7c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140)=0x849, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) fcntl$dupfd(r0, 0x406, r0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x200000) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f00000000c0)=[{}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:03 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000c008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x3, 0x3, 0x15000, 0x2000, &(0x7f000075d000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:03 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000e008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:03 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe050000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000180)) 21:03:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000005, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x27}}, 0x2a2) prctl$PR_SVE_GET_VL(0x33, 0x4aee) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:03 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x800) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r2) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) close(r0) 21:03:03 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000f008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:03 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe060000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3339.170455][T21849] Error parsing options; rc = [-22] 21:03:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000140)={0x1, 0x0, 0x401, 0x10000000000, 0x20}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000000c0)=0xc) close(r0) 21:03:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:04 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:04 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x7, 0x1) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000100)=""/177) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe070000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000040), &(0x7f00000000c0)=0x4) close(r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xc42, 0x40000) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140)={0x95}, 0x4) 21:03:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000011008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x400000001fe, 0x0, 0x1, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe080000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3339.554624][T22080] Error parsing options; rc = [-22] 21:03:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000012008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x80c0, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x5, 0x12) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r1) 21:03:04 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x101000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000400)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1f, 0x1, &(0x7f00000000c0)=@raw=[@exit], &(0x7f0000000140)='syzkaller\x00', 0x9, 0xe2, &(0x7f0000000300)=""/226, 0x40f00, 0x4, [], r2, 0x8, r1, 0x8, &(0x7f0000000240)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x10, 0x14eed6c7, 0x401}, 0x10}, 0x70) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:04 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000180)='ipddp0\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x95d195a7eb026afa) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe090000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000004) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000040)={'lapb0\x00', {0x2, 0x4e22, @broadcast}}) 21:03:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000013008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x13e) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xbdec9104d2d996bf) r1 = fcntl$dupfd(r0, 0x406, r0) rseq(&(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x8, 0x5}, 0x4}, 0x20, 0x1, 0x0) bind$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0a0000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3340.002598][T22298] Error parsing options; rc = [-22] 21:03:04 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) fchdir(r0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:04 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000014008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'wlan1wlan0lo!lo]nodev'}, {0x20, 'tls\x00'}, {0x20, 'tls\x00'}, {0x20, 'cpuset'}, {0x20, 'cgroup'}, {}, {0x20, '\'!\xc2\x15$)keyring-%%\x8e'}, {0x20, 'mime_typeproc}em1'}, {0x20, 'tls\x00'}], 0xa, "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"}, 0x1063) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x40080000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup2(r0, r1) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000000)={0x2, 0x8e, 0x1, 0x8, 0x80f1, 0x3}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r2, 0x3b72, &(0x7f0000000080)={0x20, 0x2, 0x8, 0x0, 0x2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000003) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x181000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) signalfd(r2, &(0x7f0000000100)={0x1}, 0x8) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000180)) signalfd(r2, &(0x7f0000000140)={0x7}, 0x8) 21:03:05 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x98, 0x4, 0x2105, "03499e6403d1f11a97faaa32d243de9b", "020b29f99186a8631739b7ea818e0d87386c226690cdc310efbc88f886c2b01651220fee8ef92cb5fb45615701a9f713a5c2c4275c6f95a12c859a5e38237af8a2335664a05cb9ba4f02422425b7262cf09433efc40eecb50f94149835d7b9e742b0998a43f0097299c929eec979ea18348b43e80e6c6b8f63d053c94fcaffa97c877e"}, 0x98, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0b0000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x113040, 0x0) accept4$ax25(r1, &(0x7f00000001c0)={{0x3, @rose}, [@rose, @netrom, @bcast, @default, @default, @netrom, @default, @rose]}, &(0x7f0000000240)=0x48, 0x80800) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 21:03:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000003717008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 2: r0 = getpid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r0) close(r1) [ 3340.493353][T22644] Error parsing options; rc = [-22] 21:03:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0f0000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000001c008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket(0x1a, 0x80802, 0x9) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000000), 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) r2 = getegid() chown(&(0x7f00000001c0)='./file0\x00', r1, r2) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0xc7df, 0x400, 0x12f2, 0x3}) close(r0) 21:03:05 