [ 548.155632][T16438] ns_ioctl+0x27d/0x350 [ 548.159864][T16438] ? open_related_ns+0x200/0x200 [ 548.164851][T16438] ksys_ioctl+0x123/0x180 [ 548.169229][T16438] __x64_sys_ioctl+0x73/0xb0 [ 548.173968][T16438] do_syscall_64+0xfa/0x790 [ 548.178546][T16438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.184454][T16438] RIP: 0033:0x45c479 [ 548.188384][T16438] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:19:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = userfaultfd(0x0) ioctl(r0, 0xfff, &(0x7f0000000200)="3dd5ab9b0b48b3a783f6463df9a3d97fb67a57c7440d8f2cdd6d4a2c98a3e4df4e0b595cbcd2e8c94e2c135ab8174e120153ea1fcaf10481f702c20ee4c9f7da2ea6c5e5aa403826ee197f234ef89d88662ea1f195f91f2e666919256388055673640008f6a01f5a4a21e8a21b903cfdd656a0175b635cfd6a3ccc1559b3579f55c8d71c9b21a9b12f25") ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x70, 0x0, &(0x7f0000002000)) r3 = dup2(r0, r2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0)=0x1000, 0x4) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000024001705d21b80788c63940d0424fc60100011400a2f0000051982c1375b3e37096b088000f01700d1bd", 0x2e}], 0x1}, 0x0) [ 548.208251][T16438] RSP: 002b:00007f8defb60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 548.216706][T16438] RAX: ffffffffffffffda RBX: 00007f8defb616d4 RCX: 000000000045c479 [ 548.224719][T16438] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 548.232825][T16438] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 548.240818][T16438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 548.248920][T16438] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000004 03:19:58 executing program 4 (fault-call:3 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 548.439923][ T27] audit: type=1804 audit(1583291998.373:90): pid=16453 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir108340945/syzkaller.WmOj25/273/file0" dev="sda1" ino=17314 res=1 [ 548.636858][ T27] audit: type=1804 audit(1583291998.573:91): pid=16447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir428957987/syzkaller.xY1ljy/274/file0" dev="sda1" ino=17327 res=1 [ 548.680215][ T27] audit: type=1804 audit(1583291998.613:92): pid=16447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir428957987/syzkaller.xY1ljy/274/file0" dev="sda1" ino=17327 res=1 03:19:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aca6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r8, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x1c, r7, 0x711, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r5, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000140)={0x14, r7, 0x400, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) 03:19:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000000004c, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:58 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)=0x9) ioctl$BLKPG(r0, 0x1269, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd1d7c3d878a09a030de999bf44b17efb60450958485aa56389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180842ece11ead980ef52b15a8ac6966c963f4b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332bc4f4d12988e620895ba7bc183d5f05fdf63e00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c9543719942612f9ffe609c9ffc94bc56acd2c91ef0d998d6e292e4433595c5ee10117d6d6853272812fc2f2abe513f138b", 0xfd}, {&(0x7f0000000100)="d10bcee1e29d4128327c2cb1bd1df1e9bbfb67aa05e818d49e70b86048cf023eb73b3af76b96b29f2637f8064cf8c7b846", 0x31}, {&(0x7f0000000900)}], 0x3, 0xd) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa}, r1, 0x0, r2, 0x0) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) r4 = socket$isdn(0x22, 0x3, 0x25) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) close(r5) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) socket$inet6(0xa, 0x40000080806, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 548.917360][T16469] FAULT_INJECTION: forcing a failure. [ 548.917360][T16469] name failslab, interval 1, probability 0, space 0, times 0 [ 549.046378][T16469] CPU: 0 PID: 16469 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 549.056537][T16469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.066714][T16469] Call Trace: [ 549.070043][T16469] dump_stack+0x197/0x210 [ 549.074431][T16469] should_fail.cold+0x5/0xf [ 549.078995][T16469] ? setup_fault_attr+0x1f0/0x1f0 [ 549.084060][T16469] ? ___might_sleep+0x163/0x2c0 [ 549.089088][T16469] __should_failslab+0xb7/0x100 [ 549.093986][T16469] should_failslab+0x9/0x14 [ 549.098522][T16469] kmem_cache_alloc+0x2aa/0x710 [ 549.103435][T16469] __alloc_file+0x27/0x340 [ 549.107906][T16469] alloc_empty_file+0x72/0x170 [ 549.112796][T16469] dentry_open+0x70/0x1d0 [ 549.117164][T16469] ? userns_put+0xb0/0xb0 [ 549.121525][T16469] open_related_ns+0x19d/0x200 [ 549.126329][T16469] ? __ns_get_path.isra.0+0x760/0x760 [ 549.131765][T16469] ns_ioctl+0x27d/0x350 [ 549.135957][T16469] ? open_related_ns+0x200/0x200 [ 549.140919][T16469] ksys_ioctl+0x123/0x180 [ 549.145287][T16469] __x64_sys_ioctl+0x73/0xb0 [ 549.149921][T16469] do_syscall_64+0xfa/0x790 [ 549.154499][T16469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.160382][T16469] RIP: 0033:0x45c479 [ 549.164296][T16469] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.183952][T16469] RSP: 002b:00007f8defb3fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.192394][T16469] RAX: ffffffffffffffda RBX: 00007f8defb406d4 RCX: 000000000045c479 [ 549.200484][T16469] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 549.208482][T16469] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 549.216483][T16469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 549.224458][T16469] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000005 03:19:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000060, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 549.459269][T16472] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 03:19:59 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x70, 0x0) lseek(r1, 0x0, 0x0) r2 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ppoll(&(0x7f0000000540)=[{0xffffffffffffffff, 0x100}, {r1, 0xc100}, {r2, 0xc001}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0xc000}], 0x5, &(0x7f0000000280), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) dup(0xffffffffffffffff) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0045103, 0x0) r4 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r7 = dup(0xffffffffffffffff) ioctl$TUNSETOWNER(r7, 0x400454cc, 0xffffffffffffffff) write$tun(r5, &(0x7f0000000240)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x300}, @ipv6=@generic={0x0, 0x6, "67fc23", 0x2, 0x3a, 0x0, @remote, @mcast2}}, 0xfdef) 03:19:59 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000003c0)={0x3, 0xb3, "c2103be8a524dc3048b313f5a5323af99896506467c974b412804b2dcdc02b375d47bab791726061ffe7454ee0b447988c1b0e34409697c6458e2639cc76e7dfa81e34b81253ae3a99283b23e67cd6d185100eba3707831fe8babaac028a1924d872040cdf6c98456e69dd3c28f30bc3d3f453bd4e0723802bc59581cfb3eeac207a7b5e042bc1e3357e96a8e1b2c403b580f85f6ae7cffcb3dae476b6e82a7969f57e144f8e89b8a71a80864e204bfaeb8f24"}) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000000)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r4, &(0x7f0000000000)={0x18}, 0x18) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4068aea3, &(0x7f00000002c0)={0x0, 0x0, [0xeb, 0x80000001, 0x8, 0x4]}) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='/dev/usnput\x00'], 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000340)=[&(0x7f0000000280)='\\\ausetselinux^md5sum,selfcpuset+#=cpuset\x00']) [ 549.587282][T16490] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 03:19:59 executing program 4 (fault-call:3 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:19:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000064, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:19:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="14ff000000190043000000000000000000edffa0277a95d8540d9768642e3ae9f05a31c878da1ccd461f5b67f817df8351633a4154b2bf3d651ac632f1f23d1b0cfdc0ca046fb964348f7573c7b5bbb0aacc804ddf3a46d7e400bd24ace1d13eb50807b6bd949ff238a744981f394d9caf2aaccfddb06c213b1d77cdc4b7d0"], 0x18}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1, 0x121040) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000180)=0x3, 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x2}, 0x18) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000040)={0x7, 0x0, [], {0x0, @bt={0x66, 0x3, 0x1, 0x3, 0x7, 0xf1a, 0x6, 0x7, 0x2, 0x4, 0x0, 0x3, 0x7, 0x0, 0x14, 0x5, {0x0, 0x5}, 0x4, 0x2}}}) 03:19:59 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, r2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r5, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r5, r6, &(0x7f0000000240)=0x202, 0x4000000000dc) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000040", @ANYRES16=r7, @ANYBLOB="050c27bd7000ffdbdf25030000007dc77498acf31eec5ca15ea11dbf0eef6946ee66566e1c0aedaf0adea19580d8868cb1e403f45245d2f5041eebd6f90e11d958e01ee457eb96f746d5f344d89e385d1f61e31bcf05b068552c6ec0ec7c"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r7, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x200}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x8010) r8 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r8, &(0x7f0000000740)=[{{0x0, 0x97d9f196de230c8b, 0x0, 0x0, 0x0, 0x4a}}], 0x4000000000001a0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) [ 549.979780][T16503] FAULT_INJECTION: forcing a failure. [ 549.979780][T16503] name failslab, interval 1, probability 0, space 0, times 0 [ 550.031709][T16503] CPU: 1 PID: 16503 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 550.041696][T16503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.051774][T16503] Call Trace: [ 550.055103][T16503] dump_stack+0x197/0x210 [ 550.059475][T16503] should_fail.cold+0x5/0xf [ 550.064031][T16503] ? setup_fault_attr+0x1f0/0x1f0 [ 550.069094][T16503] ? ___might_sleep+0x163/0x2c0 [ 550.073981][T16503] __should_failslab+0xb7/0x100 [ 550.078869][T16503] should_failslab+0x9/0x14 [ 550.083408][T16503] kmem_cache_alloc+0x2aa/0x710 [ 550.088289][T16503] ? kmem_cache_alloc+0x364/0x710 [ 550.093353][T16503] security_file_alloc+0x39/0x170 [ 550.098414][T16503] __alloc_file+0xde/0x340 [ 550.102858][T16503] alloc_empty_file+0x72/0x170 [ 550.107661][T16503] dentry_open+0x70/0x1d0 [ 550.112046][T16503] ? userns_put+0xb0/0xb0 [ 550.116429][T16503] open_related_ns+0x19d/0x200 [ 550.122464][T16503] ? __ns_get_path.isra.0+0x760/0x760 [ 550.127882][T16503] ns_ioctl+0x27d/0x350 [ 550.132058][T16503] ? open_related_ns+0x200/0x200 [ 550.137057][T16503] ksys_ioctl+0x123/0x180 [ 550.141453][T16503] __x64_sys_ioctl+0x73/0xb0 [ 550.146107][T16503] do_syscall_64+0xfa/0x790 [ 550.150657][T16503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.156582][T16503] RIP: 0033:0x45c479 [ 550.160517][T16503] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 550.180370][T16503] RSP: 002b:00007f8defb60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.188824][T16503] RAX: ffffffffffffffda RBX: 00007f8defb616d4 RCX: 000000000045c479 [ 550.196975][T16503] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 550.205008][T16503] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 550.213059][T16503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 550.221094][T16503] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000006 [ 550.244721][T16507] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:20:00 executing program 4 (fault-call:3 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:20:00 executing program 5: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1018, 0x0, 0x8, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009838d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316edc12e8000e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) splice(0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffffa, 0xffffffffffffffff, &(0x7f0000000300)=0xef, 0x10000, 0xc) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0xfffb, 0x6}, @mss={0x2, 0x6}, @timestamp], 0x4) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRES32=r3], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r5, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 03:20:00 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r3, 0x0, r4, 0x0, 0x1420000a77, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="220000002100070700be0000090007010a00001e0000", 0x16) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 550.479551][T16519] FAULT_INJECTION: forcing a failure. [ 550.479551][T16519] name failslab, interval 1, probability 0, space 0, times 0 [ 550.494305][T16519] CPU: 1 PID: 16519 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 550.504286][T16519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.514389][T16519] Call Trace: [ 550.517827][T16519] dump_stack+0x197/0x210 [ 550.522222][T16519] should_fail.cold+0x5/0xf [ 550.526777][T16519] ? setup_fault_attr+0x1f0/0x1f0 [ 550.531870][T16519] ? ___might_sleep+0x163/0x2c0 [ 550.536771][T16519] __should_failslab+0xb7/0x100 [ 550.541651][T16519] should_failslab+0x9/0x14 [ 550.546226][T16519] kmem_cache_alloc+0x2aa/0x710 [ 550.551113][T16519] ? kmem_cache_alloc+0x364/0x710 [ 550.556171][T16519] security_file_alloc+0x39/0x170 [ 550.561227][T16519] __alloc_file+0xde/0x340 [ 550.565683][T16519] alloc_empty_file+0x72/0x170 [ 550.570470][T16519] dentry_open+0x70/0x1d0 [ 550.574828][T16519] ? userns_put+0xb0/0xb0 [ 550.579205][T16519] open_related_ns+0x19d/0x200 [ 550.584012][T16519] ? __ns_get_path.isra.0+0x760/0x760 [ 550.585072][T16520] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 550.589437][T16519] ns_ioctl+0x27d/0x350 [ 550.589453][T16519] ? open_related_ns+0x200/0x200 [ 550.589472][T16519] ksys_ioctl+0x123/0x180 [ 550.589493][T16519] __x64_sys_ioctl+0x73/0xb0 [ 550.589519][T16519] do_syscall_64+0xfa/0x790 [ 550.589546][T16519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.589560][T16519] RIP: 0033:0x45c479 [ 550.589586][T16519] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 550.649767][T16519] RSP: 002b:00007f8defb3fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.658294][T16519] RAX: ffffffffffffffda RBX: 00007f8defb406d4 RCX: 000000000045c479 [ 550.666289][T16519] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000003 03:20:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000068, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 550.674292][T16519] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 550.682297][T16519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 550.690278][T16519] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000007 [ 550.691372][T16521] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 03:20:00 executing program 4 (fault-call:3 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) [ 551.060283][T16533] FAULT_INJECTION: forcing a failure. [ 551.060283][T16533] name failslab, interval 1, probability 0, space 0, times 0 [ 551.110944][T16533] CPU: 0 PID: 16533 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 551.120935][T16533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.131021][T16533] Call Trace: [ 551.134358][T16533] dump_stack+0x197/0x210 [ 551.138736][T16533] should_fail.cold+0x5/0xf [ 551.143295][T16533] ? setup_fault_attr+0x1f0/0x1f0 [ 551.148388][T16533] ? ___might_sleep+0x163/0x2c0 [ 551.153300][T16533] __should_failslab+0xb7/0x100 [ 551.158206][T16533] should_failslab+0x9/0x14 [ 551.162757][T16533] __kmalloc+0x2e0/0x770 [ 551.167094][T16533] ? tomoyo_realpath_from_path+0xc5/0x660 [ 551.172899][T16533] tomoyo_realpath_from_path+0xc5/0x660 [ 551.178503][T16533] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 551.184798][T16533] ? tomoyo_init_request_info+0x105/0x1d0 [ 551.190582][T16533] tomoyo_check_open_permission+0x2a3/0x3e0 [ 551.196510][T16533] ? __kasan_check_read+0x11/0x20 [ 551.201584][T16533] ? __alloc_file+0xa4/0x340 [ 551.206213][T16533] ? tomoyo_path_number_perm+0x520/0x520 [ 551.211899][T16533] ? find_held_lock+0x35/0x130 [ 551.216805][T16533] ? lock_downgrade+0x920/0x920 [ 551.221729][T16533] ? rwlock_bug.part.0+0x90/0x90 [ 551.226720][T16533] tomoyo_file_open+0xa9/0xd0 [ 551.231444][T16533] security_file_open+0x71/0x300 [ 551.236425][T16533] do_dentry_open+0x365/0x1350 [ 551.241236][T16533] ? chown_common+0x5c0/0x5c0 [ 551.245956][T16533] dentry_open+0x132/0x1d0 [ 551.250391][T16533] ? userns_put+0xb0/0xb0 [ 551.254755][T16533] open_related_ns+0x19d/0x200 [ 551.259563][T16533] ? __ns_get_path.isra.0+0x760/0x760 [ 551.264982][T16533] ns_ioctl+0x27d/0x350 [ 551.269174][T16533] ? open_related_ns+0x200/0x200 [ 551.274168][T16533] ksys_ioctl+0x123/0x180 [ 551.278535][T16533] __x64_sys_ioctl+0x73/0xb0 [ 551.283174][T16533] do_syscall_64+0xfa/0x790 [ 551.287710][T16533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.293620][T16533] RIP: 0033:0x45c479 03:20:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x40700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) [ 551.297529][T16533] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 551.317369][T16533] RSP: 002b:00007f8defb3fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 551.325847][T16533] RAX: ffffffffffffffda RBX: 00007f8defb406d4 RCX: 000000000045c479 [ 551.333850][T16533] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 551.341849][T16533] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 551.349862][T16533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 551.357956][T16533] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000008 [ 551.409557][T16533] ERROR: Out of memory at tomoyo_realpath_from_path. [ 551.565252][T16541] dns_resolver: Unsupported server list version (0) [ 551.657597][T16509] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:20:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) semget(0x3, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000024003f000000000000006e64000000001400028008000200", @ANYRES32=0x0, @ANYBLOB="0500010005000000"], 0x44}}, 0x0) 03:20:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18}, 0x18) sendmsg$nl_xfrm(r2, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000680)=@getsa={0x104, 0x12, 0x100, 0x70bd27, 0x25dfdbfe, {@in6=@ipv4={[], [], @multicast2}, 0x4d5, 0x2, 0x2b}, [@algo_auth_trunc={0xdc, 0x14, {{'crct10dif-arm64-ce\x00'}, 0x480, 0x180, "58a33a6ca440ef565f97ff59fd96bc68d2825238808984995acbbd40a4ecff8b78043344dda7fb73736c140e9810050b402437e7a383e9e5d9d7786026f7fe8d6976eabce5cd3619048018c0fad2a5ab7e3a568d6ce201a034ccbe12f4b59d80520e27814ff69b4bc87dc9ae6eabc08ee571d92597d071d894ac2061f1a5bfb30edcdf2409fc0ffcde30ca8b5d115026"}}]}, 0x104}, 0x1, 0x0, 0x0, 0x40}, 0x40080) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000180)={0x800, 0x4, 0x4, 0x400, 0x7, {}, {0x4, 0x2, 0x2, 0xff, 0x9a, 0x5, "68650ac4"}, 0x20, 0x3, @offset=0x40, 0x5a822920, 0x0, r3}) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e24, 0x1, @loopback}}, 0x0, 0x0, 0x6, 0x0, "12d2ffc7468293adbe2e7057d45e20a41bdadd7fa0c044ef1d0dd68a865cd992f726cd9ef1c641985c625ac79fb545ab5939a210f4e2e6a0272583e92755d498284b700ea407a2ab26b1ef308ee4a25e"}, 0xd8) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x2, 0x124, 0x0, &(0x7f0000001140)="afa55ea5081d1dc7610da2290f9e", 0x0, 0x737, 0x0, 0xfffffffffffffcfc, 0xfffffffffffffd82, &(0x7f0000000000), &(0x7f00000003c0)="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"}, 0x28) 