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0xfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000180)={0x8, 0x401, 0x1, 0x8, 0x0, 0x7ff}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80000, 0x0) fanotify_mark(r1, 0x4, 0x10, r2, &(0x7f0000000140)='./file1\x00') 21:03:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe100000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr, 0x2000000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000300)=""/4096) 21:03:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000020008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:05 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000040)='./file0/file0\x00', 0xc2) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000100)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe110000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000001737008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000140)=0x3, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000000c0)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe120000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3341.177013][T23063] Error parsing options; rc = [-22] 21:03:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000003f008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:06 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) ppoll(&(0x7f0000000040)=[{r0, 0x1d}, {r0, 0x2000}, {r0, 0x1}], 0x3, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)={0x2985}, 0x8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x101100) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x7) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000300)={0x401, {{0xa, 0x4e20, 0xffffffffffffb7fe, @remote, 0x8}}, 0x0, 0x6, [{{0xa, 0x4e23, 0x800, @remote, 0x2}}, {{0xa, 0x4e21, 0x94, @local, 0x401}}, {{0xa, 0x4e20, 0xa6, @mcast1, 0x4d}}, {{0xa, 0x4e22, 0x4, @local, 0x2}}, {{0xa, 0x4e21, 0xfff, @empty}}, {{0xa, 0x4e21, 0xffff, @rand_addr="942a07a2470cfed243fa99412ea344e9", 0x3}}]}, 0x390) close(r0) 21:03:06 executing program 0: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000040008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe130000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:06 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r1, &(0x7f0000000100)=""/32, 0x20) close(r0) [ 3341.550836][T23276] Error parsing options; rc = [-22] 21:03:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000240)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x8001, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f00000000c0)) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$IMADDTIMER(r5, 0x80044940, &(0x7f0000000040)=0xf4240) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="21465b0f3da8b3dc30c402165503a5d3e3d99063941f3a2ccf5c24a2839ab97ca5349c9478c5ea1d9f53c87debc2152fdc48c214665815b192fa8fc8524020d7d697e8a404dc8170aad1f81d40ffc4dceeabcc62bbe1788a5b0fc7c553f0da871c9cf818c009cc7b7f8b27c9652b3dcf6a35b4af2f6c19", 0x77, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r6, 0x101) 21:03:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe140000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000006558008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:06 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x70000) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x80, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r1) 21:03:06 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000100)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:06 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f00000001c0)={{0xffffffffffff8001, 0x1, 0x1, 0x7f800000, 0xb80, 0x7}, 0x8}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000300)={[], 0x401, 0x8, 0x8, 0x0, 0x6, 0x100000, 0x3000, [], 0xffffffff}) 21:03:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe1c0000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000060008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3341.950877][T23552] Error parsing options; rc = [-22] 21:03:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000280)={r4, &(0x7f0000000180)=""/198}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r5, 0xc0405519, &(0x7f0000000040)={0x7, 0x4, 0x8b, 0xffffffffffffffff, '\x00', 0xfffffffffffffffc}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000005865008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x26, "1cae07601663b368aae2ef57277f4cfafeb1efcff35c897c8488f289c41f78557b1ef675c11c"}, &(0x7f0000000240)=0x2e) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x6, 0x40, 0x8, 0x8, 0xfffffffffffffffa, 0x8b, 0x8, 0x6, r2}, 0x20) close(r0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x121000, 0x0) ioctl$TCSETX(r3, 0x5433, &(0x7f00000000c0)={0xc3, 0x9, [0x100, 0xfffffffffffffffe, 0x4, 0x10001, 0x40], 0xe7}) 21:03:06 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2001ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)=0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:06 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) read$alg(r1, &(0x7f0000000100)=""/89, 0x59) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000300)) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) close(r0) 21:03:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe600000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x101000, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)=0x7) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040)=0x1, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000081008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f00000000c0)=0x1, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) connect$inet6(r1, &(0x7f0000002040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000001d80)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000001ec0)=0xe8) r4 = getgid() read$rfkill(r1, &(0x7f0000000080), 0x8) sendmmsg$unix(r1, &(0x7f0000001f40)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="123856f398b4381b1993ee52ad08e548eef83cdc65e0fe1838169800019e43355c627ca394dbe2d42be51c0cb41a11443ea21f6be31781c7dd2a68bf7ac4216d8db102d60e9573c8174479ef1d31b4f704798582e09531cfa051e3dde4fa957d7eb8a968d10ee07d91e14c611e6c934a4f21d3be20df486166ac66ad8d701b689da7a76bb6220383e9e81591977692d1d0b27cb0f51a13e7365ada584549b337a1d4166295c0ea9c5137938d58c79a48adae00c9e06fd2dbad941cebf44e277f13a7f56ccdeede314307d5453c785d5c217a25407b26426d66a209424ec760ac6408215fd279", 0xe6}, {&(0x7f0000000300)="75a08ffb2af69dc31e8441575d0e1f3e409cf04546424049e28a448509acc8a538c692cb5388c53e4d4daca3a12261734735a63d31865e906ec06f579e544865fbc77e90f08844", 0x47}], 0x2, &(0x7f0000000380)=[@rights={{0x28, 0x1, 0x1, [r1, r0, r1, r1, r1, r0]}}], 0x28, 0x10}, {&(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001700)=[{&(0x7f0000000440)="0880d5e1c1f5e82d4ee26bad31beed6d5adb", 