03:20:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000000006c, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:01 executing program 4 (fault-call:3 fault-nth:9): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:20:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write$FUSE_STATFS(r0, &(0x7f00000001c0)={0x60, 0x2f, 0x5, {{0x1, 0x6, 0x4, 0x80000000, 0x8, 0x3, 0x3, 0x9}}}, 0x60) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000240012800b00010067656e6576650000140002800500080002000000060005004e23000008000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="9838de949af095a622a499574af959261eabe10f1e4ce79a0fd1dcc215d3e3a098b1341091b8a50b3386afffd5c086e5bdf2cd89906d6d8c88a570b9a6f387a37b8525968f0fa17cf394ba408f75ce6622"], 0x54}}, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xfffffffffffffffd, 0x240000) write$rfkill(r2, &(0x7f0000000040)={0x80000001, 0x2, 0x0, 0x1, 0x1}, 0x8) [ 552.134619][T16551] FAULT_INJECTION: forcing a failure. [ 552.134619][T16551] name failslab, interval 1, probability 0, space 0, times 0 [ 552.181012][T16551] CPU: 1 PID: 16551 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 552.191006][T16551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.201091][T16551] Call Trace: [ 552.204425][T16551] dump_stack+0x197/0x210 [ 552.208799][T16551] should_fail.cold+0x5/0xf [ 552.213460][T16551] ? setup_fault_attr+0x1f0/0x1f0 [ 552.218577][T16551] ? ___might_sleep+0x163/0x2c0 [ 552.223477][T16551] __should_failslab+0xb7/0x100 [ 552.228375][T16551] should_failslab+0x9/0x14 [ 552.232918][T16551] __kmalloc+0x2e0/0x770 [ 552.237296][T16551] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 552.243164][T16551] ? tomoyo_encode2.part.0+0xf5/0x400 [ 552.248591][T16551] tomoyo_encode2.part.0+0xf5/0x400 [ 552.254004][T16551] tomoyo_encode+0x2b/0x50 [ 552.258459][T16551] tomoyo_realpath_from_path+0x19c/0x660 [ 552.264116][T16551] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.270405][T16551] tomoyo_check_open_permission+0x2a3/0x3e0 [ 552.276428][T16551] ? __kasan_check_read+0x11/0x20 [ 552.281520][T16551] ? __alloc_file+0xa4/0x340 [ 552.283307][T16554] device geneve2 entered promiscuous mode [ 552.286149][T16551] ? tomoyo_path_number_perm+0x520/0x520 [ 552.286196][T16551] ? find_held_lock+0x35/0x130 [ 552.286251][T16551] ? lock_downgrade+0x920/0x920 [ 552.286270][T16551] ? rwlock_bug.part.0+0x90/0x90 [ 552.286296][T16551] tomoyo_file_open+0xa9/0xd0 [ 552.317004][T16551] security_file_open+0x71/0x300 [ 552.321994][T16551] do_dentry_open+0x365/0x1350 [ 552.326840][T16551] ? chown_common+0x5c0/0x5c0 [ 552.331580][T16551] dentry_open+0x132/0x1d0 [ 552.336037][T16551] ? userns_put+0xb0/0xb0 [ 552.340434][T16551] open_related_ns+0x19d/0x200 [ 552.345236][T16551] ? __ns_get_path.isra.0+0x760/0x760 [ 552.350661][T16551] ns_ioctl+0x27d/0x350 [ 552.354863][T16551] ? open_related_ns+0x200/0x200 [ 552.359845][T16551] ksys_ioctl+0x123/0x180 [ 552.364214][T16551] __x64_sys_ioctl+0x73/0xb0 [ 552.368841][T16551] do_syscall_64+0xfa/0x790 [ 552.373377][T16551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.379289][T16551] RIP: 0033:0x45c479 [ 552.383191][T16551] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.402803][T16551] RSP: 002b:00007f8defb60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 552.411208][T16551] RAX: ffffffffffffffda RBX: 00007f8defb616d4 RCX: 000000000045c479 [ 552.419167][T16551] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000004 [ 552.427157][T16551] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 552.435114][T16551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 552.443069][T16551] R13: 000000000000040c R14: 00000000004c66c8 R15: 0000000000000009 [ 552.462769][T16551] ERROR: Out of memory at tomoyo_realpath_from_path. 03:20:02 executing program 4 (fault-call:3 fault-nth:10): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:20:02 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x9c) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="52d239cba600db4b2fce68079a1bbfec6036ac449209a9501b4744505ccb2fca6065386ae187ef5ecb3d8bcc5a0367db836d03e2286223bf00d63b0c3177eab35b1753309f66070653d98a7c02"], 0x6) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r3, &(0x7f0000000340)=ANY=[], 0xff0e) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r3, 0x5421, &(0x7f0000000000)=0x1000) connect$inet6(r4, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000280)=@gcm_256={{0x304}, "cddf018312d6d75b", "c0f711a359a5b7215aeb47f891eb668a642577d10642dcf00350e63e6b940232", "9b6795d9", "36a83ebf3f0d54f0"}, 0x38) splice(r2, 0x0, r3, 0x0, 0x100000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:20:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000074, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:02 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@timestamp, @sack_perm, @timestamp, @mss={0x2, 0x3ff}], 0x4) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}) 03:20:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) 03:20:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000000007a, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000400)) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000440)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r5, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x30, 0x1412, 0x10, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x48000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="2fa8330000008100000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003640)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x25, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x2}]}}]}, 0x3c}}, 0x0) 03:20:03 executing program 0: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) socket$inet6(0xa, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 553.218811][T16591] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 03:20:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0xff) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$inet6(0xa, 0x80003, 0xff) close(r0) 03:20:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x2, 0x0) 03:20:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000138, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 553.423731][T16591] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 553.528774][T16604] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 03:20:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000640)) clone3(&(0x7f0000000540)={0x30955200, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0, {0x6}, &(0x7f0000000440)=""/123, 0x7b, &(0x7f00000004c0)=""/56, &(0x7f0000000500)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x0, 0x4, 0x8, 0x1000000000000000}, r1, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) r3 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = getpid() sched_getaffinity(r5, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r4, &(0x7f00000002c0)=r5, 0x12) sched_setattr(r5, &(0x7f00000005c0)={0x38, 0x0, 0x10000008, 0x8, 0x1, 0xf5ad, 0x7f, 0xe8, 0x3000, 0x573d}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvfrom(r6, &(0x7f0000000180)=""/161, 0xa1, 0x2022, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, &(0x7f0000000140)={0x0, 0x0, {0x9, 0x10000, 0x3ff, 0x26}}) write$cgroup_subtree(r6, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x19) ioctl$TCSETAW(r2, 0x8924, &(0x7f00000000c0)) 03:20:03 executing program 5: r0 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = getpid() sched_getaffinity(r2, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r1, &(0x7f00000002c0)=r2, 0x12) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = add_key$user(&(0x7f00000004c0)='user\x00', 0x0, &(0x7f0000000100), 0x2a, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)="02", 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000580)={r5, r4, r4}, &(0x7f0000000680)=""/268, 0x10c, &(0x7f0000000300)={&(0x7f0000000d00)={'rmd128-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r5, r3}, &(0x7f0000000740)=""/243, 0xf3, 0x0) r6 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r8 = dup2(r7, r6) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r7, 0x40605346, &(0x7f0000000040)={0x0, 0x0, {0xfffffffffffffffe}}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r9, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) fsmount(r9, 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000180)) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r10, 0x0, 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) ioprio_get$uid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x400000001, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x400000001, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x400044841, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r11 = openat$tun(0xffffffffffffff9c, 0x0, 0x4000940c1, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, 0x0) syz_open_dev$midi(0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r12 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000001, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, 0x0) r13 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0xfff}, 0x0) 03:20:03 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00'}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000100)={0x1, 0x3, 0x5, 0x15bb, 0x20, "9263244874f1e9182e83e95aecd31e4c1a768a", 0x1000, 0x2}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) munlockall() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) write$FUSE_LSEEK(r5, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0x4}}, 0x18) 03:20:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000210, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 553.911450][T16620] sp0: Synchronizing with TNC 03:20:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x10, 0x0) 03:20:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000218, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 554.279100][T16620] sp0: Synchronizing with TNC 03:20:04 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x0, 0x3, 0x75, 0x0, 0x0, 0x7fff, 0x0}) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x4004550d, 0x0) 03:20:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x227f, 0x0) 03:20:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000000002e8, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:04 executing program 1: mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000140)='./file0\x00', 0x80100, 0x48) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:20:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x2405, 0x0) 03:20:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x1, 0x4, 0x100000001}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x1, 0x0, r4}]}, 0x0, 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x3, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7c}}, 0x0, 0x56, 0x89, &(0x7f0000000680)=""/137, 0x41100, 0x3, [], 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x10}, 0x10}, 0x78) r7 = openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f0000000b40)=ANY=[@ANYBLOB="a20bcb81d3f494cd6fcc776a5774ec1f5764f9e34c11dc385cb04a0c6e4161a63b9ed458841c7ebd9633e3df74069858db88fc310f094bcde559ba8f3f1195f23e195f227486cd856d4c9b808581e12198804cd88e373e5b17cd013fe33aa9b64600b8e9874451e6000000000000"], 0x6e) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f00000005c0)={0x14, 0xa1, &(0x7f0000000940)="52aaf5742705046aad27864ca8490f8ae839405e7d9bc0b9d537731c408b68b50b941bd32d6abac18e1d459b2605711f11a9a4c3386fc2e615d4af1b1a84b00d190d39ef210332946f0e57314ee3901b0cff111ed60952e67320f58c934e8457106a9cb98695decf2ddfdf22e49e2224b035cb3e4c727591e7a9f6dc87b2b5020b5684495cc1a5b54dfe21f8cae5c3260d51dbe3f48d0a76d476af814232073757"}) write$cgroup_type(r7, &(0x7f0000000a80)='threaded\x00', 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r6, 0xc0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x0, 0x0, r8}, 0x30) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r9, 0x1, 0x53, &(0x7f0000000100)={0x7, 0x7, 0x3}, &(0x7f0000000200)=0x28) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r8}, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) 03:20:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000300, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4c00, 0x0) 03:20:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000600745f800800000000000849078ac1414bbac1414aa000000000401907800f426e60f0700008cbfc12abc282c27820fd9118600820ef601000000000000940a5a17e89fb5f1d3debc8540002b4ef424297d1138b27a369d0b112b33df4c366b67856c210a24c3df6373d0ca47c3c2885da770edbd1ee5bde967a600000000000000a8992a1dfa07eb7991ef9b9b560005"], 0x84) 03:20:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000000003f0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40004802}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x10c, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffff87e}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x101}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffb}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xa95}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4004010}, 0x8000) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x80000000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x44, r4, 0x200, 0x70bd2c, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x20008040}, 0x4010) r5 = dup3(r3, 0xffffffffffffffff, 0x0) r6 = socket(0xb, 0x3, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bind$packet(r6, &(0x7f0000000240)={0x11, 0x0, r8}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$IMGETVERSION(r6, 0x80044942, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r9, 0x0) dup(0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000840)) r10 = socket(0x400000000010, 0x3, 0x0) write(r10, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) sendmsg$xdp(r10, &(0x7f0000000800)={&(0x7f0000000140)={0x2c, 0xa, r8, 0x2b}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000600)="dba5e58d10e43b66ac591a2697ff4d6ff1fcd68295dc3d822f1ac3fd3e579103b454a590536212139fab51bddc550e8d1ab1222146d6c1a5c3726a7990126bf4660468a4c186f29e146bbedc917e48", 0x4f}, {&(0x7f0000000680)="49479b9cbd4f2e8a253ec3f9275ab03af5d37ae8a5890be74d5669a75b517f6346", 0x21}, {&(0x7f00000006c0)="42e3509e709dac90a46514dff7423ede4c5fbd12c8bfabeaf7ce637fda609e27f793269e37773d9f51abf674066dffe1aed143c2c79e6d1dc01c3b9a647a7738da6c3a5561d13029d9de80c78318e5aa3fec102a13004970fbc2864a5dd377e03999a38bd96e99319c38ca5ddbb43a1b844520d0ba332c92fa65a57eae0619d9170d053ec688a28e652290f7065ae4e0ece8cd169a5eaaee32710bfaa30ae91d5c90d29561a679b395497e887505474f163ff809704d9bf6f8513e6ae27b8bca55f7d0b81cc72671c94ed96ed9347b78112a0afb4a489ad957965566011b7c72", 0xe0}], 0x3, 0x0, 0x0, 0x44000}, 0x408d0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000040)) write$P9_RWALK(r9, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r9, r11) 03:20:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4c01, 0x0) 03:20:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000000003f6, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000500, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x541b, 0x0) 03:20:08 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000600, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) signalfd4(r1, &(0x7f0000000280)={[0x89]}, 0x8, 0x800) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x14, 0x13, 0x1, {0x1, 0x3, 0x2}}, 0x14) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x1, 0x74) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, 0x12, r3, 0x0) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x98, r4, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apt_lock_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:public_content_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}]}, 0x98}, 0x1, 0x0, 0x0, 0x40000}, 0x4) r5 = socket(0x400000000010, 0x3, 0x0) write(r5, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) ioctl$sock_rose_SIOCRSCLRRT(r5, 0x89e4) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x2) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x15) 03:20:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x5421, 0x0) 03:20:08 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000700, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x202020, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x8801}, 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_ROUTER={0x5}]}}}]}, 0x3c}}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 03:20:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x5450, 0x0) 03:20:08 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000400)=""/136, 0x88}, {&(0x7f0000000280)=""/123, 0x7b}], 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) fsmount(r1, 0x1, 0x1) 03:20:08 executing program 1: getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0xfffffffa) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r2 = socket(0x1e, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x54, r4, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x40011) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, r4, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x804) write$binfmt_misc(r1, &(0x7f0000000100)={'syz0', "5120083237691efe45f8c9776bd15b69c4194309ede3784b948e924bc0be4ee3ba16c084b3e5b0498b8297541a581567674e85c1f132606419ddd929061b386ce92358b8e071f3187b3a8859341126"}, 0x53) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r5, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 03:20:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000a5c, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000170600000fff070056060800020000006a0200000ee60000bf050000000000003d630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad320100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000040)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:20:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x5451, 0x0) 03:20:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f00000001c0)="66b9800000c00f326635000100000f300f01c80f0f8ffcff1d66b91b08000066b80100000066ba000000000f3066b9830000c066b80000010066ba000000000f300f300f9ef70f01cf66b8008000000f23c80f21f866350000d0000f23f80f01c2", 0x61}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$VIDIOC_TRY_ENCODER_CMD(r4, 0xc028564e, &(0x7f0000000100)={0x2, 0x1, [0x40, 0x6, 0x5, 0x48, 0x10000, 0x7ff, 0x81, 0x7]}) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x12, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:20:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000003, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}, {0x0, 0x0, 0xdd25}], 0x0, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x82307201, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000006040)={0x101, 0xc, 0x4, 0xf929bb0472c2702, 0xffffffff, {}, {0x0, 0xc, 0x0, 0x1a, 0x1, 0x0, "8e11e9f5"}, 0x9, 0x4, @planes=&(0x7f0000006000)={0x8}, 0x0, 0x0, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f00000060c0), 0x8) 03:20:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000a5d, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x5452, 0x0) 03:20:09 executing program 1: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000644, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2000000, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000940)={0x0, 0x70, 0x2, 0xff, 0x0, 0x20, 0x0, 0xb7e2, 0x21800, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffe0, 0xa, @perf_bp={&(0x7f0000000700), 0xb55c8e88a6fb10db}, 0x2880, 0x0, 0x0, 0x7, 0x2, 0x54}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0x26c, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b231c", 0x0, 0x8e}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, r2, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) perf_event_open$cgroup(0x0, r1, 0xf, 0xffffffffffffffff, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x22000, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x422800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@newtclass={0x2c, 0x28, 0x8, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0x4, 0xb}, {0xa, 0xb}, {0xfff2, 0xfff2}}, [@tclass_kind_options=@c_sfq={0x8, 0x1, 'sfq\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x804}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r4, 0x8001a0, 0x0, 0x0, 0x0, 0x0, 0x1e}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000600)={0xa, 0x1}, 0x0, 0x0, &(0x7f0000000640)={0x0, 0xe, 0x0, 0x80000001}, &(0x7f0000000680)=0xffffffffffff4f2f, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x3f}}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:20:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x5460, 0x0) 03:20:10 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x8) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000)=0xa2ea) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) syz_open_dev$usbmon(0x0, 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', 0x0) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d303030303030304030303030303026303030343030303fadfe6f873dfd9b81f4a1f6143be5e0c2db9cd836d9bf636c08559be57809367af4d260b83b993509f0e398a5f495fdea948094406bbe3a1732cfaf7cd45a49403836f6f821ace9d2d362609069356188976496a450c9993186e242032a24cc90e51489295b35da60f86f2e9ab41f6c00"/155, @ANYRESDEC]) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x50002, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000150000/0x3000)=nil, 0x3000}, 0x2}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 03:20:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000c00, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x551f, 0x0) 03:20:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x200802, 0x4) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x990000, 0x4, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980919, 0x1, [], @ptr=0x2}}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[], 0x4}}, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="110700009cd0f2346d5c00080003000000", @ANYRES32=r3, @ANYBLOB="40958d3aca5770ad2849e50b64674128c671b5391fca511e2875e24cbd04c35cbb71894529ea78c6ee9d72689b262667b70b26b5a7c3370a5e40e751de4651d0f12f839bf9e1"], 0x1c}}, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x488901, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000080)={0x10000, 0x20000000209, 0x0, 0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000080)={0x20024e, 0x20000000209}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x0, 0x9, 0x0, 0xffffffffffffffff, 0x8}) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r8, 0x800000c004500a, &(0x7f0000000300)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r9, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r9, &(0x7f0000000000)={0x18}, 0x18) r10 = openat$cgroup_ro(r9, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r10, 0x80045005, &(0x7f0000000280)) readv(r8, &(0x7f0000395000)=[{&(0x7f0000000580)=""/4096, 0x1002}], 0x1) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', 0x0, 0x0, 0x0) r11 = dup(r0) ioctl$DRM_IOCTL_SET_UNIQUE(r11, 0x40106410, &(0x7f0000000080)={0x0, 0x0}) 03:20:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000001002, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:10 executing program 1: accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x10, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x5a000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3d9034a63dd29eb38bfea7", 0xc}], 0xcf02, &(0x7f00000001c0)=ANY=[@ANYBLOB="00511d9111dbaa0f350d82fe2343b7195cbf4300005f32369b28c5852a93550ab19276fbf37204cabc3766dd5e2a832cdf3f46405401000000000032b20c650b1ebb41052a544508009aff04247c92c9cc9e3363cf2b92cbc83ae0f744e6"]) 03:20:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x6364, 0x0) 03:20:11 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x8}, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b9800000c00f320f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c4e21903a05d000000c7442406000000000f011424f30f090f013a360f06c4c141f683b0a2e5a666baa100ed", 0x50}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbd, 0xbd, 0x4, [@const={0xd, 0x0, 0x0, 0xa, 0x4}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @restrict={0x4}, @typedef={0xd, 0x0, 0x0, 0x8, 0x4}, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x1, 0x0, 0x5}, {0x5, 0x7, 0xff}], "bf"}, @const={0x5, 0x0, 0x0, 0xa, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xd, 0x5}]}, @union={0x8, 0x5, 0x0, 0x5, 0x1, 0x200, [{0xf, 0x5, 0x2}, {0x2, 0x0, 0x800}, {0x8, 0x4, 0x3}, {0x0, 0x5, 0x4}, {0x6, 0x3, 0x800}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000100)=""/45, 0xdc, 0x2d}, 0x20) sendmsg$nl_generic(r4, &(0x7f0000001640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)={0x11b0, 0x19, 0x92916f8d7e4120be, 0x70bd27, 0x25dfdbfb, {0x20}, [@nested={0x173, 0x1d, 0x0, 0x1, [@generic="deee030be5e69b1954b777674463a8b95f8f099e3567313f46db0c678c945362062b606d8b308b472a21a68d23b74938f944ce955a9f62a9b821a959a9b43ede0ef7ed7c64a4e4c1a556535af494d5454f6ff34f8898850e44e45b96a7fb59e4195fd281631432fb3f259a2dd241ec096435982c4ee594cd3f9277506cda3e6780a3e8a22ba944e8436ec3abd8bd107161b94619e12767144d69556194fbb69c377e5a2955683ad8", @generic="3ce4a10a8f40c499b3517874468608f483e9d89449706921bccaa6166ff5c69183220a32c47d2765e57eb7d50a0262cbc3b4fb0480ee25ee0a9c7927e823ba7941efe0e135feb086fb70bfba37fc3b7da5835693f3fd6b7cadf5995db1c9077d59fdb862b15b1fc998edc35cf91fd1ee241e", @typed={0x13, 0x13, 0x0, 0x0, @binary="4bcc8d6b8eb18b65864127ad93fcc1"}, @generic="b06aa1ac581fcf01884e57a24e51d6e343f8f42560820226d776d088de521c1d8a64a9da2566d94dd6e7ab5873dcd36ae5f947f5e15ca9676db13eaf3db1c1cee3"]}, @typed={0x8, 0x71, 0x0, 0x0, @fd=r5}, @typed={0xc, 0x3d, 0x0, 0x0, @u64=0x3ff}, @typed={0xd, 0x68, 0x0, 0x0, @str='/dev/kvm\x00'}, @nested={0x1004, 0x93, 0x0, 0x1, [@generic="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"]}]}, 0x11b0}, 0x1, 0x0, 0x0, 0x240088d1}, 0x20000081) 03:20:11 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000001802, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x8903, 0x0) 03:20:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x8912, 0x0) 03:20:11 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000002000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:13 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x14, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18}, 0x18) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000080)) sendmmsg$alg(r0, &(0x7f00000000c0), 0x3c0, 0x0) 03:20:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000003801, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x20000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000011000/0x1000)=nil, 0x1000, 0xc, 0x100010, 0xffffffffffffffff, 0x10000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000440)=@assoc_value={0x0, 0x4}, &(0x7f0000000480)=0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/bsg\x00', 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000500)=0x6db, 0x4) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000240)={0x0, 0x7f, 0x100000001, &(0x7f0000000180)=0x8}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x140000000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, &(0x7f0000000340)={0xff, 0x1, &(0x7f0000000200)=[0x0], 0x0, 0x0, &(0x7f0000000300)}) 03:20:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x8921, 0x0) 03:20:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000180)="390000001300090468fe0700000000000700ff3f03000000450001070000001419001a000400000000000a00022000a4e91ee438242737d1d1", 0x39}], 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x801}, 0x4000000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x221, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r3, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x24000840) write(r1, &(0x7f0000000000)="ef227d39901f9734e69db35448cee2d6524d658d42", 0x15) 03:20:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000003f00, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:13 executing program 5: shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000300)={0xe, {0x2, 0x98, 0x4, 0x7c, "9d04a049c6e2a9a97f5a8bbeb7760e34d3c92d2c50358ab2905b66d6568386a4ff06d2cce4e410e856c39be59e8de9bd651e21d87972ba780364febeee3cd812a604078e828c30843b18eb6a9cb9e5e4754c4a2f9a4520e0fc0dd567a451665ebc402f6510909459152f257205f3f768c0ab22409901e06bba35faae"}}, 0x88) socket$inet_tcp(0x2, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18}, 0x18) write$P9_ROPEN(r0, &(0x7f0000000200)={0x18, 0x71, 0x1, {{0x2, 0x2, 0x8}, 0x5}}, 0x18) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r4 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'vlan1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)='~', 0x1, 0x0, 0x0, 0x0) r6 = socket(0x400000000010, 0x3, 0x0) write(r6, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) r7 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={r7, r8}, 0xc) ioctl$SIOCAX25DELUID(r6, 0x89e2, &(0x7f00000001c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/timer\x00', 0x0, 0x0) 03:20:13 executing program 1: syz_emit_ethernet(0x11a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000000e4fc00000000315a0e0f84a336b1594dea000000000000fef000000000000000000000fe8000000000f3ffffff0000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="90000000907800001ecf00ef2b524b3ea14867012d1d3382a7bed3d7f91ae58d1fd5f42f14f63b6796a141e4e0202b58655ce7fa956938a0c3a1278513d402de10514db012e07034abe44deadb1a5d98e3a04b37b61b2403798a05fdc1e9ee2b3138fd0f3b43df44a020ceb257813a3c41cc7461f99fe7e2a8937784d571f98bc68fb7b26befd4c712fb513ecf88aa616d7b6e3e3112604c74880435c4deb76a7622a7f2b4436df833d5675667bdbaf54052caf609942a523aca280632dabc77d32ce0a58ce9ca4090a289696a1fd380672db6050c8e8b00"], 0x0) 03:20:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x8933, 0x0) 03:20:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = creat(0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r5, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4010}, 0x4048840) close(r3) creat(0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xa) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000180)) prctl$PR_SVE_GET_VL(0x33, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000000c0)={[{0xff, 0x8001, 0x2, 0x0, 0x37, 0x0, 0x0, 0x40, 0xfe, 0x1f}, {0x4, 0xfffd, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xff, 0x0, 0x0, 0x20, 0x20}, {0x0, 0xfffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x3, 0xf1, 0x6106}]}) setpriority(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r6, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000001000000010000000600000003000000"], 0x18}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_gstrings={0x1b, 0x4, 0x6c, "e1d5bf9fd9c23847097e0feaf809584979fa6c38e74faffd291ec3b6685387126d432f44b8e813f5295809c168b9378bc700f6882ea7ba57676c4010d818fa303e0e9351632d265c109437d4c418f0e388dd90c19ab75e789c8e8141bb442cc30abbcbb6faf7b140f39fa914"}}) 03:20:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x894c, 0x0) 03:20:14 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x111) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:20:14 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000004000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 564.257786][T16883] device lo entered promiscuous mode 03:20:14 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000004800, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 564.806708][T16871] vlan1: HSR on top of VLAN is not yet supported in this driver. 03:20:14 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000004c00, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 564.991091][T16888] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 565.058468][T16889] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:20:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x8981, 0x0) [ 565.223110][T16900] vlan1: HSR on top of VLAN is not yet supported in this driver. [ 565.623099][T16910] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 565.662488][T16909] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 03:20:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x8982, 0x0) 03:20:15 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000005c0a, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:16 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x1f, 0x498300) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000001500000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:20:16 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18}, 0x18) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x199) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="2fbee5"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 03:20:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x804, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8000, 0x7}, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="240000002e0007031dfffd946fa201000100000000000000000000e50c1be3a2f7fffe7e280000005e00ffaa1c0009b3ebea966cf0554edc7de8ddeb133c2bff0100000000000015f8ffff30", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/160, 0xa0}, {&(0x7f0000000380)=""/65, 0x41}, {0x0}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000480)=""/108, 0x6c}, {&(0x7f0000000040)=""/14, 0xe}], 0x6}}], 0x1, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setattr(r1, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x7ff}, 0x0) mkdir(0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40), 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000040)={0x34f1, 0x1, [0x5, 0x40, 0x9, 0x800, 0x7], 0xf801}) close(r2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5}}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4001, 0x0, @loopback}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='status\x00') preadv(r6, &(0x7f00000017c0), 0x1b4, 0x0) setsockopt$inet6_dccp_int(r6, 0x21, 0x3, &(0x7f0000000200), 0x4) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='status\x00') preadv(r7, &(0x7f00000017c0), 0x1b4, 0x0) 03:20:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x8983, 0x0) [ 566.282644][T16929] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -99 03:20:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000005d0a, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 566.346194][T16935] ceph: No path or : separator in source 03:20:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xae01, 0x0) [ 566.449775][T16929] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -99 [ 566.531011][T16944] ceph: No path or : separator in source 03:20:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100677470001400028008000100", @ANYRES32, @ANYBLOB="08000200b1d0962e93eb59bf00ee84b7447f4d71ce5e77f8d2fc6990ed608d9c7c81a4ffff925033a2039bd8b1074d63a019a08f115b54026e24839fa7c6a8e3f5b81d67aadb05091add945080d190448858784bfecf7febf4c2768959636c1a25f8710416ca81f076402197945926dbba88171d8c8ca47a5d67acbc1e0062c0c5d1b5a15c8886053d21c1201b826b356d001d65f0b0a2127e16539010a7d7dbf9a6466100fe6d117965bc75ce6a10f95a593d0964acd852d6bf5acd0beb64052992a0487684255a582000bff5549e56", @ANYRES32, @ANYBLOB="9790cb93d1845b08952410"], 0x40}}, 0x0) r1 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = getpid() sched_getaffinity(r3, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r2, &(0x7f00000002c0)=r3, 0x12) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000200)={0x401, 0x2, {r3}, {0xffffffffffffffff}, 0xffffffff}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000640)="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", 0x1000, 0x10001}], 0x2000000, &(0x7f0000000400)={[{@usrquota='usrquota'}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@quota='quota'}, {@uid={'uid', 0x3d, r4}}], [{@audit='audit'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'memory.events\x00'}}, {@dont_measure='dont_measure'}]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) r6 = openat$cgroup_ro(r5, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0xf) ioctl$BLKRAGET(r6, 0x1263, &(0x7f0000000040)) 03:20:16 executing program 0: r0 = socket$inet6(0xa, 0x400000000005, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000000)=0x20000) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x400, 0x0, @mcast1, 0xaaf}, 0x1c) dup3(0xffffffffffffffff, r0, 0x80000) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000380), 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x11, 0x0, 0x300) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000ff6000/0x7000)=nil, 0x7000, 0x2800009, 0x50, r0, 0xe30ac000) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x22002, 0x0) write$dsp(r5, &(0x7f0000000100)="f22abd7bd312bf4ace00bee1581d69af763b2bc06a7384ea6fac9f8e8950bb6fd84549188d2fb960d8e315f27d9cb9f6d49c52c7d1311ae0adc7bfda2dbfbcdc9f946cc4cace60e99716920664a223986e0c2d1deb1fd9dd6e6f5f30b1dc92d14e64538cdff458f9eb", 0x69) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r4, 0x800000200004) sendfile(r0, r6, 0x0, 0x80001d00c0d0) [ 566.612693][T16936] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 566.640529][T16936] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 566.692571][T16936] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 03:20:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xae41, 0x0) 03:20:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000006000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 566.787839][T16952] jfs: Unrecognized mount option "audit" or missing value [ 566.801084][T16936] EXT4-fs error (device loop5): ext4_fill_super:4560: inode #2: comm syz-executor.5: iget: root inode unallocated [ 566.825106][T16936] EXT4-fs (loop5): get root inode failed [ 566.852045][T16936] EXT4-fs (loop5): mount failed 03:20:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xae60, 0x0) [ 566.932611][T16965] jfs: Unrecognized mount option "audit" or missing value 03:20:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000006400, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x85, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000240)=""/16, 0x10) pipe(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2100, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x301, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000084}, 0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000380)=[{0x1, 0x2, {0x2, 0xff}, {0x2, 0x0, 0x2}, 0xfe}, {0x2, 0x2, {0x2, 0xff, 0x4}, {0x2, 0xf0}, 0x1, 0x1}, {0x1, 0x1, {0xb98565d98ab6017f, 0x1}, {0x0, 0x0, 0x1}, 0x2, 0x2}], 0x60) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 03:20:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xae80, 0x0) 03:20:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x1c, r3, 0x711, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}, @BATADV_ATTR_HOP_PENALTY={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040001}, 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r6 = socket(0x400000000010, 0x3, 0x0) write(r6, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) ioctl$sock_bt_cmtp_CMTPCONNDEL(r6, 0x400443c9, &(0x7f0000000080)={@none, 0x2}) r7 