0x12}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="1cfa8ddc62d4a35c762fbfb690817f2fdae8802c73777863356d65477076eb7de9f7306f3c75a8711133f594611ef09d1d8f651592411b319ea5ec43f9783c88de18fbef4f6e85cb7ecfbff86bb0fc38c47bf2a53ca952d93c700be043610ffb5d505cc76d52eeaccbeb505142b7f1029fbc6a0b146e479bfaea8b5b5f7779f7e3dd973c3fa968289b2681dadc6d153ee550b7925879d9bf2c64ec2dfcd767f20b88fd6d8433c271f4fe40da3121371b367e577ff60a276f0967ea073036f6", 0xbf}, {&(0x7f0000001540)="8a1071dc0fd74181ec44053fea663b580aa86ca90c5489ed839934cca251b13322e17ac9731a0e08cff3726ca979f42521a0d926cd2339f946cb18a57d65065b408b7df8f8e471970890f3c993d93e3a386300bffb7f364602c8c5b18f3c39f8a30128515bd86f1cc336d41586685b4c18eb3c703c60f0bcdc920c4b831ffac7426aaf0212480f9eaab2ddcb1128f676802cba894361ca732910a82451a96cde699995751188069e4e30", 0xaa}, {&(0x7f0000001600)="15120892442c8ef99f4fbf48ee731fb43757d3953c4d9ce14ddfbef33c5034b54b4eca2bbc8273f8750397e4aefa2c0f34445839bbeadaa0c5d93410d69d9933d3e0cda5d09f74e40578060a2fea37cc1d949cef62223fbedca3428e1305f718a27b0fe02856f465995660ade3e6932feb4094e1cef1672be68cf04a4da9dc49742f87d100e26db9904d910afbc16106902dcc6aa7b07d2c0f68734e7c27cb4b2b439414876026975041910aac4fc211d90c26b7022404334ffa88e7069034393d46686dafac96906b74d88eedf396fe43fb", 0xd2}], 0x5, 0x0, 0x0, 0x8044}, {&(0x7f0000001780)=@abs={0xb81b3132cbc4645e, 0x0, 0x4e23}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001800)="6d8a2e228352e2005ee5ba908a29b99128532c91ed0add100dd947f66be6bea69883bc0c4378cfb9d4ff0bd24453aa0d64bcd2c7bde8287e68ce80f3cc02ecb58dbc946349ba7b2a083e7645c38f", 0x4e}], 0x1, 0x0, 0x0, 0x40000}, {&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001940)="ac9590243c9413228e20aff0c8574ce6db396bd9fea804d169dab9c72e9eed8a7eeefb80124c20d2be1d00bfd73b8951fcd1153cf7273a", 0x37}, {&(0x7f0000001980)="574b791e472510cf55fd2df55633a5dfae8f8d6b3b1df87c3c0e854c61b2d7ec3676527b7eb31d", 0x27}, {&(0x7f00000019c0)="cda486646ffed9d12ed60fec3a284c3116cf24ab3159bd3d7e221bd23286eb716949e7781fb19f7443cb00599c0ff2691dd28c9194ac642e3d82e195fc44387fcd8462322183fc774bdc1417e147c9685be752a1fbde1c009252ef6b21648c2435ee332f6be54863b9a2bbd32d01de08252eb43ff635f0c7afd760f59083b7990927982a90b1dd1e9d7ee0b7c7b5b30be47675046e6909ea6ed33874b09fd1b219cf92eb75c5ba7b8415c2590ac1a899b780c0a11c2e6f6f39b7cb6c9b13913f6f3bf5a1b2b7ba78ba6bef213fc93cc6accecf93ca", 0xd5}, {&(0x7f0000001ac0)="a38635b66131166d75b21215e890008b5b4fbbe158e4af22a2fd95ca17aa58b59abd5672e91510d9fee76ea170b38f7804658075cbc052a5b6f6fb7bc90855397e12bca21b2569e113e4c08bd617e6ad87ccccf81ca7b57242692c5532b0fe307e3e8c615f2d3cbfd3c4820abda315d87cb9a9ace12887cd9454e589ca72c58e81f82bd728bb53f0205d0b57d54bd8a4e799e323a55faa", 0x97}, {&(0x7f0000001b80)="9ac9c0d75920f1a69551d270fc10bc8ff53d6b2b2ba691a0564028b510b07f445037b571f4293febcd4e42f5d8365dc777d3ea28fa9413286560c7dc31bebdf7e0a0c5bcbb256142bc5bdcc6ceeb11863a95a12701b4c3e3c42f296eda4e2797ba5e6f32aa867aa6207cded42d868127f9d7d2417ae327f3e42c1b35e14d6aeb174fc9c4c6e6a0ae876876e808ebb7b52023eac79a210de6a332ac55ee0f8103b8d87b297abe16f2f0ff63c74165f2d6c8ba98c9c82c750863b874306260094e2c8bb22d6260cccff1dcc771a4e368999cd134e03f8c9cb95c84de9c3cc10b35765af7f3", 0xe4}, {&(0x7f0000001c80)="fa6dc78377fd55721bb95488a344f46490e4660075ec69bf44083cb0928857c7036b16aa90d0133e795dba7b5f4b9decf2003160c5d91ae2492089eacf596829723653846135dd35e27772bbb2e840065402af95", 0x54}], 0x6, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0x20, 0x10}], 0x4, 0x4000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r1) [ 3342.290802][T23777] Error parsing options; rc = [-22] [ 3342.358395][T23787] Unknown ioctl -2120175988 21:03:07 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fee10000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000e1008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x100000001, 0x80000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:07 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x119, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x80, 0x2, 0x8}, 0x1}}, 0x18) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:03:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/fuse\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000000240), 0x1000) write$FUSE_DIRENT(r2, &(0x7f00000013c0)=ANY=[@ANYBLOB="10000000000000000200000000000000c8b197160066306ea09376b7a3d2950fbc5c8780966e554747f41da000d32f2afb8e04a4a661a4d7c7e9fa450b8d3047d17b38855a6a50e79c79a9bbb09ad2e64f737d3d8732bc13b75482aa7f9eae0b627d8bb8c538ae55894181f8511c58ad1809176ab765c9307c183348ba0b9d4d663b27343949b0d2e4a148e4abddc5c1eefe1be13d224c7c5dcc9e0557a50e2e804b27b8e6cd55682598e3c5deeb4708f0a8d4b8e9d22bef0b44295bbdcaad665278e164fc8c589576635026ea3b2cc2bd0c1e50355be161a23ea73b7aa87eb43eb6b38cb9de03da78ad7a2986ce71c6a8cb1bfe"], 0x10) setsockopt$packet_buf(r1, 0x107, 0x17, &(0x7f00000001c0)="533f453d945e4a77a46b8f36a1352a051430c9a08eed33c16993eeb9616cb3aabfc5ea8a9ed7131b63141bb3b8beb087b049c1769347e0fd63b47b8d96d949f22c459aef763ba97ad6e60d876c1eced46f3988d61db44b6d96825ddddcc3072133008c6956ff4e7fd0de549740102393fc87bd5f03137c6acf8f6a7990c9dc7854605f9c84adde6454de2dffa8d522d21f177b0c2eca321a6c41e480406a38322b2b6ae8fc7e9129073ebf8aab1126ca2638e66f48924c48bae623e02e121b5d6de75959cb8c830f02305cf6388151e263010ac3918728c6", 0xd8) 21:03:07 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fef00000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3342.693201][T24006] Error parsing options; rc = [-22] 21:03:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000f0008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 2: r0 = getpid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r1) ptrace$setsig(0x4203, r0, 0x6, &(0x7f00000000c0)={0x36, 0x1, 0x2}) 21:03:07 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000000c0), 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8000, 0x400000) 21:03:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000002008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000300bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000003008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000100)={0x0, @speck128, 0x0, "896097d7dafacbd7"}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xf66, 0x0) bind$isdn(r1, &(0x7f00000000c0)={0x22, 0x3, 0x8, 0x4, 0x69d5}, 0x6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:07 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000280)=""/143) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) 21:03:08 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000500bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000004008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:08 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x84800, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x40, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0), 0x0, 0x4}, {&(0x7f0000000300)="89ca41c81fd4d7acbe3416826c8062d02f5119e828c6b8b66bea5c37221fc5e09e1bd761e207578198df9c6c16f97e652a7277141c721e399a99465919d168e9a840ce72ae7dc1e5a65f76170053c956d985ed7c9709428891906cee465d9c8d70d2df59e747ab48b4d820df42751c7e26e55f9b8c3727d7eedc176a1c03b06b7f45719440ebc21ecacbca9f55e3d05825b79f1887697cf0a41aae45153f92494ccfb6a11235613d2255aef41ccb247d2bf46ba052df87c115876c13b22ff50206cff58e979f2d4aa15562e850c76b79b9798b046457efa52dc0ac8ef050e03b", 0xe0, 0x2}, {&(0x7f0000000200)="57b16f7a1f04a6c29e67d0bfa394683cdcc08a44e87e721fff4ffc9022a5786ee8dae0b6f82a0527c7955f6aaecff7cae311d2687c10fd9576e5a7ff6c61e432c509fe8e1a7047d866210d1bd81ec4977a988d2ae23a081544015550ba29ea3a1dc604f0952f17af38b21a7f169031c38025549ea5c095c5a818b4776a0c347ab1276301088ad88c5339799c2c739723", 0x90, 0x7}, {&(0x7f0000000400)="0c5446c84f6a7da5d8f68fedf873293d7590e0236c1231271b328f8d875e59debaa560ff9ca523c32a9b5bd8c75502ffee7f216d95032eb6eb94e1870fb6c22b24cd15f5e54341abbdb62d2275a5436531a15cc470e9f58243b171", 0x5b}], 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="005907cbd8ee2d3a146db90e12b8cc53ad37b7b6cf1e84b0d553df89d8f0ea309b049a71c5c194334d9f1fa910770a373ad6366ffbfe2ab1bf3ba4bc19b41de8043b0000000000000000000000002f0cd51c3e242add0b75bcdb01eb10d15a0f1b5e8686919dfb8897fb80c4b13b89812ad771cebe4c5903648e28c233afecfd1d409ae19aa3fed69f362f062ce0f2d168db3b35845f55f2e14500f057731c61cca06c44a65ffd4137004f4e3a3aa88344c02699d03edbbb65b80108eb3f2c5dc36b81515240131d76320d5537fda202ac1196de9298b74c1f2bcecd1bf0b08f2ad6296eed", @ANYRESHEX=r2, @ANYBLOB="2c63726561746f723d27c85a3d2c6673756969643d77633639656363612d396377652d316533312d0030cb16c3f0bbff4f7e870ad1471c73002d777d61777e3561352c4f626a5f757365723d746c73f02c736d61636b66737472616e736d7574653d2d2c736d61636b6673726f6f743d746c73002c646f6e745fb54f5e98e531c61130466861736808bc", @ANYRESDEC=r3, @ANYBLOB=',fsueid=\x0064dw5-wew2-3\x00<6-5w\x00]-b2?\x00\x00u74,uid<', @ANYRESDEC=r4, @ANYBLOB=',\x00']) close(r0) [ 3343.319501][T24445] Error parsing options; rc = [-22] 21:03:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xc800, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:08 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x502) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x3}}, 0x24) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:08 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000600bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000001c0)=@ccm_128={{0x304}, "f38735e86240a1c6", "b229a4447de434833ead3c3de6ed42e8", "c85742a4", "71655895184924aa"}, 0x28) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x12000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xffffffff00000000, 0x6, 0x101}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r2, 0x3ff}, 0x8) close(r0) 21:03:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000005008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:08 executing program 2: r0 = getpid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) process_vm_readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/46, 0x2e}, {&(0x7f00000001c0)=""/187, 0xbb}], 0x2, &(0x7f0000000140)=[{&(0x7f0000000300)=""/110, 0x6e}, {&(0x7f0000000380)=""/175, 0xaf}, {&(0x7f0000000440)=""/189, 0xbd}], 0x3, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r1) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) 21:03:08 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000700bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3343.662275][T24669] Error parsing options; rc = [-22] 21:03:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:08 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xff, 0x8000) execveat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='mime_type@selinuxvmnet0eth0@\x00', &(0x7f00000002c0)='\\\x00', &(0x7f0000000300)='/dev/usbmon#\x00', &(0x7f0000000340)='eth0&*],\x00'], &(0x7f0000000640)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)='ecryptfs\x00', &(0x7f0000000440)='/dev/usbmon#\x00', &(0x7f0000000480)='/dev/usbmon#\x00', &(0x7f00000004c0)='/dev/usbmon#\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='[&\x00', &(0x7f0000000580)='/dev/usbmon#\x00', &(0x7f00000005c0)='/dev/usbmon#\x00', &(0x7f0000000600)=',-\x00'], 0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0, 0xffffffff80000001, 0x20, 0x7, 0x633a}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0xd97, 0x30}, &(0x7f00000001c0)=0xc) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000006c0)=0x4, &(0x7f0000000700)=0x4) 21:03:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000006008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:08 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000900bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:08 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x400000e1, &(0x7f00000000c0)}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) [ 3343.965654][T24893] Error parsing options; rc = [-22] 21:03:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000040)={0x100000001}, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:08 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x400, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000100)=""/206, &(0x7f0000000200)=0xce) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000240)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000280)={r1, r3}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000300)=[r2], 0x1) 21:03:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000007008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) r1 = dup2(r0, r0) ioctl$TIOCSIG(r1, 0x40045436, 0x9) 21:03:08 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000a00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000008008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x104) getsockname$ax25(r1, &(0x7f00000000c0)={{0x3, @rose}, [@remote, @null, @bcast, @bcast, @bcast, @default, @netrom, @bcast]}, &(0x7f0000000140)=0x48) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:09 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000b00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x500, 0x100) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x6, @ipv4={[], [], @multicast2}}, @in6={0xa, 0x4e24, 0x856, @remote, 0xffff}, @in={0x2, 0x4e21, @remote}], 0x88) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000100)={0x9, 0x400}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:09 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:09 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x11000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x7, 0x10001, 0x9}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)={r1, 0xa760, 