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r7, &(0x7f0000006500)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000001dc0)="7694988f474426ee6d4b39f6ef5eae8d3808225f131725f6f8266fd9656c", 0x1e}, {&(0x7f0000000880)="7f", 0x1}, {&(0x7f0000000900)='~', 0x1}], 0x3}}], 0x1, 0x0) 03:20:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb702, 0x0) 03:20:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000006800, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:17 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000003c0)={0xf23, 0xe203, 0xc, 0x411, 0x7fff0, 0x3d, 0xfffff4fe, 0x7, r7}, 0x0) 03:20:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000006c00, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb703, 0x0) 03:20:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f0000000540)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000c0030000d8020000e8000000e8000000d8020000d8020000d8020000040000000000000000000000000000000000000031494ce70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000030000007f000001ac1e00010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f000000000000000000000000fc8b11c5000000000000000089e20000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000e00000017f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000000000000000000000000000000000000000000000000000000000000000000000000000000007465616d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200c0000801000000000000000000000000000000000000000000000000480049444c4554494d45520000000000000000000000000000000000000000000500000073797a2ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000034694c1eeaabe4140000000000c000e80000000000000006f61a59d2329ba6000000000000000000002800"/1036], 0x1) 03:20:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb704, 0x0) 03:20:18 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6(0xa, 0x3, 0x20000000021) openat$autofs(0xffffffffffffff9c, 0x0, 0x31b541, 0x0) poll(0x0, 0x0, 0x0) r2 = socket(0x11, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{0x0}], 0x1, 0x0) bind$packet(r2, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r5, &(0x7f0000000000)={0x18}, 0x18) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x8000}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f0000000080)={r6, 0x2}) 03:20:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000007400, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:18 executing program 5: perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0xffffffa8) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x6000)=nil, 0x6000, 0x0, 0x12, r3, 0x0) 03:20:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb705, 0x0) 03:20:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000007a00, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb707, 0x0) 03:20:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000000e802, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:19 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000003c0)={0xf23, 0xe203, 0xc, 0x411, 0x7fff0, 0x3d, 0xfffff4fe, 0x7, r7}, 0x0) 03:20:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb710, 0x0) 03:20:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000500)='ntfs\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@fmask={'fmask', 0x3d, 0x9}}, {@case_sensitive_yes='case_sensitive=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@umask={'umask'}}, {@errors_recover='errors=recover'}, {@errors_recover='errors=recover'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@case_sensitive_yes='case_sensitive=yes'}, {@umask={'umask'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'errors=recover'}}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, '*vboxnet0user@}'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x65, 0x36, 0x61, 0x61, 0x37, 0x34, 0x32], 0x2d, [0x61, 0x31, 0x0, 0x35], 0x2d, [0x38, 0x36, 0x31, 0x64], 0x2d, [0x64, 0x63, 0x0, 0x36], 0x2d, [0x35, 0x5, 0x60, 0xd, 0x66, 0x0, 0x35, 0xc]}}}, {@audit='audit'}]}) 03:20:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000000f003, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:20 executing program 0: sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000000000000600000000000000000a20000000000a01000000000004000000000000000900010073797a300000000070000000120a0100001000000000000000000000040004800900020007797a30000000000900010073797a300000000008000340020000000900020073797a30000000000400848004000480080003400000000a140004800c0001"], 0x1}}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000200)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 03:20:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb711, 0x0) 03:20:20 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2808c8c0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x12}, 0x831}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) r3 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = getpid() sched_getaffinity(r5, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r4, &(0x7f00000002c0)=r5, 0x12) r6 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r7 = openat$cgroup_procs(r6, 0x0, 0x2, 0x0) r8 = getpid() sched_getaffinity(r8, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r7, &(0x7f00000002c0)=r8, 0x12) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r10 = accept$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000600)=0x1c) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000140)={r11}, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r10, 0x84, 0x71, &(0x7f0000000800)={r11, 0xfff}, 0x8) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r12, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r12, &(0x7f0000000000)={0x18}, 0x18) kcmp$KCMP_EPOLL_TFD(r5, r8, 0x7, r9, &(0x7f0000000080)={r12, r0, 0x2}) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) [ 570.286198][T17061] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 570.321061][T17061] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:20:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb730, 0x0) [ 570.380985][T17061] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:20:20 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000000f603, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb731, 0x0) 03:20:20 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0xa05, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000006c0)=ANY=[@ANYBLOB="ab000000a6d23fa0c908488b6190f2d1d89677354590dde5ffb3b62ccfa516aec8038d48d684fba227e9983be9f367da66938eddee11b1613f0d5ff3b2213cdf2bd00a8ae552bc17ec5e974dab0d000000000000ed35eb9bb9e096cc3825df10acb811579be3856eb778df7afa4a3112676e9547e0d65bee83afa0b4f46a0b10af299da7efdcc6c5"], 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="0300000007000800000400000000e9cac21f7c9a061fa37c652ccd54880e7c04d430d61bca90d0aa34769bbc3deafa5fcd2045b677f308114cb0325930b1ad4e99ca31f98f9519d2a5e12023ca3928d06f00d1dddec50a6b6327487700922f20cc8d559ba9dcd6"], 0x1}}, 0x0) r2 = msgget(0x1, 0xe) msgctl$MSG_STAT(r2, 0xb, &(0x7f00000004c0)=""/110) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0xffffffff80000000, 0x620102) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f00000003c0)={{0xff00, 0xe7, 0x20, 0x2}, 'syz1\x00', 0x24}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000002c0)=0x90, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004680)={{{@in6=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000004780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008a40)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000008b40)=0xe8) connect$can_j1939(r5, &(0x7f0000008b80)={0x1d, r7, 0x2, {0x2, 0xff, 0x1}, 0xff}, 0x18) 03:20:20 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b269", 0x5a, 0xfffffffffffffffd) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_MASTER={0x8, 0x4, r2}]}, 0x28}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r2}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x400, 0xe1, {0x0, 0x7530}, {}, {0x4, 0x0, 0x1, 0x1}, 0x1, @canfd={{0x0, 0x0, 0x1, 0x1}, 0x2d, 0x1, 0x0, 0x0, "35553d952e84ee0bd15bdc5a887780587b8f70dbce634e65952bfa9e4147faf1b0c88b1ea7df71fa9dd4859b189483cb89a193b3f1e27ed1f75a677d5ff296c0"}}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x80) [ 571.123997][T17086] PKCS8: Unsupported PKCS#8 version [ 571.152868][T17090] PKCS8: Unsupported PKCS#8 version 03:20:21 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000003c0)={0xf23, 0xe203, 0xc, 0x411, 0x7fff0, 0x3d, 0xfffff4fe, 0x7, r7}, 0x0) 03:20:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x1c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}}, 0x1c}}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x20000, 0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xec, 0x4, 0xa, 0x3, 0x0, 0x0, {0xc, 0x0, 0x4}, [@NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x100}]}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xffffffffffffffff}, @NFTA_CHAIN_HOOK={0x20, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_COUNTERS={0x58, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x98}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x40}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xa4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0xec}}, 0x4008040) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) shutdown(r2, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, 0x4, 0x8, 0x101, 0x0, 0x0, {0x5, 0x0, 0x1}, [@CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x401}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x368}]}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x2000c0f1) 03:20:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000001517f, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x400454ca, 0x0) 03:20:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r3 = socket(0x400000000010, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) bind$unix(r3, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 03:20:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x40049409, 0x0) 03:20:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000028f5c, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) prctl$PR_GET_CHILD_SUBREAPER(0x25) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) 03:20:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x40084504, 0x0) 03:20:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000038860, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000040000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4008af22, 0x0) 03:20:22 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000003c0)={0xf23, 0xe203, 0xc, 0x411, 0x7fff0, 0x3d, 0xfffff4fe, 0x7, r7}, 0x0) 03:20:22 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYPTR], 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000240)=ANY=[@ANYPTR], 0x8) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000300)) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) accept4$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x100800) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000540)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20020020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, r5, 0x0, 0x70bd27, 0x7}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, r4, 0xf01, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) r6 = socket(0x80000000000000a, 0x2, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000300)={0x30, r9, 0xc8ef0a4335e6829f, 0x0, 0x0, {0xf}, [@TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0x4}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0x9c, r9, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xf94}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb19d}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x20000080) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000d551337fc59eabe543227a1be50d53dd538c1e2056899eef30dda77de5da2b310326169ce6385a4e55cd90325c2d1c691031a04c54505e4389c6428e2eb7c4baae9e4ef0c115498d47b15df9b8694c184db636"], 0x48) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000780)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e20, @rand_addr=0xffffffff}, 0x9b, 0x0, 0x0, 0x0, 0xc, &(0x7f00000002c0)='tunl0\x00', 0x0, 0x2483, 0x2}) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000f40)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000001040)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x64, r10, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1cdc}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xab}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xffffff00, 0x7fff, 0x9, 0x4, 0x1000]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x6854, 0x80000000, 0x3, 0x2, 0x6]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000800) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000240)=@gcm_256={{0x304}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", 'dCe#', "b1034b903a64f865"}, 0x38) close(r1) 03:20:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000004000a0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x40186366, 0x0) 03:20:22 executing program 5: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/handlers\x00', 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x10, &(0x7f00000000c0)='$-mime_type\x00') 03:20:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000001000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4020940d, 0x0) 03:20:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() write$dsp(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, 0x0) unshare(0x20000) setns(0xffffffffffffffff, 0x0) [ 573.329320][T17151] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 03:20:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4020ae46, 0x0) 03:20:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000002000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 573.586959][T17146] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 03:20:23 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000001c0)) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x1000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3d90", 0x3}], 0x0, &(0x7f00000000c0)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 03:20:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) dup2(r2, r1) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, &(0x7f0000000000)={0x0, 0x5, 0x20}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x1, 0x9, 0x1, 0x1, 0x89, 0x7}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r3, &(0x7f0000000000)={0x18}, 0x18) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x3, 0x6, 0x4000007, 0x1, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)={r4}) [ 573.919259][T17163] hub 9-0:1.0: USB hub found [ 574.014125][T17163] hub 9-0:1.0: 8 ports detected 03:20:24 executing program 2: dup(0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x844}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x10700, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r7}, 0x14) r8 = socket(0x400000000010, 0x3, 0x0) write(r8, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockname$packet(r8, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_MASTER={0x8, 0x4, r3}]}, 0x28}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@mcast2, 0x15, r9}) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYRESHEX, @ANYBLOB="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", @ANYRESHEX]) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:20:24 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) 03:20:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x40305828, 0x0) 03:20:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000003000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x4, 0x200081) r0 = socket(0x2b, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r0, 0x0, 0x0, 0x80800) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) socket$netlink(0x10, 0x3, 0x12) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r6, 0x0, r7, 0x0, 0x10005, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{}, {}, 0x0, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) 03:20:24 executing program 5: r0 = semget(0x1, 0x1, 0x160) semop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0285628, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/142) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x408600, 0x0) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r2, 0x40044103, &(0x7f0000000140)=0x7c7) r3 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4], 0x2}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) ioprio_set$pid(0x1, r1, 0x6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r5) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) semget$private(0x0, 0x3, 0x110) r8 = dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$IOC_PR_CLEAR(r8, 0x401070cd, &(0x7f0000000180)={0x7ff}) 03:20:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000004000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x40305829, 0x0) 03:20:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4030582a, 0x0) 03:20:24 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) 03:20:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000005000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000409856c93a606915219a000000000042e33089754c8107c3cd4523dd4a81c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569c435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53dc9f2653d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16325fe27da2a9d5", 0xc0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000900)={'syz'}, &(0x7f0000000840)="0a5ae168fbc8249bae5602ad6bd199f059578dac1e5d8aa3623b2b177368035ce9aa9c7ba0b126458854d32ad6f64af155db5fba46381d478afc7010af4923cf652c56cc87d2f07bd22e0e7ad1dd7e023ab104c23a17559deba7174168c10e9cc00d3f7ff622fd81b5712f6969d18876080000000000000000", 0x79, r1) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r2, r0, r2}, 0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={'crc32\x00'}}) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = getpid() sched_getaffinity(r5, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r4, &(0x7f00000002c0)=r5, 0x12) r6 = syz_open_procfs(r5, &(0x7f0000000000)='children\x00') r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r6, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x14, r7, 0x100, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8840}, 0x20000014) 03:20:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4030582b, 0x0) 03:20:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x641a2430ca005045, 0x0, 0x0, {0x0, 0x0, 0x3f00, 0x0, 0x0, 0x48008}, [@IFLA_OPERSTATE={0x5, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xf0}, 0x0) 03:20:25 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000006000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:25 executing program 5: set_mempolicy(0x0, &(0x7f00003ccff8)=0x7fc, 0x7742) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2, 0x1b071, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000001c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xc00]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa) r1 = socket(0x3, 0x80000, 0xf0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'vlan0\x00'}, 0x263) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x9040000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc880}, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r4 = openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r5 = getpid() sched_getaffinity(r5, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r4, &(0x7f00000002c0)=r5, 