0x2f, "ad78ebf6dc6784ceb4c7f5891fbb088bf1cacce5c3d0e2892b4f0f0b0e99f05ba0475812b7cf84c09174f332e019d5"}, 0x37) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x10, &(0x7f0000000140)) 21:03:09 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000009008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000f00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2, 0x0) write$ppp(r1, &(0x7f00000000c0)="7b6ecbd2c1eb7cc62e1d2495f657", 0xe) 21:03:09 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @rand_addr, 0x20}, 0x1c) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000300)={0x0, 0x1, @start={0x5}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042dbd7080fedbdf25050000000c0004000100000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x48000}, 0x80) close(r0) 21:03:09 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001100bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000a008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000000c0)={0x5, 0xfff, 0x3ff, 0x1, 0x0, 0x3}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:09 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001200bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) close(r0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="d2c0a15d25d7843bfb68f3540a418877a17c1d30710a0b485a835ad2d2dd7e9e13acd7a78f7c577d9c1a6e95d423b7449c5b8aabd1cba9dcc50f2db93070ab0daf32", 0x42, 0x8}, {&(0x7f00000001c0)="07dd76e8196c42c98e477978d41e685e6fc24778dd389dd12cf4afc2194aa1c0b38bede33bb7dcd62271881d58d313323a76351bd1864a89b6c55d69338a74bcc63079ed39e530a5d8b0a9ef4fd998dcfd59c4162313718863cc976fe99c1baf8c2f5406485ed2a624167a8e721c45fbc665090efee3c41a718020b35a828d2dec097498cb33c5a35c28faef7a87330ecbf86fe6fa7acf080ca3e51be19d8f95d522e59a1a86b6e7b22f2c3026c681a1239f9106d7c80fb4c9f56a925e26e7d841c5fb86c9e25a5c9a7e10cc1e8774a8b812ea19fa2b69139ec4136cc66a76b6ca0040854f13be2a5f40d1fc4efd21516a29cc", 0xf3, 0x2}, {&(0x7f0000000300)="13084d7e2f95b4a6460fba5b1801d423efe4d4575d55f4b30c65d3033290dc7ba1af6d4e18ea40566f2a125773afb6263cbaa196bbfede7d776950a2a76a84c88a72be792528374dfedc8586a519d7ca5a967b9f4fa7f055a5ac74987bee9b42d72686a1194e", 0x66, 0x3ff}], 0x80008, &(0x7f00000004c0)={[{@barrier='barrier'}], [{@euid_gt={'euid>', r1}}]}) close(r0) 21:03:09 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000b008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:09 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:03:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x800000200000a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) close(r0) 21:03:09 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000c008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001300bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8001, 0x80000) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000000100)={&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000001c0)=""/172, 0xac}) close(r0) 21:03:10 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000e008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001580)='/proc/self/net/pfkey\x00', 0x80, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000015c0)='./file0\x00', 0x0, 0xa4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/4096, 0x1000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = getuid() ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@local, @dev={[], 0xc}, @remote]}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) syz_mount_image$btrfs(&(0x7f0000001140)='btrfs\x00', &(0x7f0000001180)='./file0\x00', 0x7, 0x4, &(0x7f0000001440)=[{&(0x7f00000011c0)="e157634b76c57d1b29a5a9d6f1409766a6250b2ddb2b6664c54fbf3c0a61a8f7644c1a", 0x23, 0x1}, {&(0x7f0000001200)="25fc9a504793e497e4912bd5fa690c2832cbc0c92dd8f97534ccdbf76282c30593d16d5a9fddf743fd3f98539086825dc021b260fcedf5322cd60ffd218cbcf36ec1a030e431f44df2ca4d56c36ba1d447e0be3e9f88a999c8a3ce975e6b049ced6ea438af620eda0120c55861b987f32d3d40e76dd6a1b9cb30c2b50d6a04c42c03b9095e3b768270887168e9d7052f73b96e88116e21a6cfcbaeeda1205f4ead5c8f6bf72944dfbed3c5b5d2fa04ab7605c4bafc24708f4368ee9330067d263149ba4564d707aa4fea3c1ba7237e6ffaa05f91ff149ad2c99e37d2d86e83ea43a6f9c09651b3", 0xe7, 0x3f}, {&(0x7f0000001300)="51bcd9f507962956aef6ab297402f33f1001e30b54a96a92eb0589633a22c99bccadb45f3a9d1738e80b4c64", 0x2c, 0x4}, {&(0x7f0000001340)="2af61bebe552ca19186b289861804976154bff75d16bd099d749d85c5fa6cfc12ecf31d081f182f571eee719ee91dd674432c23aec1310df9d2c919a2d9cfb24d0dae13ac31a55ecfbb180374f9c0a6834b1ee6057f41437a874b62e041cddaf5f59a06d2cc3a3efd210da89129aeba0acb0becee6e42e924f63eed7928dcd8803a326a200fcc8657bcf710a00b74b9e9ec294fa0eab11e6123f0171337080ac672dec2f5708ef3a76a4b30e72439d84291c2c343657c7d533f80ea74d24c295e9b1ba1c26c3946a1d96a8510d1592b504cf2f410f016b39d07f", 0xda, 0xfa}], 0x2000000, &(0x7f0000001600)=ANY=[@ANYBLOB="747265656c6f672c6461746173756d2c7375626a5f726f6c653dadcc7374656d2e706f7369785f61636c5f616363657373002c736d61636b66736465663d73797374656d2e706f7369785f61636c5f616363657373002c736d61636b66737472616e736d7574653d6563727970746673002c657511a8325d978d69643d", @ANYRESDEC=r2, @ANYBLOB=',defcontext=root,\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept(r0, 0x0, &(0x7f0000000080)) 21:03:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x3f, 0x4) 21:03:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:10 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001400bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000000f008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 2: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000040)={@initdev}, &(0x7f00000000c0)=0x14) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:10 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000010008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001c00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x3}) close(r0) 21:03:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0x80000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 21:03:10 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x40000, 0x0) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="fb2e716947cbc6f59e70b167193ecfa5fb88caa547e0a8773b75fca7e36492aea5bfc82fbf0bfd3d1a06924ba757d361ebf272820c3df5f6fe6aa5fead2e140f00e3c7200cca84a6b6168180ad3046b0b01d1e433f022fad63a809c297e1a6db598f00912d9f95cecfa4e713783a", 0x6e, 0x2}], 0x800012, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f646f74732c646f74732c6e6f646f74732c7365636c6162656c2c7365636c6162656c2c003581904a734851113b0368be12b794947fe4ae1c3db2115a798285a622f6338e9db6518a5ab71d358ae0758379fea40ebd"]) 21:03:10 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe441f00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000011008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 5: getpid() r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x4000, 