0x12) r6 = gettid() unshare(0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r8 = fcntl$getown(r7, 0x9) sched_getattr(r8, &(0x7f0000000040)={0x38}, 0x38, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={r6, r9}, 0xc) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x4, 0x8, {r5}, {r9}, 0x7, 0x7}) getpgid(r10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) fchown(r1, r11, 0x0) [ 575.869287][T17245] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 575.938403][T17248] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 03:20:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x40305839, 0x0) 03:20:25 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000007000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:26 executing program 0: r0 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$inet(r1, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000200)="de", 0x1}, {&(0x7f00000002c0)='\v', 0x1}, {&(0x7f0000000000)="d2", 0x1}, {&(0x7f0000000480)='Y', 0x1}, {&(0x7f0000000580)="a0", 0x1}, {&(0x7f0000000140)="f6", 0x1}, {&(0x7f0000000680)='d', 0x1}, {&(0x7f0000000700)="c3", 0x1}, {&(0x7f00000000c0)="e9", 0x1}], 0x9}}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000900)='\x00', 0x1}], 0x1}}], 0x2, 0x600d854) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x9, &(0x7f0000000180)=0x1) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) sendfile(r4, r0, 0x0, 0x80001d00c0cd) 03:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x4090ae82, 0x0) 03:20:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000080)=0x8ef6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x38, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0xc, 0x2, [@TCA_U32_HASH={0x8}]}}]}, 0x38}}, 0x0) 03:20:26 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) 03:20:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000008000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:26 executing program 0: getpid() getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) syz_open_procfs(r3, &(0x7f0000000180)='net/arp\x00') splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2000, 0x0) pipe(0x0) close(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x7c, r4, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x80}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000014) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000540)=0x2000000000000074, 0x56c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000700)='cdg\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="006cc3000000fe092e309586e1eb7a5c752e6b8a03679baa77bd46572d7cc25dae70be65c75f39a6728da48dff078f9eb9ccad33bca5a377227001e972a6e8b95d3352f0fe0ae5e42c8392b1e2d5bf673149b24836647e48b81417d93428"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40001) socket$packet(0x11, 0x2, 0x300) fchmod(0xffffffffffffffff, 0x2) write(r0, &(0x7f00000001c0)="ee0107200c9f8fbf5ca312794d57d7c84858f6d02ac7044478a1ceaba80c756a581354e1c3bc0f39ab71266531e5c6b4d607559441a2a1492bc86146e4a205b0b8db310441cf08c043a775bb5e3a82dbc589f50c52e15266c634790cab6745980751ca698dbd91bc", 0x7f37) 03:20:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f00000000c0)=""/66) 03:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x80044942, 0x0) [ 576.727594][T17273] qfq: invalid max length 0 03:20:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400000c000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:26 executing program 2: pipe(&(0x7f0000000100)) epoll_create1(0x0) timerfd_create(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x7, &(0x7f0000ffd000/0x2000)=nil, 0x5) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 03:20:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0x80086301, 0x0) 03:20:27 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000010020000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:27 executing program 5: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file1\x00', 0x400000000010800, 0x1, &(0x7f0000000380)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6572726f72733d636f6e74690583eecb9a8e91200000000001000000666c414b19d4fc75652c000000"]) r1 = dup(r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000240)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_delrule={0x34, 0x21, 0x200, 0x70bd2f, 0x25dfdbfe, {0x2, 0x94, 0x20, 0x1, 0x0, 0x0, 0x0, 0x1, 0xa}, [@FRA_SRC={0x8, 0x2, @local}, @FRA_GENERIC_POLICY=@FRA_TABLE={0x8, 0xf, 0x2cf0}, @FRA_FLOW={0x8, 0xb, 0x7fff}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0xd5) 03:20:27 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e657520646566617550b65563726c7420757365723a73797a203034307019aa37f225c2065cb139689dcc52811a52053053bad3939724b71276151db1d0f003ad6231dc406ac793a504ca07c06315f890bdf432596b03b2b901b18a5d291542fe6e5d3db5456906e9db419d38e62033cba6e6e313d70ab2a99d3afa609251c670507ae39ad406dae81535cf185111d32367bef1e5f06b3d58d6bab270378a59888015c2c32aa6abbc10779b9bc29f336650a10000000000009842c8e868bb84390a425ed81f90db49d802d54541e4f8247236000000000d7339327134195110b749744142c76f7d34a004a67c46db8140f2a01781379d1b62ee7a361d6bec3b690da912071a48a26f1e8fc9aef02b7abfb5699d5d12dcc6bbe3f6f67a894032cc0c48db1397046c4603000000b01e5f0a5993fbccf373129d1691a0bd8600bdc3c4561ee9a8e932125ab53ec702c381ec917624340e651d489dca48e8436cc82b2292ac0255d7a650edc308ac15e30cf453ba43c0d22100000000caa0b1f24b11872aec2343a683dbc34e50187f08e14aa9ea7f0000000000000000214c7a06aeea7b287d78f2861b76b5"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x12}, 0x16, 0x4) 03:20:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xc004500a, 0x0) 03:20:27 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000018020000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 577.801081][T17309] FAT-fs (loop5): Unrecognized mount option "errors=contiƒîËšŽ‘ " or missing value 03:20:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000003c0)={0x9}, 0xfffffcef) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x4}, 0x8) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="80", 0x1, 0x0, 0x0, 0x0) 03:20:28 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x462a00, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x82a2, 0x2}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x7f, 0x955, 0x5, 0x7, 0x2}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000140)='\x00') connect$rose(r1, &(0x7f0000000180)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x1, @null}, 0x1c) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0)='ethtool\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003480)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000034c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f00000035c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000003580)={&(0x7f0000003500)={0x64, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x840}, 0x24048090) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000003600)=""/211) write(r1, &(0x7f0000003700)="2d323ac8369e7c8bd895abbcbded3f645a60158f2c5a5848387a2ad8", 0x1c) r8 = clone3(&(0x7f00000039c0)={0x80000000, &(0x7f0000003740), &(0x7f0000003780), &(0x7f00000037c0), {0x4}, &(0x7f0000003800)=""/171, 0xab, &(0x7f00000038c0)=""/135, &(0x7f0000003980)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x50) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40)=0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r10, &(0x7f0000003a80)={r0, r0, 0x10000}) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003b00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000003c00)={&(0x7f0000003ac0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000003bc0)={&(0x7f0000003b40)={0x70, r11, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x62}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000810}, 0x810) openat$ttynull(0xffffffffffffff9c, &(0x7f0000003c40)='/dev/ttynull\x00', 0x2, 0x0) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003c80)='/dev/sequencer2\x00', 0x4c00c0, 0x0) sendto$l2tp6(r12, &(0x7f0000003cc0)="2a0d25d18573f7b779c197408a1a2d499855a18caa8ba20bb52320117350b8d67360aa8ecdfe61af8e684e628504a1de715df2f8a6831ecf00c53ae6503dd9d0a730b83596f3822065ad76cd6dff54a00cf4d4472997cfb2590e1f88f36c37bb705292e4636c6ee61bd4076b824b58a29c3b0bb3671654a42b67199f96", 0x7d, 0x10, &(0x7f0000003d40)={0xa, 0x0, 0x401, @ipv4={[], [], @local}, 0x5}, 0x20) sendmsg$SOCK_DIAG_BY_FAMILY(r10, &(0x7f0000005240)={&(0x7f0000003d80)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000005200)={&(0x7f0000003dc0)={0x1438, 0x14, 0x300, 0x70bd25, 0x25dfdbfd, {0x3, 0x4}, [@INET_DIAG_REQ_BYTECODE={0x57, 0x1, "b71dca0c3b296a48af89890497de6bc262eb3abfc05f9be5c1d3dd4c0bd13a12f22a6876a81c69569b2db7784af4296922dbdd4a1a3062bd4116cf2742b60dd37c2fe36b45c014dc4b5b04f07d7847ae8c7dbc"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x9d, 0x1, "1eef2349d937cf3d5fffce3cbbeeba69447a49b8679755a0a2dbc2c2b5ffad6f86c75445ea4cb33a630cc7350953124386d62f5a39e13671961d8b370d9d26275db4688f99cc7d6aedc3107e2fbc9ac7741d1e4fab6c3e1b08b4e1f16d56b4d5bdbc2313d9751cf818c19da7ffc95565e4ab53564cf2844ee4b70dfa4a6125f4333e9dcde695db6b057e1f2d4c02e744bb888434be28621233"}, @INET_DIAG_REQ_BYTECODE={0xa0, 0x1, "5aebc98a170cd98eb5b20232d1e88dc22e39c878db3bed31a587d48b06ce2c7ce00ddaa92ab055a28a65edd6b107171db9f48aa8e5abecdd6e1cca62a954ada47417968d26bfbc3a32aa5c15919c5bcd58db54911f6f31f510ff4c7332ad2f9f3a6c24273b42886f1b75e115beeb8d12e070512fd1dc28e9b32fa336367558dd00c00e641da150f3915aeca0a91fe89b7a8b3b11136ef3c32232b399"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "6756f4428b08c92b03004e53e4423a28f9ef0b917e0d3e0a7b03ea8510820c39f04c1928d5b5826f97f4a20eb74ca531f34ea64249194b83124c66aa56a2b6657fb6e52ea84f8af10c2d5a64f1640581f8a9bb50d30d05be807f9fe4d25f62a477e4eda1943346e7d9af09d803860ad11d4765d0724dae671ab9f20d6687edf85de6747b2ca3f9b6152141388eb67375cc9181"}, @INET_DIAG_REQ_BYTECODE={0x3a, 0x1, "5fa24e9895c3faa9cf30b79da1660d2c7bb387b3b316d9d084e41cd7ba938645b9681caf3fdb12d2b5976363252d0c548b9964bbbaf5"}, @INET_DIAG_REQ_BYTECODE={0xd1, 0x1, "6e04278b217f77072e5a858e103603de7004f6c05078d036206508d35b131d8b111db7ea6e17b792865ad1bec3a041a912c0bd6b9ebed7fab392e3b96101bb5309bd586d5d70c7757e61294b43c84361bb6d3ed8b7bed84079c68682a8b3b17e75575e3259a9a2bc26d26c863939f3f5837c584b4855b9bc9a298c95d9efc76519e6a87d433bf78b18c2b9ea874287ce3dfbc9cfffae5c7e99d37fc3c6905adfaf3bfbc8cb1d608cd843c7f43121dbec6a667004c1b8bb63cb6b984bb43367ff7b87b0c30f6ba35d83e9b11299"}, @INET_DIAG_REQ_BYTECODE={0x60, 0x1, "6264aca536dd504c7fde8d591aafd4a7e84c08b7230e9ee063e790bdab8c6d95b816a1f5dfde78a48baef1849508ad01975a5ac6e19bc8d04d9065753d58d3f1fd3c299794c122e52e74bc23e14c8ccf586aa42575ab37fb95f91acf"}, @INET_DIAG_REQ_BYTECODE={0x7f, 0x1, "0b7285eb61af63de32d136b9110c309d4bee773420b60af5a3892b6e7f9f6d2b49fdd956efb2591c1ff12c15ea11740f2d17b6413ad5eba04903a510cf44fedc79923d36b20d7d99a72cb618b630f14d5618751e2e90e38a1c7bcf2f45eaa8cb97203ac640bca9f619c0950c4877ccb985bfde8ad3c4cbdcee6510"}]}, 0x1438}, 0x1, 0x0, 0x0, 0x840}, 0x11) r13 = syz_genetlink_get_family_id$SEG6(&(0x7f00000052c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f00000053c0)={&(0x7f0000005280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000005380)={&(0x7f0000005300)={0x50, r13, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x28}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000040) socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000005400)) 03:20:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000020000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:28 executing program 5: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8, 0x70b880) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x402002) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)=r2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) dup2(r0, r3) 03:20:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xc0045878, 0x0) 03:20:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xc0045878, 0x0) 03:20:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000038010000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:28 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x343a3af72dbab977, @perf_bp={0x0}, 0x200020100, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x800000}]}, 0x30}}, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="8da0250196f09c09c7e728d49230538d393e88d00380c12e076f8f47693b61dad5249011262c22d1fd57c6524c4f25a7d22c25c70c6cfeaf67f7ec2ad090f7e882a01c83a962e1e3ae8e29ec71f59811d4f8c104dceb9daf595779083863cca26b2d814f486166bf58777019c6411491b937251516a564859e41cf82463e89e46a4ee46a332f8364b0f7ac63ba3a"], &(0x7f00000006c0)='./file0\x00', &(0x7f0000000b00)='nfs\x00', 0x0, &(0x7f0000000000)) 03:20:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xc004ae02, 0x0) 03:20:28 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) 03:20:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000128bd7000ffdedf2504000000"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)='-\x00'}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$packet(0x11, 0x3, 0x300) dup(r6) r7 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r7}, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, 0x0, 0x0) r10 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r11) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000cc0)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYRESHEX], 0x1, 0x1) r12 = socket(0xa, 0x3, 0x8) r13 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r13, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) waitid(0x0, 0x0, 0x0, 0x2, 0x0) sendmsg$key(r12, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x20004850) memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r14 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) r15 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000", 0x7}, {0x0}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r15, 0x227d, &(0x7f0000000780)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, r14, 0x0, 0x100041) r16 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r14, r16, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r18, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@ipv6_delrule={0x34, 0x21, 0x0, 0x0, 0x0, {0xa, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_SRC={0x14, 0x2, @dev}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r18, 0x8901, &(0x7f0000000300)=r19) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x275a, 0x0) linkat(r20, &(0x7f0000000040)='\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r19, r20, 0x0, 0x12, &(0x7f0000000100)='cpuacct.usage_sys\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='U', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000180)='em1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r3, 0x0, 0xc, &(0x7f0000000140)='/dev/media#\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0xc) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000140)) r22 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000640), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0xb8575) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r22) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r22) 03:20:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400003f000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xc0189436, 0x0) 03:20:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xc020660b, 0x0) 03:20:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) bind(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}]}}) r3 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r3, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000100)={0x0, 0x2, 0x8000000, {0x6}, 0x1ff}) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x0, &(0x7f0000000240), 0x4) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:20:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000040000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xc0445624, 0x0) 03:20:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000048000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x2) 03:20:30 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400004c000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 580.638861][T17389] kvm: emulating exchange as write 03:20:30 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400005c0a0000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:30 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e657520646566617550b65563726c7420757365723a73797a203034307019aa37f225c2065cb139689dcc52811a52053053bad3939724b71276151db1d0f003ad6231dc406ac793a504ca07c06315f890bdf432596b03b2b901b18a5d291542fe6e5d3db5456906e9db419d38e62033cba6e6e313d70ab2a99d3afa609251c670507ae39ad406dae81535cf185111d32367bef1e5f06b3d58d6bab270378a59888015c2c32aa6abbc10779b9bc29f336650a10000000000009842c8e868bb84390a425ed81f90db49d802d54541e4f8247236000000000d7339327134195110b749744142c76f7d34a004a67c46db8140f2a01781379d1b62ee7a361d6bec3b690da912071a48a26f1e8fc9aef02b7abfb5699d5d12dcc6bbe3f6f67a894032cc0c48db1397046c4603000000b01e5f0a5993fbccf373129d1691a0bd8600bdc3c4561ee9a8e932125ab53ec702c381ec917624340e651d489dca48e8436cc82b2292ac0255d7a650edc308ac15e30cf453ba43c0d22100000000caa0b1f24b11872aec2343a683dbc34e50187f08e14aa9ea7f0000000000000000214c7a06aeea7b287d78f2861b76b5"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) 03:20:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc4c85513, &(0x7f00000000c0)) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$fb(r3, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 03:20:31 executing program 5: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) close(0xffffffffffffffff) pipe(&(0x7f0000000080)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0xece400ea, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) r2 = socket(0x1000000010, 0x0, 0x0) write(r2, &(0x7f0000000000)="220000002100070777d0000009000701020000090000000000200003050013800100", 0x22) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x0, 'batadv0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000240)) r3 = dup(r2) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100049d23000000040004200000000008000100c059dc22e3e1b021e70e82d727d2a4a0508c70eac74bd6cc4ca994952a435d44d1d7a09da552f35a706a8445481dd3542e3a3b90be9f9f45e6ee0300a623544104e0189fa4506c1660231023ec74392adb8a58b741666f7ce4bc1c8159fede79ac22084ef921cc071991b49bf176190e8c141b46ff57aefb2df4d32ad98a210dddd3b813aa3022695727f8bfe5895c8a2ab5a2317e0747af06b0778924ba54307c4d08505da74f31ea8454fc1bfc7a68a0feb4bcadfecc56e8f6634d", @ANYRES32=0x0, @ANYBLOB="d8a71929de78f72ff8", @ANYBLOB="08000400", @ANYBLOB="3016e71075835062cb9dd31a1949df8f63446105da60c68c02941ca8426efe40bf365d6175296162caeb63413f39ab77e4adb33ad684b078b43f7580cda29b1450b5966dd0aaf28c5e2aadd7421b544264ad4229"], 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000540)='./file0\x00', 0x1a005, 0x10c) r5 = openat$cgroup_procs(r4, 0x0, 0x2, 0x0) r6 = getpid() sched_getaffinity(r6, 0x8, &(0x7f00000000c0)) write$cgroup_pid(r5, &(0x7f00000002c0)=r6, 0x12) syz_open_procfs(r6, &(0x7f0000000100)='syscall\x00') socket(0x29, 0x3, 0x7) pipe(&(0x7f0000000300)) socket$inet_udp(0x2, 0x2, 0x0) 03:20:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x3) 03:20:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400005c8f0200, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x4) 03:20:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400005d0a0000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x2, 0x2, 0x0, 0x9}, {0x9, 0x3, 0x3, 0x6}, {0x7fff, 0x9, 0x61, 0x43}]}) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000), &(0x7f00000000c0)=0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x2000, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4, 0x8000}]}) 03:20:31 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 03:20:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x5) 03:20:31 executing program 2: creat(0x0, 0x0) open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_team\x00', &(0x7f0000000000)=ANY=[]}) fchdir(0xffffffffffffffff) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x2120}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x4, &(0x7f00000000c0)=0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) mmap$xdp(&(0x7f0000738000/0x2000)=nil, 0x2000, 0x0, 0x852, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={{}, 0x0, 0x8}) 03:20:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000060000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:31 executing program 5: perf_event_open(&(0x7f000025c000)={0x1000000002, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) open(&(0x7f0000000000)='./file0\x00', 0x801, 0xe) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="28000000020701030000000000000000000000008ab8a1274a706d5ae0eade382114000780080001"], 0x28}}, 0x0) 03:20:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x6) 03:20:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000060880300, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 582.276007][T17455] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 03:20:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x336) close(r0) 03:20:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x7) 03:20:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000064000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x8) 03:20:32 executing program 2: ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x5cbaecce2c75b182}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r3, &(0x7f0000000000)={0x18}, 0x18) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000100)={&(0x7f0000000080)=[0x0], 0x1}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000805, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x40000, 0x0, 0x48) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 03:20:33 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000068000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x300) 03:20:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400006c000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:33 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 03:20:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x500) 03:20:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000074000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x600) 03:20:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400007a000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:34 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e657520646566617550b65563726c7420757365723a73797a203034307019aa37f225c2065cb139689dcc52811a52053053bad3939724b71276151db1d0f003ad6231dc406ac793a504ca07c06315f890bdf432596b03b2b901b18a5d291542fe6e5d3db5456906e9db419d38e62033cba6e6e313d70ab2a99d3afa609251c670507ae39ad406dae81535cf185111d32367bef1e5f06b3d58d6bab270378a59888015c2c32aa6abbc10779b9bc29f336650a10000000000009842c8e868bb84390a425ed81f90db49d802d54541e4f8247236000000000d7339327134195110b749744142c76f7d34a004a67c46db8140f2a01781379d1b62ee7a361d6bec3b690da912071a48a26f1e8fc9aef02b7abfb5699d5d12dcc6bbe3f6f67a894032cc0c48db1397046c4603000000b01e5f0a5993fbccf373129d1691a0bd8600bdc3c4561ee9a8e932125ab53ec702c381ec917624340e651d489dca48e8436cc82b2292ac0255d7a650edc308ac15e30cf453ba43c0d22100000000caa0b1f24b11872aec2343a683dbc34e50187f08e14aa9ea7f0000000000000000214c7a06aeea7b287d78f2861b76b5"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x700) 03:20:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x400007f510100, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xff00) 03:20:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000a0004000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x4000a0) 03:20:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000e8020000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:35 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:35 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./control\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@gid={'gid', 0x3d, r5}}]}) setgid(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r2, &(0x7f00000000c0)='./file0\x00', r4, r7, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) 03:20:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000f0030000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x1000000) [ 585.749183][T17554] hfsplus: gid requires an argument 03:20:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x40000f6030000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x2000000) 03:20:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x38030000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x3000000) [ 586.317833][T17554] hfsplus: unable to parse mount options [ 586.404615][T17578] xt_CT: You must specify a L4 protocol and not use inversions on it [ 586.471015][T17582] xt_CT: You must specify a L4 protocol and not use inversions on it 03:20:36 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x4000000) [ 586.828197][T17594] xt_CT: You must specify a L4 protocol and not use inversions on it [ 586.858841][T17596] xt_CT: You must specify a L4 protocol and not use inversions on it 03:20:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) accept4(r1, &(0x7f0000000480)=@isdn, &(0x7f0000000040)=0x80, 0x0) socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x4, 0xc) socket$inet(0x10, 0x3, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) get_robust_list(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e27, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x7412c2, 0x174) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ftruncate(r5, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x80001d00c0d0) fsopen(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x27) 03:20:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ubi_ctrl\x00', 0x2, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r5 = socket(0x400000000010, 0x3, 0x0) write(r5, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) accept$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getpeername$packet(r13, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) bind$packet(r11, &(0x7f0000000080)={0x11, 0x0, r14}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_MASTER={0x8, 0x4, r10}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000380)={'batadv0\x00', r10}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002880)={&(0x7f00000003c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002800)=[{&(0x7f0000000480)=""/137, 0x89}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/89, 0x59}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/161, 0xa1}, {&(0x7f0000002740)=""/184, 0xb8}], 0x6}, 0x20) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000002980)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2c2136d1086abc63}, 0xc, &(0x7f0000002940)={&(0x7f00000028c0)={0x58, r4, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r16}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r17}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7fff, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x200, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8001, 0xffffffffffffffff}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4008800}, 0x4) write(r2, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) connect$caif(r2, &(0x7f0000000580)=@dgm={0x25, 0x800, 0x2}, 0x18) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r19, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r20, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r21], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r21}, [@IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000029c0)=ANY=[@ANYBLOB="2c0000001100210100000000000000000a000000", @ANYRES32=r21, @ANYBLOB="14000100d741c2e85fb39b2362827321923989885f78614d9307dab7b1f1e029419ec548cce9781544eca1846df06b88f2c752090db418cc817d3ab1e32ffb439884d6c8c1b5f2067aa61795509b630d35261c5acc2d4f94598c0d1b909f98c9bd3aee3b26557cb8df0cbfc1971e93a341a3c136dd98b99cb61ca03e40034dd874186178a163a554e9591a33450121845f9ad91e64ae78642755cefb15e154570b58a004edd7fea41c9a9329473ff7bebfcfadbe105bfb766414c53d0c95cdd5f156adc7db8313086dcbb6d3e69443883eb696da031d"], 0x2c}}, 0x0) 03:20:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x5a00000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x5000000) 03:20:37 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) [ 587.454084][T17607] xt_CT: You must specify a L4 protocol and not use inversions on it [ 587.466213][T17609] xt_CT: You must specify a L4 protocol and not use inversions on it 03:20:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9c03000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 587.506916][T17610] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 587.768685][T17610] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 03:20:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x6000000) [ 587.810207][T17621] xt_CT: You must specify a L4 protocol and not use inversions on it [ 587.879621][T17625] xt_CT: You must specify a L4 protocol and not use inversions on it [ 587.927365][T17605] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 03:20:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xff03000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 588.084385][T17610] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 03:20:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x7000000) [ 588.260889][T17637] xt_CT: You must specify a L4 protocol and not use inversions on it 03:20:38 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) [ 588.302242][T17616] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 588.322045][T17639] xt_CT: You must specify a L4 protocol and not use inversions on it [ 588.329458][T17605] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 03:20:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x2, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x8000000) 03:20:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x8}, 0x1) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\x8b\xaa\xffIb\x9e\xc1\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r3, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r4, 0x0, 0x2, &(0x7f0000000180)='c', 0x1) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket(0x400000000010, 0x3, 0x0) write(r6, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) r7 = socket(0x400000000010, 0x3, 0x0) write(r7, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) r8 = socket(0x400000000010, 0x3, 0x0) write(r8, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet6_opts(r8, 0x29, 0x37, 0x0, &(0x7f0000000100)) 03:20:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYBLOB="9e7e0a7ae7bb8a8614338e27877532956cf84925ea9f6edf5972f16f9e31e6d0a3d5fc431f11eaef475a1df6322a1cde89a38d382282d75a994dc18d398b5823a8a987ca2ad5cee08367729a0e52022f71c7f4451d92c08394afb62262c87c8c520fc6ab8b9cd050ea0fee600333", @ANYRES32=r1], 0x3}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 03:20:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xa0004000) 03:20:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x3, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:38 executing program 2: bind(0xffffffffffffffff, &(0x7f00000000c0)=@generic={0x0, "0072040000000000081044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a60e875f2e3ff5f163ee340b7679500800000000000000101033c5811039e15775027ecce66fd792bbf0e5b000000497400000000000000feac8e5ecc326d3a09ffc2c95400"}, 0x80) ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x2, &(0x7f0000000040)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000401d0080000000001c00006d5ebe5a0000ffff53ef", 0x3a, 0xa503}, {&(0x7f0000000140)="cd8ddf971c5ee7a4956859382b51326808dfdbe2e49a339b6084c024a63e407914e1a602f197cad2120ffd346e22d3388f540d2cef2cd8c7cad511c152fcd3063957e3e655e145801ec026bfebf3579131c5d694a7ae", 0x56, 0x1}], 0x4801, 0x0) 03:20:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xf5ffffff) 03:20:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x4, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 589.200882][T17667] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:20:39 executing program 5: sched_setscheduler(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) semget(0x3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200040, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, 0x0, 0x24004841) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000037000535d25a80648c63940d0124fc60100002400a000200050782c137153e370a02018003001700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r4 = accept(r3, &(0x7f0000000180)=@nfc_llcp, &(0x7f0000000240)=0x80) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r12}, 0x14) getsockname$packet(r9, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_MASTER={0x8, 0x4, r8}]}, 0x28}}, 0x0) r14 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r14, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r14, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, r5, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r15}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x40080}, 0x40000) getpid() 03:20:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xfeffffff) [ 589.380762][T17678] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 589.454316][T17682] netlink: zone id is out of range [ 589.460638][T17682] netlink: zone id is out of range [ 589.468245][T17682] netlink: zone id is out of range [ 589.474768][T17682] netlink: set zone limit has 4 unknown bytes [ 589.643206][T17682] netlink: zone id is out of range [ 589.648469][T17682] netlink: zone id is out of range [ 589.732775][T17682] netlink: zone id is out of range [ 589.771681][T17682] netlink: zone id is out of range [ 589.777150][T17682] netlink: set zone limit has 4 unknown bytes 03:20:39 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xff000000) 03:20:39 executing program 2: memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x100) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300f106df65b9c2d5b70ecb7bb480217784c3f4f496091a76ca759f352e4af142f708b822d1d465f2ad9f6e2aa9112b4d7482812615e4251890ab869b8c77507756fc8166ac76737c877a6c026619fc036b24365973ba948aa1a62e57fd50c58524ff5a28805d30b9d657138a1fd49b7ae49604f05609c3fc7cf254d3e653f23a3ed80864c800861466cda0f3d8f63b79a7ce89df5a3608d6d45b99748ebbb3766be550f963e398ef8bed3df80aad402fe6676c9114120a3a1f6258e188f40eb97f5ef2b27dda3d956a6f329a4d", @ANYRES32=r4], 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000700)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r9, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32], 0x38}}, 0x0) 03:20:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x5, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x3f, &(0x7f0000003dc0)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELRULE={0x0, 0x8, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x3}, [@NFTA_RULE_USERDATA={0x0, 0x7, 0x1, 0x0, "d4d5aa89f4bec28a149e725906491c50c717fa4447f9e0e9e4d60185784672e91d305839dd77b5b8de5082391cd1553252f76e140d9d002976558108fb63a0d110422b4531efe53d8f898e16a9aa581d2aeee4e8993079febb30fe4dadadcea909584d2c5402044ff3305684"}, @NFTA_RULE_POSITION_ID, @NFTA_RULE_TABLE={0x0, 0x1, 'syz0\x00'}, @NFTA_RULE_COMPAT={0x0, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_FLAGS, @NFTA_RULE_COMPAT_FLAGS, @NFTA_RULE_COMPAT_FLAGS, @NFTA_RULE_COMPAT_FLAGS={0x0, 0x2, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_FLAGS, @NFTA_RULE_COMPAT_PROTO_IPV4={0x0, 0x1, 0x1, 0x0, 0x88}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x0, 0x1, 0x1, 0x0, 0x2e}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x0, 0x1, 0x1, 0x0, 0x32}, @NFTA_RULE_COMPAT_FLAGS]}, @NFTA_RULE_HANDLE={0x0, 0x3, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELTABLE={0x28, 0x2, 0xa, 0x9, 0x0, 0x0, {0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc}]}], {0x14}}, 0x70}}, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x54, 0x8, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008000}, 0x4010021) signalfd(r1, &(0x7f0000000000)={[0x9]}, 0x8) 03:20:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x6, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xfffffff5) 03:20:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x2c4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000080000002d0301000000000095000000000000006926000000000000bf67000000000000150600000fff52004507000002ffffffd50600000ee60000bf050000000000001f63000000000000650700000200002007e8ffff4b0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500"/176], &(0x7f0000000100)='GPL\x00'}, 0x48) 03:20:40 executing program 2: unlink(0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@barrier='barrier'}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x4, 0x7, 0x3ff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a70, 0x6, [], @value64=0x1}}) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000140)={0x0, 0x0, {0x28b280c, 0x7fff, 0x2018, 0x1, 0x9, 0x7, 0x0, 0x4}}) 03:20:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x7, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xfffffffe) 03:20:40 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$llc_int(r0, 0x10c, 0x0, 0x0, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000000)) [ 590.591118][T17723] hfsplus: unable to find HFS+ superblock 03:20:41 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x8, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x1000000000000) 03:20:41 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x19c, 0x1, 0x3, 0x201, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFQA_VLAN={0xc, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}]}, @NFQA_VLAN={0x14, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x7f}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}]}, @NFQA_CT={0x160, 0xb, 0x0, 0x1, [@CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'syz1\x00'}}, @CTA_TUPLE_MASTER={0x40, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_PROTOINFO={0x40, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x3c, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x8d}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x5f}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x72}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x3}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x0, 0x77}}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x6}]}}, @CTA_TUPLE_ORIG={0x90, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @rand_addr="9302cf69d939bd8e82cf54f51b3ec259"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}]}, @CTA_NAT_SRC={0x34, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}, @CTA_NAT_V4_MINIP={0x8, 0x1, @multicast1}, @CTA_NAT_V6_MINIP={0x14, 0x4, @ipv4={[], [], @rand_addr=0xfff}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}]}, @CTA_ID={0x8}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x5}]}, 0x19c}, 0x1, 0x0, 0x0, 0x3}, 0xc084) r3 = socket$netlink(0x10, 0x3, 0x80000000004) write(r3, &(0x7f000058bfe4)="29000000140003b7ff00000004bd60eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 