0x0) accept4$x25(r0, &(0x7f00000001c0)={0x9, @remote}, &(0x7f0000000200)=0x12, 0x800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1723, 0x100) close(r1) 21:03:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x8001) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) close(r0) 21:03:10 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe002000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000012008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x101000, 0x0) r4 = geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x2, &(0x7f00000001c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}, {@allow_other='allow_other'}], [{@audit='audit'}, {@subj_user={'subj_user', 0x3d, '/dev/kvm\x00'}}, {@measure='measure'}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:03:10 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x4e20, @local}, {0x0, @dev={[], 0x25}}, 0x0, {0x2, 0x4e21, @multicast1}, 'bridge_slave_1\x00'}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x1, 0x0) 21:03:11 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:11 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe003f00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:11 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000013008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:11 executing program 2 (fault-call:6 fault-nth:0): keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:11 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe004000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:11 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000014008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) sendto$packet(r3, &(0x7f0000000280)="950dec3adba22db13e008b36eebe028cf8ded75b30ed14ce75c05df38397882a2775b4358e4b9d88c4ca0cd1020b3a087e417a1f457b6c2dd5b6f41b30d17abf98b7096d29b13b4408688dcdf0b27f8918177f44ae0121477d4521bbfde15f5e64c23a0256554296d752b97233ec6c970834994e8c17e4a600ba0842af0ffe9a27eed18ba2d0b36adddd9b1345b961c6c5fad0cc274d700340efc15d8f13fa9140699d74962a5e223695dd839fba2e65db4f1a1919b90af9431895b3a9f37da6ba0e6a187f078ac9418c798d1157", 0xce, 0x80, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x101000) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}}) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f0000000180)={0x5, @capture={0x1000, 0x1, {0x8899, 0x4}, 0x6}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) signalfd(r2, &(0x7f0000000040)={0x7}, 0x8) [ 3346.532297][T26372] FAULT_INJECTION: forcing a failure. [ 3346.532297][T26372] name failslab, interval 1, probability 0, space 0, times 0 21:03:11 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}, 0x20, 0x1, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x18000, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000140)={0x200000000000000, 0x5000, 0x58, 0x8, 0x7}) [ 3346.620114][T26372] CPU: 1 PID: 26372 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #86 [ 3346.628188][T26372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3346.638340][T26372] Call Trace: [ 3346.641656][T26372] dump_stack+0x172/0x1f0 [ 3346.646011][T26372] should_fail.cold+0xa/0x15 [ 3346.650656][T26372] ? fault_create_debugfs_attr+0x180/0x180 [ 3346.656485][T26372] ? lock_downgrade+0x920/0x920 [ 3346.661350][T26372] ? ___might_sleep+0x163/0x280 [ 3346.666212][T26372] __should_failslab+0x121/0x190 [ 3346.671248][T26372] should_failslab+0x9/0x14 [ 3346.675757][T26372] __kmalloc+0x2e0/0x770 [ 3346.680009][T26372] ? mark_held_locks+0xf0/0xf0 [ 3346.684788][T26372] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 3346.690524][T26372] tomoyo_realpath_from_path+0xcd/0x7b0 [ 3346.696180][T26372] ? tomoyo_path_number_perm+0x193/0x520 [ 3346.701829][T26372] tomoyo_path_number_perm+0x1dd/0x520 [ 3346.707388][T26372] ? tomoyo_path_number_perm+0x193/0x520 [ 3346.709701][T26413] Error parsing options; rc = [-22] [ 3346.713096][T26372] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3346.713115][T26372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3346.713155][T26372] ? ___might_sleep+0x163/0x280 [ 3346.735264][T26372] ? selinux_file_mprotect+0x620/0x620 [ 3346.740736][T26372] ? __fget+0x384/0x560 [ 3346.744908][T26372] ? ksys_dup3+0x3e0/0x3e0 [ 3346.749336][T26372] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3346.755587][T26372] ? fput_many+0x12c/0x1a0 [ 3346.760015][T26372] tomoyo_file_ioctl+0x23/0x30 [ 3346.764785][T26372] security_file_ioctl+0x77/0xc0 21:03:11 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe1f4400bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3346.769737][T26372] ksys_ioctl+0x57/0xd0 [ 3346.773910][T26372] __x64_sys_ioctl+0x73/0xb0 [ 3346.778518][T26372] do_syscall_64+0xfd/0x6a0 [ 3346.783033][T26372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3346.788929][T26372] RIP: 0033:0x459829 [ 3346.792828][T26372] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3346.812529][T26372] RSP: 002b:00007f4181e3bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:03:11 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400000001c008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:11 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000500)=0x100, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000540)=@assoc_value, &(0x7f0000000580)=0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000005c0)=0x13, 0x4) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000200)={@nfc, {&(0x7f0000000100)=""/187, 0xbb}, &(0x7f00000001c0)}, 0xa0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0x800, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000600)={0x2}) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000340)) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000004c0)=0x8, 0x4) [ 3346.821040][T26372] RAX: ffffffffffffffda RBX: 00007f4181e3bc90 RCX: 0000000000459829 [ 3346.829020][T26372] RDX: 0000000020000240 RSI: 0000000000008990 RDI: 0000000000000003 [ 3346.837006][T26372] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3346.851963][T26372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4181e3c6d4 [ 3346.859944][T26372] R13: 00000000004c544f R14: 00000000004d99d8 R15: 0000000000000004 21:03:11 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe006000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3346.973897][T26372] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3346.986595][T26372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3347.029031][T26526] Error parsing options; rc = [-22] [ 3348.487385][T26719] device bridge_slave_1 left promiscuous mode [ 3348.493579][T26719] bridge0: port 2(bridge_slave_1) entered disabled state [ 3348.501694][T26719] device bridge_slave_0 left promiscuous mode [ 3348.508166][T26719] bridge0: port 1(bridge_slave_0) entered