03:20:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000540)={0x1, 0x3, 0x4, 0x10000, 0x8, {}, {0x5, 0x2, 0x0, 0xd9, 0x16, 0x3, "3595235d"}, 0x7, 0x2, @planes=&(0x7f0000000480)={0x3, 0x2, @userptr=0x10000, 0x1}, 0x8000, 0x0, r0}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SG_GET_REQUEST_TABLE(r4, 0x2286, &(0x7f0000000280)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x30, r3, 0x300, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x2, 0x7, 0xac}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x82) r5 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x42100, 0x0) io_submit(r1, 0x2, &(0x7f0000000500)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x0, r5, &(0x7f00000000c0)}]) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r7, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$SG_GET_SG_TABLESIZE(r7, 0x227f, &(0x7f0000000040)) 03:20:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0xa, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x4000a0ffffffff) 03:20:41 executing program 2: getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6, 0x7}, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010001fff000000000000000000000400", @ANYRES32=0x0, @ANYBLOB="ff7f000080000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c86", @ANYRES32, @ANYBLOB="ff07000000000000"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002000)=[{0x0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5f00fe01b2a4a28093020600010001fd01020000003900090035000c00060000001900054006000000000022dc1338d54400009b84136ef75afb83de4411000b00c43ab8220000060cec4fab91d4", 0x55}], 0x1, 0x0, 0x356}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400002, 0x0) r6 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$chown(0x4, 0x0, 0x0, r7) write$FUSE_ATTR(r5, &(0x7f0000000040)={0x78, 0x0, 0x8, {0x2, 0x5a, 0x0, {0x4, 0x4, 0x6, 0x6, 0x80, 0x0, 0x200, 0xff, 0x8, 0x3f, 0x45f, r6, r7, 0x9, 0x3}}}, 0x78) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x0, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r8, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x7f) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r9}, 0x10, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=0x7530, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="030000400100000003000000390000003eb5029e3143b1a48524fc81a38c0d0ef8e592c13291ec52d3ae545109b2a7aee1e872e42445d0a32defef0000d383147c3209ac31308bd659cd3a0801d1c2b06cfad61e3764f89f2bfc9a6855e8962ac4f71d6973034bc7a06edd502d9e61503e0535c9edb4a5fd5519a38d55de8236476b4ef64193cebf5d406ad5647822e46e1457d62367c817e1c578977a7379d97f127e2fe3515b7a24906f7895bc20271a8c"], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x120d60e92a10a90a) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)) 03:20:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x1, 0x0) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000fea000/0x14000)=nil, 0x80000001, 0x0, 0x12, &(0x7f0000fef000/0x1000)=nil, 0x1}) r2 = socket(0x400000000010, 0x3, 0x0) statx(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x6000, 0x100, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x3, &(0x7f0000000600)=[{&(0x7f0000000380)="65a1a0b79e3fb5a889d997ec02963266bba7337579c0e947a2c080afb704cdc048f89a1c165913b1ce", 0x29, 0x3}, {&(0x7f0000000400)="8404249ee0adf48670cdd4d6d37adb76de233bef0bc7e49c54fae9cd58dda8a459732fdcd4ad66044223d68e5d192a2fc1d92f6861e76c08dce1511d37b4ce6b32822e0f666738ca0d5d8408ed40d07a2d2f10be4a42afa56225443987a112cb3f0b771f4bea7cdb55db6a868b9511d4d930b0c821e7f9146ab0258a002bce54d4a1a2aa84372935c362b6ecdb2804775be823201790a851d350377b97d6f80e8ff211ccd69fb1c71d4176624a8b4417b9a4b9d1881204b834b89587d290d4ed55a611f4a9d7867f043a9311a37b859ea5d7548d7e816d62aa38a9f9bf29b5466e4f", 0xe2, 0xffad}, {&(0x7f0000000500)="70fe5511697e8687821c4948b361242badcf90e5fb9f50f841003a09e7008759f89c10a8e743d7bcd81473a5b9b0860a93fd650ee894cbf0bb61f56cf9d3b87a6c52c0b1262cc01e4ccb3a48c6de542c00b3807232d936b0162db8c66686af3d0d8ebbb3b00f69f08cfdfc47d28e6135b9675b0ea4f218534f4b2ab831f43d9bcba8ce597ec011a20d6cfb9b867d742ccec08b5b70917e39c7a10d288b8d2f30eb653f294f4e284df14a578223ee5e3018bac361eb913fde813c4b5ea969fc99f3a3608f3547bdc4fbeb3d3ef3d114e9ed6c9232325811e16fac3185a532201f0c704a", 0xe3, 0x6}], 0xa00002, &(0x7f0000000880)=ANY=[@ANYBLOB='huge=within_size=/proc/locks\x00,mpol=local=static:-1,/-6556,gid=', @ANYRESHEX=r3, @ANYBLOB=',huge=within_size=}cgroup,huge=never=/proc/locks\x00,uid>', @ANYRESDEC=r4, @ANYBLOB="2c2f467f4a94fee038eb9f24a2fe736d"]) write(r2, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14100100100f0504e1000c0800160000000000", 0x24) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000200)={@multicast1, @multicast1}, &(0x7f0000000240)=0x8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) preadv(r5, &(0x7f00000018c0)=[{&(0x7f0000000140)=""/133, 0x7f}], 0x3a, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/locks\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/locks\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 03:20:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0xb, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x100000000000000) 03:20:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x200000000000000) [ 591.967947][T17776] tmpfs: Bad value for 'huge' 03:20:42 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e657520646566617550b65563726c7420757365723a73797a203034307019aa37f225c2065cb139689dcc52811a52053053bad3939724b71276151db1d0f003ad6231dc406ac793a504ca07c06315f890bdf432596b03b2b901b18a5d291542fe6e5d3db5456906e9db419d38e62033cba6e6e313d70ab2a99d3afa609251c670507ae39ad406dae81535cf185111d32367bef1e5f06b3d58d6bab270378a59888015c2c32aa6abbc10779b9bc29f336650a10000000000009842c8e868bb84390a425ed81f90db49d802d54541e4f8247236000000000d7339327134195110b749744142c76f7d34a004a67c46db8140f2a01781379d1b62ee7a361d6bec3b690da912071a48a26f1e8fc9aef02b7abfb5699d5d12dcc6bbe3f6f67a894032cc0c48db1397046c4603000000b01e5f0a5993fbccf373129d1691a0bd8600bdc3c4561ee9a8e932125ab53ec702c381ec917624340e651d489dca48e8436cc82b2292ac0255d7a650edc308ac15e30cf453ba43c0d22100000000caa0b1f24b11872aec2343a683dbc34e50187f08e14aa9ea7f0000000000000000214c7a06aeea7b287d78f2861b76b5"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(0xffffffffffffffff, r4, 0x0) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0xc, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x300000000000000) 03:20:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0xd, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x400000000000000) 03:20:42 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x80000006}]}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000420007031dfffd946f610500070003001d02000000000000248fa3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:20:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0xf, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x500000000000000) 03:20:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_genetlink_get_family_id$tipc2(0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000100)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) capget(&(0x7f0000000200)={0x19980330, r1}, &(0x7f0000000240)={0x5, 0x7fff, 0x166480ca, 0x3, 0x4, 0x1}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x0, 0x6, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) [ 592.761635][T17817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:20:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x10, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 593.082158][T17831] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 03:20:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x11, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x600000000000000) 03:20:43 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(0xffffffffffffffff, r4, 0x0) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) [ 593.421487][T17849] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:20:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x12, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x700000000000000) 03:20:43 executing program 5: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x3, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000000100)=0x3, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x401, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r2, 0x80045518, &(0x7f0000000080)) gettid() fsync(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r4}, 0xc) setsockopt$sock_attach_bpf(r0, 0x10d, 0xa, &(0x7f0000000000)=r5, 0x4) socket$kcm(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f00000005c0)={0x0, 0x3, 0x0, 0x20, 0x100000001, 0x0, 0x8}) 03:20:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2fd165762f6d643000edffb1388e4f4eb227f0c38fcd35417b4738857d60ade021a9edbbe95687c8647dc75beadb0b350e7bfc09786e7c201df2c6d33e192fa356e687d06bd712b87474281850351ebd10d890c743ce8b6d1caf761d0be66c63894ad1be190030975c2e3e7f0000070000357a8c577a77839f127f09dd8005a52d043152216267eb31cdbffb315fe5143bededa30bfb4210f956bd201808ee4b27122eb2cc4912f38bf456c327d6ccb38dc02473d2fd9755729eeede5d"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='ext4\x00', 0x1840240, 0x0) sync() 03:20:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x800000000000000) 03:20:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x13, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x14, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:44 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(0xffffffffffffffff, r4, 0x0) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xf5ffffff00000000) 03:20:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x15, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x4000201f, 0x3f000002}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000040)) close(r2) chdir(&(0x7f0000000000)='./file0\x00') syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0}, 0x200008c1) 03:20:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xfeffffff00000000) 03:20:44 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @hyper}, 0x10) unshare(0x40000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000000c0)={r2, 0x2}) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 03:20:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x16, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xff00000000000000) 03:20:44 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e657520646566617550b65563726c7420757365723a73797a203034307019aa37f225c2065cb139689dcc52811a52053053bad3939724b71276151db1d0f003ad6231dc406ac793a504ca07c06315f890bdf432596b03b2b901b18a5d291542fe6e5d3db5456906e9db419d38e62033cba6e6e313d70ab2a99d3afa609251c670507ae39ad406dae81535cf185111d32367bef1e5f06b3d58d6bab270378a59888015c2c32aa6abbc10779b9bc29f336650a10000000000009842c8e868bb84390a425ed81f90db49d802d54541e4f8247236000000000d7339327134195110b749744142c76f7d34a004a67c46db8140f2a01781379d1b62ee7a361d6bec3b690da912071a48a26f1e8fc9aef02b7abfb5699d5d12dcc6bbe3f6f67a894032cc0c48db1397046c4603000000b01e5f0a5993fbccf373129d1691a0bd8600bdc3c4561ee9a8e932125ab53ec702c381ec917624340e651d489dca48e8436cc82b2292ac0255d7a650edc308ac15e30cf453ba43c0d22100000000caa0b1f24b11872aec2343a683dbc34e50187f08e14aa9ea7f0000000000000000214c7a06aeea7b287d78f2861b76b5"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) [ 594.887174][T17904] IPVS: ftp: loaded support on port[0] = 21 03:20:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x17, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0c03b5055e0bcfe847a071") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000002880)='ns/mnt\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0xffffffffa0004000) 03:20:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x18, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x19, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:45 executing program 2: utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2600000080"]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'ip6gretap0\x00', &(0x7f0000000140)=@ethtool_drvinfo={0x3, "7096cea0e4883be8f4f50bc65fce83f6e7ae4c2c3105e193ae3c7183c7ba8e25", "b18afd1a1ed517589de91cea23023ff84a8748b9eff17805b762e33214523070", "5c4eb5d1209a67dc627dea9821d2ffc34aa017f789e618aa44b86933d5f1ddcd", "968da94e5436459537b0f622054f689fb3b6640e62004f404c101a4bf08402f7", "6e5caf3466416eaafa9277299e86cca46d7492308de7b0b60be13446fa327f50", "646b8af3240d0451d5d86b4f", 0x8, 0x1, 0x54, 0x101, 0x7fff}}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x18, 0x3, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x3c) 03:20:45 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="6e657520646566617550b65563726c7420757365723a73797a203034307019aa37f225c2065cb139689dcc52811a52053053bad3939724b71276151db1d0f003ad6231dc406ac793a504ca07c06315f890bdf432596b03b2b901b18a5d291542fe6e5d3db5456906e9db419d38e62033cba6e6e313d70ab2a99d3afa609251c670507ae39ad406dae81535cf185111d32367bef1e5f06b3d58d6bab270378a59888015c2c32aa6abbc10779b9bc29f336650a10000000000009842c8e868bb84390a425ed81f90db49d802d54541e4f8247236000000000d7339327134195110b749744142c76f7d34a004a67c46db8140f2a01781379d1b62ee7a361d6bec3b690da912071a48a26f1e8fc9aef02b7abfb5699d5d12dcc6bbe3f6f67a894032cc0c48db1397046c4603000000b01e5f0a5993fbccf373129d1691a0bd8600bdc3c4561ee9a8e932125ab53ec702c381ec917624340e651d489dca48e8436cc82b2292ac0255d7a650edc308ac15e30cf453ba43c0d22100000000caa0b1f24b11872aec2343a683dbc34e50187f08e14aa9ea7f0000000000000000214c7a06aeea7b287d78f2861b76b5"], 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x2, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x97ba, 0xa4000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'none\x00', 0x17, 0x1f, 0x5b}, 0x8b) dup3(r1, 0xffffffffffffffff, 0x80000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:20:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x21, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) 03:20:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x22, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a8, 0x138, 0x138, 0x138, 0x138, 0x138, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_virt_wifi\x00', 'syzkaller1\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x1}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'syzkaller0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) [ 596.654188][T17959] IPVS: ftp: loaded support on port[0] = 21 [ 597.508934][T15648] tipc: TX() has been purged, node left! [ 627.592979][ T0] NOHZ: local_softirq_pending 08 [ 646.152382][ T0] NOHZ: local_softirq_pending 08 [ 646.791794][ T0] NOHZ: local_softirq_pending 08 [ 668.555017][ T0] NOHZ: local_softirq_pending 08 [ 685.832257][ T0] NOHZ: local_softirq_pending 08 [ 686.474747][ T0] NOHZ: local_softirq_pending 08 [ 706.953648][ T0] NOHZ: local_softirq_pending 08 [ 726.793496][ T0] NOHZ: local_softirq_pending 08 [ 727.432418][ T0] NOHZ: local_softirq_pending 08 [ 728.073550][ T0] NOHZ: local_softirq_pending 08 [ 745.351253][ T1080] INFO: task syz-executor.5:17904 can't die for more than 143 seconds. [ 745.359592][ T1080] syz-executor.5 D27160 17904 10722 0x00000004 [ 745.368213][ T1080] Call Trace: [ 745.371733][ T1080] __schedule+0x934/0x1f90 [ 745.376173][ T1080] ? firmware_map_remove+0x1a3/0x1a3 [ 745.385607][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 745.391084][ T1080] ? __lock_sock+0x160/0x290 [ 745.395722][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 745.400922][ T1080] schedule+0xdc/0x2b0 [ 745.405042][ T1080] __lock_sock+0x165/0x290 [ 745.409711][ T1080] ? __sk_dst_check+0x2e0/0x2e0 [ 745.414746][ T1080] ? finish_wait+0x260/0x260 [ 745.420059][ T1080] lock_sock_nested+0xfe/0x120 [ 745.425118][ T1080] vsock_stream_setsockopt+0x101/0x560 [ 745.430616][ T1080] ? vsock_stream_getsockopt+0x3c0/0x3c0 [ 745.438374][ T1080] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 745.444253][ T1080] ? apparmor_socket_setsockopt+0x22/0x30 [ 745.450000][ T1080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.456464][ T1080] ? security_socket_setsockopt+0x8d/0xc0 [ 745.462415][ T1080] __sys_setsockopt+0x261/0x4c0 [ 745.468231][ T1080] ? sock_create_kern+0x50/0x50 [ 745.474158][ T1080] ? __x64_sys_futex+0x404/0x590 [ 745.479200][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 745.484788][ T1080] ? do_syscall_64+0x26/0x790 [ 745.489538][ T1080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.495868][ T1080] ? do_syscall_64+0x26/0x790 [ 745.500828][ T1080] __x64_sys_setsockopt+0xbe/0x150 [ 745.505991][ T1080] do_syscall_64+0xfa/0x790 [ 745.510512][ T1080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.516581][ T1080] RIP: 0033:0x45c479 [ 745.520491][ T1080] Code: 15 08 c5 01 48 89 04 24 48 8d 44 24 28 48 89 44 24 08 e8 ea 87 fa ff 48 8d 7c 24 78 0f 57 c0 48 8d 7f d0 48 89 6c 24 f0 48 8d <6c> 24 f0 e8 d4 33 00 00 48 8b 6d 00 48 c7 44 24 38 00 00 00 00 66 [ 745.540241][ T1080] RSP: 002b:00007f370dddac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 745.549969][ T1080] RAX: ffffffffffffffda RBX: 00007f370dddb6d4 RCX: 000000000045c479 [ 745.558191][ T1080] RDX: 0000000000000002 RSI: 0000000000000028 RDI: 0000000000000003 [ 745.567243][ T1080] RBP: 000000000076bf20 R08: 0000000000000008 R09: 0000000000000000 [ 745.575386][ T1080] R10: 0000000020000200 R11: 0000000000000246 R12: 00000000ffffffff [ 745.583439][ T1080] R13: 0000000000000a5a R14: 00000000004d5df8 R15: 000000000076bf2c [ 745.591785][ T1080] INFO: task syz-executor.5:17904 blocked for more than 143 seconds. [ 745.599880][ T1080] Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 745.606989][ T1080] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 745.615755][ T1080] syz-executor.5 D27160 17904 10722 0x00000004 [ 745.622199][ T1080] Call Trace: [ 745.625527][ T1080] __schedule+0x934/0x1f90 [ 745.630025][ T1080] ? firmware_map_remove+0x1a3/0x1a3 [ 745.635515][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 745.640921][ T1080] ? __lock_sock+0x160/0x290 [ 745.645531][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 745.650562][ T1080] schedule+0xdc/0x2b0 [ 745.656108][ T1080] __lock_sock+0x165/0x290 [ 745.660579][ T1080] ? __sk_dst_check+0x2e0/0x2e0 [ 745.665628][ T1080] ? finish_wait+0x260/0x260 [ 745.670314][ T1080] lock_sock_nested+0xfe/0x120 [ 745.675260][ T1080] vsock_stream_setsockopt+0x101/0x560 [ 745.680785][ T1080] ? vsock_stream_getsockopt+0x3c0/0x3c0 [ 745.686466][ T1080] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 745.692142][ T1080] ? apparmor_socket_setsockopt+0x22/0x30 [ 745.697979][ T1080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.704351][ T1080] ? security_socket_setsockopt+0x8d/0xc0 [ 745.710157][ T1080] __sys_setsockopt+0x261/0x4c0 [ 745.715090][ T1080] ? sock_create_kern+0x50/0x50 [ 745.720120][ T1080] ? __x64_sys_futex+0x404/0x590 [ 745.725204][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 745.730809][ T1080] ? do_syscall_64+0x26/0x790 [ 745.735535][ T1080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.741758][ T1080] ? do_syscall_64+0x26/0x790 [ 745.746500][ T1080] __x64_sys_setsockopt+0xbe/0x150 [ 745.751791][ T1080] do_syscall_64+0xfa/0x790 [ 745.756331][ T1080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.764174][ T1080] RIP: 0033:0x45c479 [ 745.768107][ T1080] Code: 15 08 c5 01 48 89 04 24 48 8d 44 24 28 48 89 44 24 08 e8 ea 87 fa ff 48 8d 7c 24 78 0f 57 c0 48 8d 7f d0 48 89 6c 24 f0 48 8d <6c> 24 f0 e8 d4 33 00 00 48 8b 6d 00 48 c7 44 24 38 00 00 00 00 66 [ 745.787974][ T1080] RSP: 002b:00007f370dddac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 745.796480][ T1080] RAX: ffffffffffffffda RBX: 00007f370dddb6d4 RCX: 000000000045c479 [ 745.804609][ T1080] RDX: 0000000000000002 RSI: 0000000000000028 RDI: 0000000000000003 [ 745.812662][ T1080] RBP: 000000000076bf20 R08: 0000000000000008 R09: 0000000000000000 [ 745.820765][ T1080] R10: 0000000020000200 R11: 0000000000000246 R12: 00000000ffffffff [ 745.828764][ T1080] R13: 0000000000000a5a R14: 00000000004d5df8 R15: 000000000076bf2c [ 745.837314][ T1080] INFO: task syz-executor.5:17906 can't die for more than 143 seconds. [ 745.845924][ T1080] syz-executor.5 D28472 17906 10722 0x00000004 [ 745.852354][ T1080] Call Trace: [ 745.855675][ T1080] __schedule+0x934/0x1f90 [ 745.860123][ T1080] ? firmware_map_remove+0x1a3/0x1a3 [ 745.865515][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 745.871954][ T1080] ? __lock_sock+0x160/0x290 [ 745.876574][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 745.881801][ T1080] schedule+0xdc/0x2b0 [ 745.885938][ T1080] __lock_sock+0x165/0x290 [ 745.890411][ T1080] ? __sk_dst_check+0x2e0/0x2e0 [ 745.895457][ T1080] ? finish_wait+0x260/0x260 [ 745.900146][ T1080] lock_sock_nested+0xfe/0x120 [ 745.905069][ T1080] virtio_transport_release+0xc4/0xd60 [ 745.910598][ T1080] ? virtio_transport_close_timeout+0x220/0x220 [ 745.918111][ T1080] ? rcu_read_lock_held+0x9c/0xb0 [ 745.923825][ T1080] ? __kasan_check_read+0x11/0x20 [ 745.928903][ T1080] vsock_assign_transport+0xf3/0x3b0 [ 745.935104][ T1080] vsock_stream_connect+0x2b3/0xc70 [ 745.940928][ T1080] ? tomoyo_socket_listen_permission+0x3b0/0x3b0 [ 745.948105][ T1080] ? vsock_dgram_connect+0x470/0x470 [ 745.953628][ T1080] ? finish_wait+0x260/0x260 [ 745.958283][ T1080] ? apparmor_socket_connect+0xb6/0x160 [ 745.963925][ T1080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.970261][ T1080] __sys_connect_file+0x161/0x1c0 [ 745.975381][ T1080] ? move_addr_to_kernel.part.0+0xcd/0x110 [ 745.983233][ T1080] __sys_connect+0x174/0x1b0 [ 745.987897][ T1080] ? __sys_connect_file+0x1c0/0x1c0 [ 745.994775][ T1080] ? __x64_sys_futex+0x404/0x590 [ 745.999822][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.005429][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.010991][ T1080] ? do_syscall_64+0x26/0x790 [ 746.015704][ T1080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.021919][ T1080] ? do_syscall_64+0x26/0x790 [ 746.026654][ T1080] __x64_sys_connect+0x73/0xb0 [ 746.031631][ T1080] do_syscall_64+0xfa/0x790 [ 746.036187][ T1080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.042151][ T1080] RIP: 0033:0x45c479 [ 746.046113][ T1080] Code: 15 08 c5 01 48 89 04 24 48 8d 44 24 28 48 89 44 24 08 e8 ea 87 fa ff 48 8d 7c 24 78 0f 57 c0 48 8d 7f d0 48 89 6c 24 f0 48 8d <6c> 24 f0 e8 d4 33 00 00 48 8b 6d 00 48 c7 44 24 38 00 00 00 00 66 [ 746.065921][ T1080] RSP: 002b:00007f370ddb9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 746.074518][ T1080] RAX: ffffffffffffffda RBX: 00007f370ddba6d4 RCX: 000000000045c479 [ 746.082661][ T1080] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 746.090737][ T1080] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 746.098850][ T1080] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 746.108154][ T1080] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bfcc [ 746.116267][ T1080] INFO: task syz-executor.5:17906 blocked for more than 144 seconds. [ 746.124441][ T1080] Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 746.131578][ T1080] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 746.140277][ T1080] syz-executor.5 D28472 17906 10722 0x00000004 [ 746.146761][ T1080] Call Trace: [ 746.150130][ T1080] __schedule+0x934/0x1f90 [ 746.154662][ T1080] ? firmware_map_remove+0x1a3/0x1a3 [ 746.159991][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 746.165417][ T1080] ? __lock_sock+0x160/0x290 [ 746.170052][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 746.175188][ T1080] schedule+0xdc/0x2b0 [ 746.179320][ T1080] __lock_sock+0x165/0x290 [ 746.183882][ T1080] ? __sk_dst_check+0x2e0/0x2e0 [ 746.188890][ T1080] ? finish_wait+0x260/0x260 [ 746.193611][ T1080] lock_sock_nested+0xfe/0x120 [ 746.198432][ T1080] virtio_transport_release+0xc4/0xd60 [ 746.204033][ T1080] ? virtio_transport_close_timeout+0x220/0x220 [ 746.210330][ T1080] ? rcu_read_lock_held+0x9c/0xb0 [ 746.216766][ T1080] ? __kasan_check_read+0x11/0x20 [ 746.221948][ T1080] vsock_assign_transport+0xf3/0x3b0 [ 746.227277][ T1080] vsock_stream_connect+0x2b3/0xc70 [ 746.232635][ T1080] ? tomoyo_socket_listen_permission+0x3b0/0x3b0 [ 746.238996][ T1080] ? vsock_dgram_connect+0x470/0x470 [ 746.244411][ T1080] ? finish_wait+0x260/0x260 [ 746.249043][ T1080] ? apparmor_socket_connect+0xb6/0x160 [ 746.254742][ T1080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.261092][ T1080] __sys_connect_file+0x161/0x1c0 [ 746.266130][ T1080] ? move_addr_to_kernel.part.0+0xcd/0x110 [ 746.272058][ T1080] __sys_connect+0x174/0x1b0 [ 746.276667][ T1080] ? __sys_connect_file+0x1c0/0x1c0 [ 746.281988][ T1080] ? __x64_sys_futex+0x404/0x590 [ 746.287024][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.292609][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.298285][ T1080] ? do_syscall_64+0x26/0x790 [ 746.303108][ T1080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.309274][ T1080] ? do_syscall_64+0x26/0x790 [ 746.314064][ T1080] __x64_sys_connect+0x73/0xb0 [ 746.318883][ T1080] do_syscall_64+0xfa/0x790 [ 746.325003][ T1080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.331013][ T1080] RIP: 0033:0x45c479 [ 746.334949][ T1080] Code: 15 08 c5 01 48 89 04 24 48 8d 44 24 28 48 89 44 24 08 e8 ea 87 fa ff 48 8d 7c 24 78 0f 57 c0 48 8d 7f d0 48 89 6c 24 f0 48 8d <6c> 24 f0 e8 d4 33 00 00 48 8b 6d 00 48 c7 44 24 38 00 00 00 00 66 [ 746.354802][ T1080] RSP: 002b:00007f370ddb9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 746.363297][ T1080] RAX: ffffffffffffffda RBX: 00007f370ddba6d4 RCX: 000000000045c479 [ 746.371404][ T1080] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 746.379399][ T1080] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 746.387600][ T1080] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 746.395961][ T1080] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076bfcc [ 746.404117][ T1080] INFO: task syz-executor.5:17962 can't die for more than 144 seconds. [ 746.412436][ T1080] syz-executor.5 D29680 17962 10722 0x00000004 [ 746.418809][ T1080] Call Trace: [ 746.422237][ T1080] __schedule+0x934/0x1f90 [ 746.426694][ T1080] ? firmware_map_remove+0x1a3/0x1a3 [ 746.433825][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 746.439145][ T1080] ? __lock_sock+0x160/0x290 [ 746.443815][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 746.448929][ T1080] schedule+0xdc/0x2b0 [ 746.453081][ T1080] __lock_sock+0x165/0x290 [ 746.457520][ T1080] ? __sk_dst_check+0x2e0/0x2e0 [ 746.462474][ T1080] ? finish_wait+0x260/0x260 [ 746.467100][ T1080] lock_sock_nested+0xfe/0x120 [ 746.472187][ T1080] virtio_transport_release+0xc4/0xd60 [ 746.477856][ T1080] ? virtio_transport_close_timeout+0x220/0x220 [ 746.484223][ T1080] ? rcu_read_lock_held+0x9c/0xb0 [ 746.489273][ T1080] ? __kasan_check_read+0x11/0x20 [ 746.494428][ T1080] vsock_assign_transport+0xf3/0x3b0 [ 746.499784][ T1080] vsock_stream_connect+0x2b3/0xc70 [ 746.505055][ T1080] ? tomoyo_socket_listen_permission+0x3b0/0x3b0 [ 746.511518][ T1080] ? vsock_dgram_connect+0x470/0x470 [ 746.516832][ T1080] ? finish_wait+0x260/0x260 [ 746.521489][ T1080] ? apparmor_socket_connect+0xb6/0x160 [ 746.527092][ T1080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.533429][ T1080] __sys_connect_file+0x161/0x1c0 [ 746.538519][ T1080] ? move_addr_to_kernel.part.0+0xcd/0x110 [ 746.545623][ T1080] __sys_connect+0x174/0x1b0 [ 746.550243][ T1080] ? __sys_connect_file+0x1c0/0x1c0 [ 746.556809][ T1080] ? __x64_sys_futex+0x404/0x590 [ 746.561909][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.567401][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.572932][ T1080] ? do_syscall_64+0x26/0x790 [ 746.577634][ T1080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.583771][ T1080] ? do_syscall_64+0x26/0x790 [ 746.588465][ T1080] __x64_sys_connect+0x73/0xb0 [ 746.593314][ T1080] do_syscall_64+0xfa/0x790 [ 746.597832][ T1080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.603859][ T1080] RIP: 0033:0x45c479 [ 746.607781][ T1080] Code: 15 08 c5 01 48 89 04 24 48 8d 44 24 28 48 89 44 24 08 e8 ea 87 fa ff 48 8d 7c 24 78 0f 57 c0 48 8d 7f d0 48 89 6c 24 f0 48 8d <6c> 24 f0 e8 d4 33 00 00 48 8b 6d 00 48 c7 44 24 38 00 00 00 00 66 [ 746.627583][ T1080] RSP: 002b:00007f370dd56c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 746.636185][ T1080] RAX: ffffffffffffffda RBX: 00007f370dd576d4 RCX: 000000000045c479 [ 746.644341][ T1080] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 746.654313][ T1080] RBP: 000000000076c1a0 R08: 0000000000000000 R09: 0000000000000000 [ 746.662409][ T1080] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 746.670457][ T1080] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076c1ac [ 746.678561][ T1080] INFO: task syz-executor.5:17962 blocked for more than 144 seconds. [ 746.686684][ T1080] Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 746.693771][ T1080] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 746.702527][ T1080] syz-executor.5 D29680 17962 10722 0x00000004 [ 746.708882][ T1080] Call Trace: [ 746.712376][ T1080] __schedule+0x934/0x1f90 [ 746.716843][ T1080] ? firmware_map_remove+0x1a3/0x1a3 [ 746.722221][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 746.727529][ T1080] ? __lock_sock+0x160/0x290 [ 746.732234][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 746.737297][ T1080] schedule+0xdc/0x2b0 [ 746.741446][ T1080] __lock_sock+0x165/0x290 [ 746.745891][ T1080] ? __sk_dst_check+0x2e0/0x2e0 [ 746.750842][ T1080] ? finish_wait+0x260/0x260 [ 746.755467][ T1080] lock_sock_nested+0xfe/0x120 [ 746.760270][ T1080] virtio_transport_release+0xc4/0xd60 [ 746.767017][ T1080] ? virtio_transport_close_timeout+0x220/0x220 [ 746.773400][ T1080] ? rcu_read_lock_held+0x9c/0xb0 [ 746.778449][ T1080] ? __kasan_check_read+0x11/0x20 [ 746.783605][ T1080] vsock_assign_transport+0xf3/0x3b0 [ 746.788923][ T1080] vsock_stream_connect+0x2b3/0xc70 [ 746.794252][ T1080] ? tomoyo_socket_listen_permission+0x3b0/0x3b0 [ 746.800620][ T1080] ? vsock_dgram_connect+0x470/0x470 [ 746.806020][ T1080] ? finish_wait+0x260/0x260 [ 746.810632][ T1080] ? apparmor_socket_connect+0xb6/0x160 [ 746.816290][ T1080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.822662][ T1080] __sys_connect_file+0x161/0x1c0 [ 746.827765][ T1080] ? move_addr_to_kernel.part.0+0xcd/0x110 [ 746.833710][ T1080] __sys_connect+0x174/0x1b0 [ 746.838381][ T1080] ? __sys_connect_file+0x1c0/0x1c0 [ 746.843787][ T1080] ? __x64_sys_futex+0x404/0x590 [ 746.848796][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.855624][ T1080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.861222][ T1080] ? do_syscall_64+0x26/0x790 [ 746.865924][ T1080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.873969][ T1080] ? do_syscall_64+0x26/0x790 [ 746.878701][ T1080] __x64_sys_connect+0x73/0xb0 [ 746.883605][ T1080] do_syscall_64+0xfa/0x790 [ 746.888152][ T1080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.894153][ T1080] RIP: 0033:0x45c479 [ 746.898115][ T1080] Code: 15 08 c5 01 48 89 04 24 48 8d 44 24 28 48 89 44 24 08 e8 ea 87 fa ff 48 8d 7c 24 78 0f 57 c0 48 8d 7f d0 48 89 6c 24 f0 48 8d <6c> 24 f0 e8 d4 33 00 00 48 8b 6d 00 48 c7 44 24 38 00 00 00 00 66 [ 746.917852][ T1080] RSP: 002b:00007f370dd56c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 746.926363][ T1080] RAX: ffffffffffffffda RBX: 00007f370dd576d4 RCX: 000000000045c479 [ 746.934465][ T1080] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 746.942522][ T1080] RBP: 000000000076c1a0 R08: 0000000000000000 R09: 0000000000000000 [ 746.951992][ T1080] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 746.959998][ T1080] R13: 0000000000000096 R14: 00000000004c2ece R15: 000000000076c1ac [ 746.968126][ T1080] [ 746.968126][ T1080] Showing all locks held in the system: [ 746.975943][ T1080] 1 lock held by khungtaskd/1080: [ 746.982822][ T1080] #0: ffffffff89badac0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 746.992563][ T1080] 2 locks held by rsyslogd/10566: [ 746.997622][ T1080] #0: ffff8880982b2de0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 747.006338][ T1080] #1: ffffffff89ba2b78 (logbuf_lock){-.-.}, at: debug_check_no_obj_freed+0xc0/0x441 [ 747.016101][ T1080] 2 locks held by getty/10656: [ 747.020956][ T1080] #0: ffff888097bda090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 747.029977][ T1080] #1: ffffc900060c32e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 747.039870][ T1080] 2 locks held by getty/10657: [ 747.044708][ T1080] #0: ffff8880983a2090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 747.053872][ T1080] #1: ffffc900060932e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 747.063543][ T1080] 2 locks held by getty/10658: [ 747.068314][ T1080] #0: ffff88809feef090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 747.077384][ T1080] #1: ffffc900060f32e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 747.087093][ T1080] 2 locks held by getty/10659: [ 747.093240][ T1080] #0: ffff88809facd090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 747.102331][ T1080] #1: ffffc900061132e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 747.112080][ T1080] 2 locks held by getty/10660: [ 747.116934][ T1080] #0: ffff88809a759090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 747.126066][ T1080] #1: ffffc900060d32e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 747.135804][ T1080] 2 locks held by getty/10661: [ 747.140597][ T1080] #0: ffff88809794c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 747.149890][ T1080] #1: ffffc900061032e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 747.159616][ T1080] 2 locks held by getty/10662: [ 747.164463][ T1080] #0: ffff88809fefd090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 747.173502][ T1080] #1: ffffc90005a532e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 747.183197][ T1080] 3 locks held by kworker/u4:10/11947: [ 747.188787][ T1080] #0: ffff8880ae937598 (&rq->lock){-.-.}, at: newidle_balance+0xa28/0xe80 [ 747.198906][ T1080] #1: ffffffff89badac0 (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 [ 747.209448][ T1080] #2: ffff8880ae927458 (&base->lock){-.-.}, at: lock_timer_base+0x56/0x1b0 [ 747.218399][ T1080] 1 lock held by syz-executor.5/17906: [ 747.223928][ T1080] #0: ffff888094cd3910 (sk_lock-AF_VSOCK){+.+.}, at: vsock_stream_connect+0xfb/0xc70 [ 747.233666][ T1080] 1 lock held by syz-executor.5/17962: [ 747.239132][ T1080] #0: ffff888094cd3190 (sk_lock-AF_VSOCK){+.+.}, at: vsock_stream_connect+0xfb/0xc70 [ 747.248843][ T1080] [ 747.251214][ T1080] ============================================= [ 747.251214][ T1080] [ 747.259614][ T1080] NMI backtrace for cpu 0 [ 747.264050][ T1080] CPU: 0 PID: 1080 Comm: khungtaskd Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 747.273561][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.283633][ T1080] Call Trace: [ 747.286957][ T1080] dump_stack+0x197/0x210 [ 747.291432][ T1080] nmi_cpu_backtrace.cold+0x70/0xb2 [ 747.296744][ T1080] ? vprintk_func+0x86/0x189 [ 747.301440][ T1080] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 747.307102][ T1080] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 747.313103][ T1080] arch_trigger_cpumask_backtrace+0x14/0x20 [ 747.319021][ T1080] watchdog+0xdf1/0x14e0 [ 747.323331][ T1080] kthread+0x361/0x430 [ 747.327415][ T1080] ? reset_hung_task_detector+0x30/0x30 [ 747.333026][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 747.338895][ T1080] ret_from_fork+0x24/0x30 [ 747.343640][ T1080] Sending NMI from CPU 0 to CPUs 1: [ 747.349401][ C1] NMI backtrace for cpu 1 [ 747.349409][ C1] CPU: 1 PID: 11947 Comm: kworker/u4:10 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 747.349415][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.349420][ C1] Workqueue: bat_events batadv_dat_purge [ 747.349427][ C1] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.349440][ C1] Code: 48 89 e5 48 8b 4d 08 e8 d8 fe ff ff 5d c3 66 0f 1f 44 00 00 55 89 f2 89 fe bf 05 00 00 00 48 89 e5 48 8b 4d 08 e8 ba fe ff ff <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 f2 48 89 fe bf 07 00 00 00 [ 747.349444][ C1] RSP: 0018:ffffc9000754fc10 EFLAGS: 00000093 [ 747.349452][ C1] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817b9166 [ 747.349457][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 747.349463][ C1] RBP: ffffc9000754fc10 R08: ffff88809615a380 R09: ffffed100ab54b1b [ 747.349468][ C1] R10: ffffed100ab54b1a R11: ffff888055aa58d3 R12: ffffffff87d50daa [ 747.349474][ C1] R13: ffff88809615a380 R14: ffff888055a88cb0 R15: ffff8880903b5200 [ 747.349479][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 747.349484][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 747.349489][ C1] CR2: 0000000000930000 CR3: 00000000a4ad8000 CR4: 00000000001406e0 [ 747.349495][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 747.349500][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 747.349503][ C1] Call Trace: [ 747.349506][ C1] trace_hardirqs_off+0x26/0x240 [ 747.349511][ C1] ? __batadv_dat_purge.isra.0.part.0+0x23a/0x350 [ 747.349515][ C1] __local_bh_enable_ip+0x11a/0x270 [ 747.349519][ C1] _raw_spin_unlock_bh+0x2c/0x30 [ 747.349523][ C1] __batadv_dat_purge.isra.0.part.0+0x23a/0x350 [ 747.349527][ C1] ? batadv_bla_loopdetect_report+0x207/0x207 [ 747.349531][ C1] batadv_dat_purge+0x4e/0x70 [ 747.349534][ C1] process_one_work+0xa05/0x17a0 [ 747.349538][ C1] ? mark_held_locks+0xf0/0xf0 [ 747.349542][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 747.349545][ C1] ? lock_acquire+0x190/0x410 [ 747.349549][ C1] worker_thread+0x98/0xe40 [ 747.349553][ C1] ? trace_hardirqs_on+0x67/0x240 [ 747.349556][ C1] kthread+0x361/0x430 [ 747.349560][ C1] ? process_one_work+0x17a0/0x17a0 [ 747.349564][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 747.349568][ C1] ret_from_fork+0x24/0x30 [ 747.351947][ T1080] Kernel panic - not syncing: hung_task: blocked tasks [ 747.590345][ T1080] CPU: 0 PID: 1080 Comm: khungtaskd Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 747.599810][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.610016][ T1080] Call Trace: [ 747.613584][ T1080] dump_stack+0x197/0x210 [ 747.618186][ T1080] panic+0x2e3/0x75c [ 747.622093][ T1080] ? add_taint.cold+0x16/0x16 [ 747.627026][ T1080] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 747.632703][ T1080] ? ___preempt_schedule+0x16/0x18 [ 747.637836][ T1080] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 747.644010][ T1080] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 747.650266][ T1080] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 747.656416][ T1080] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 747.662585][ T1080] watchdog+0xe02/0x14e0 [ 747.666855][ T1080] kthread+0x361/0x430 [ 747.671316][ T1080] ? reset_hung_task_detector+0x30/0x30 [ 747.676869][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 747.682603][ T1080] ret_from_fork+0x24/0x30 [ 747.688980][ T1080] Kernel Offset: disabled [ 747.693357][ T1080] Rebooting in 86400 seconds..