disabled state [ 3349.368509][T26719] device hsr_slave_0 left promiscuous mode [ 3349.374433][T26719] device hsr_slave_1 left promiscuous mode [ 3349.388267][T26719] team0 (unregistering): Port device team_slave_1 removed [ 3349.398765][T26719] team0 (unregistering): Port device team_slave_0 removed [ 3349.410277][T26719] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3349.422951][T26719] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3349.456989][T26719] bond0 (unregistering): Released all slaves [ 3349.503436][T26634] IPVS: ftp: loaded support on port[0] = 21 [ 3349.578329][T26634] chnl_net:caif_netlink_parms(): no params data found [ 3349.607634][T26634] bridge0: port 1(bridge_slave_0) entered blocking state [ 3349.614887][T26634] bridge0: port 1(bridge_slave_0) entered disabled state [ 3349.622716][T26634] device bridge_slave_0 entered promiscuous mode [ 3349.630546][T26634] bridge0: port 2(bridge_slave_1) entered blocking state [ 3349.637884][T26634] bridge0: port 2(bridge_slave_1) entered disabled state [ 3349.645473][T26634] device bridge_slave_1 entered promiscuous mode [ 3349.663550][T26634] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3349.674435][T26634] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3349.696874][T26634] team0: Port device team_slave_0 added [ 3349.706046][T26634] team0: Port device team_slave_1 added [ 3349.727525][T26634] device hsr_slave_0 entered promiscuous mode [ 3349.734184][T26634] device hsr_slave_1 entered promiscuous mode [ 3349.740793][T26634] debugfs: Directory 'hsr0' with parent '/' already present! [ 3349.760593][T26634] bridge0: port 2(bridge_slave_1) entered blocking state [ 3349.767723][T26634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3349.775074][T26634] bridge0: port 1(bridge_slave_0) entered blocking state [ 3349.782226][T26634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3349.825983][T26634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3349.840815][T12892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3349.849847][T12892] bridge0: port 1(bridge_slave_0) entered disabled state [ 3349.857877][T12892] bridge0: port 2(bridge_slave_1) entered disabled state [ 3349.871164][T26634] 8021q: adding VLAN 0 to HW filter on device team0 [ 3349.882897][T12892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3349.893459][T12892] bridge0: port 1(bridge_slave_0) entered blocking state [ 3349.900566][T12892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3349.932784][T21071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3349.942106][T21071] bridge0: port 2(bridge_slave_1) entered blocking state [ 3349.949205][T21071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3349.959609][T21071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3349.968516][T21071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3349.985887][T26634] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3350.001564][T26634] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3350.014891][T12892] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3350.027440][T12892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3350.035936][T12892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3350.057664][T26634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3350.066614][T25401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3350.184104][T26642] FAULT_INJECTION: forcing a failure. [ 3350.184104][T26642] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3350.197448][T26642] CPU: 1 PID: 26642 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #86 [ 3350.205461][T26642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3350.215541][T26642] Call Trace: [ 3350.218853][T26642] dump_stack+0x172/0x1f0 [ 3350.223203][T26642] should_fail.cold+0xa/0x15 [ 3350.227827][T26642] ? fault_create_debugfs_attr+0x180/0x180 [ 3350.233639][T26642] ? ___might_sleep+0x163/0x280 [ 3350.238501][T26642] should_fail_alloc_page+0x50/0x60 [ 3350.243710][T26642] __alloc_pages_nodemask+0x1a1/0x8f0 [ 3350.249082][T26642] ? debug_smp_processor_id+0x3c/0x214 [ 3350.254536][T26642] ? __alloc_pages_slowpath+0x2520/0x2520 [ 3350.260253][T26642] ? perf_trace_lock+0xeb/0x4c0 [ 3350.265109][T26642] ? perf_trace_lock+0xeb/0x4c0 [ 3350.269960][T26642] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3350.276195][T26642] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3350.282437][T26642] alloc_pages_vma+0xdd/0x560 [ 3350.287114][T26642] shmem_alloc_page+0xc0/0x180 [ 3350.291877][T26642] ? shmem_swapin+0x1a0/0x1a0 [ 3350.296550][T26642] ? xas_start+0x166/0x560 [ 3350.300981][T26642] ? lock_downgrade+0x920/0x920 [ 3350.305830][T26642] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3350.311545][T26642] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 3350.317020][T26642] shmem_alloc_and_acct_page+0x165/0x990 [ 3350.322653][T26642] shmem_getpage_gfp+0x598/0x2680 [ 3350.327672][T26642] ? profile_setup.cold+0xbb/0xbb [ 3350.332705][T26642] ? shmem_unuse_inode+0x1010/0x1010 [ 3350.337989][T26642] ? lock_downgrade+0x920/0x920 [ 3350.342864][T26642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3350.349102][T26642] ? xas_find+0x317/0x8c0 [ 3350.353427][T26642] ? filemap_map_pages+0x105/0x1360 [ 3350.358623][T26642] shmem_fault+0x22a/0x7b0 [ 3350.363039][T26642] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 3350.369017][T26642] ? find_get_entry+0x880/0x880 [ 3350.373859][T26642] ? pmd_val+0x85/0x100 [ 3350.378005][T26642] ? pmd_val+0x85/0x100 [ 3350.382156][T26642] __do_fault+0x111/0x540 [ 3350.386483][T26642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3350.392724][T26642] __handle_mm_fault+0x2cbe/0x3f20 [ 3350.397834][T26642] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3350.403372][T26642] ? __kasan_check_read+0x11/0x20 [ 3350.408399][T26642] ? trace_hardirqs_on+0x67/0x240 [ 3350.413436][T26642] handle_mm_fault+0x1b5/0x6b0 [ 3350.418202][T26642] __do_page_fault+0x536/0xdd0 [ 3350.422967][T26642] do_page_fault+0x38/0x590 [ 3350.427470][T26642] page_fault+0x39/0x40 [ 3350.431621][T26642] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 3350.437951][T26642] Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 [ 3350.457573][T26642] RSP: 0018:ffff8880946bf948 EFLAGS: 00010202 [ 3350.463648][T26642] RAX: 0000000000000001 RBX: 0000000000000020 RCX: 0000000000000004 [ 3350.471805][T26642] RDX: 0000000000000000 RSI: 00000000200012c0 RDI: ffff8880946bfab0 [ 3350.479869][T26642] RBP: ffff8880946bf980 R08: 1ffff110128d7f56 R09: ffffed10128d7f5a [ 3350.487840][T26642] R10: ffffed10128d7f59 R11: ffff8880946bfacf R12: 00000000200012c0 [ 3350.495810][T26642] R13: 00000000200012e0 R14: ffff8880946bfab0 R15: 00007ffffffff000 [ 3350.503824][T26642] ? _copy_from_user+0x15a/0x1a0 [ 3350.508763][T26642] get_info+0x105/0x570 [ 3350.512923][T26642] ? translate_compat_table+0x1820/0x1820 [ 3350.518640][T26642] ? perf_trace_lock+0xeb/0x4c0 [ 3350.523488][T26642] ? __lockdep_free_key_range+0x120/0x120 [ 3350.529213][T26642] ? selinux_capable+0x36/0x40 [ 3350.533996][T26642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3350.540235][T26642] ? security_capable+0x95/0xc0 [ 3350.545087][T26642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3350.551327][T26642] ? ns_capable_common+0x93/0x100 [ 3350.556354][T26642] do_ipt_get_ctl+0x17d/0x930 [ 3350.561044][T26642] ? avc_has_perm+0x401/0x600 [ 3350.565779][T26642] ? do_tune_cpucache.cold+0x16/0x1b [ 3350.571065][T26642] ? get_info+0x570/0x570 [ 3350.575402][T26642] ? __might_fault+0x12b/0x1e0 [ 3350.580177][T26642] ? wait_for_completion+0x440/0x440 [ 3350.585469][T26642] ? mutex_unlock+0xd/0x10 [ 3350.603273][T26642] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 3350.609352][T26642] nf_getsockopt+0x7a/0xd0 [ 3350.613781][T26642] ip_getsockopt+0x176/0x1d0 [ 3350.618371][T26642] ? do_ip_getsockopt+0x1830/0x1830 [ 3350.623608][T26642] ? __kasan_check_write+0x14/0x20 [ 3350.628717][T26642] tcp_getsockopt+0x8f/0xe0 [ 3350.633227][T26642] sock_common_getsockopt+0x94/0xd0 [ 3350.638434][T26642] __sys_getsockopt+0x16d/0x310 [ 3350.643290][T26642] ? kernel_accept+0x310/0x310 [ 3350.648061][T26642] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3350.654126][T26642] __x64_sys_getsockopt+0xbe/0x150 [ 3350.659242][T26642] do_syscall_64+0xfd/0x6a0 [ 3350.663746][T26642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3350.669629][T26642] RIP: 0033:0x459829 [ 3350.673517][T26642] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3350.693227][T26642] RSP: 002b:00007f0c0d48dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 3350.701647][T26642] RAX: ffffffffffffffda RBX: 00007f0c0d48dc90 RCX: 0000000000459829 [ 3350.709621][T26642] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 3350.717596][T26642] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 3350.725574][T26642] R10: 00000000200012c0 R11: 0000000000000246 R12: 00007f0c0d48e6d4 [ 3350.733545][T26642] R13: 00000000004c0557 R14: 00000000004d2958 R15: 0000000000000004 21:03:15 executing program 5 (fault-call:4 fault-nth:1): r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:15 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000060008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:15 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000300)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x40802, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000340)={{0x0, @name="04ca96b912f3f94ea1b5281f3e50eb7ba0a9ee62d16b719345308a2736ee9d1a"}, 0x8, 0x9, 0x9}) ioctl$TIOCSIG(r2, 0x40045436, 0x13) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x100, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000212000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="2e0f01cb660f73f625f30f09ba2000ed673e0f01cbf7280fff681d0f0056d8baf80c66b8a8a8918966efbafc0c66b8b300000066ef3e0f07", 0x38}], 0x1, 0xa, &(0x7f00000001c0), 0x0) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "6c655d5fda1b6677c5994e395dd923f7d2293437"}, 0x15, 0x2) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) readlinkat(r2, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/167, 0xa7) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) mmap(&(0x7f00004ba000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f00000003c0)}}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f000007c000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000540)={[0x80, 0x7c, 0x4, 0x2, 0xb6b4, 0x0, 0x2, 0x3, 0x8, 0x3, 0xe, 0x6, 0x7, 0x9, 0x9, 0x3], 0x5001}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 21:03:15 executing program 2 (fault-call:6 fault-nth:1): keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:15 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00e100bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:15 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x3, 0x2) ioctl$NBD_SET_SIZE(r0, 0xab02, 0xadfb) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0xb4) r2 = dup(0xffffffffffffffff) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000280)='ecryptfs\x00', &(0x7f00000002c0)='./file0\x00', r2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x200000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x100000001, 0x4) write$sndseq(r0, &(0x7f0000000380)=[{0xffffffff00000001, 0x9, 0x69, 0x2, @time, {0x0, 0x800}, {0x1f, 0x10001}, @control={0x1f, 0x7a86, 0x50}}, {0x9, 0xf4, 0x20, 0x8, @tick=0x1, {0x0, 0x1}, {0x7, 0x7f}, @connect={{0x2, 0x5}, {0x7, 0x4}}}, {0x100000000, 0x8, 0x6, 0x0, @time, {0xfffffffffffffffc, 0x6}, {0x1, 0xa3cbcf}, @raw8={"1132d2ef1423f5e9977c2037"}}, {0x20, 0x0, 0x7, 0x93, @time={0x77359400}, {0x4, 0xeb3c}, {0x2, 0x6}, @raw32={[0x4, 0x9, 0x1]}}], 0xc0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000040)=0x80) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000440)={0x2000000000000007, &(0x7f0000000340)=[{}, {0x0}]}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000004c0)=""/34, 0x22}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/197, 0xc5}, {&(0x7f0000001600)=""/222, 0xde}, {&(0x7f0000001700)=""/171, 0xab}], 0x5, &(0x7f0000001840)=""/62, 0x3e}, 0x2000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000018c0), &(0x7f0000001900)=0x14) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000480)={r5, 0x4}) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000001940)={0x1, 0x1, [{r2, 0x0, 0xfffffffff0000000, 0xfffff000}]}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0xfffffd0c) 21:03:15 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00f000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3350.825719][T26650] bond0: (slave bond_slave_1): Releasing backup interface [ 3350.848516][T26654] Error parsing options; rc = [-22] 21:03:15 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000e1008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3350.974127][T26709] FAULT_INJECTION: forcing a failure. [ 3350.974127][T26709] name failslab, interval 1, probability 0, space 0, times 0 [ 3350.974318][ T26] audit: type=1400 audit(1564779795.735:255): avc: denied { map } for pid=26647 comm="syz-executor.1" path="/dev/kvm" dev="devtmpfs" ino=30 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:kvm_device_t:s0 tclass=chr_file permissive=1 21:03:15 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3351.077257][T26709] CPU: 0 PID: 26709 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #86 [ 3351.085389][T26709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3351.095566][T26709] Call Trace: [ 3351.098874][T26709] dump_stack+0x172/0x1f0 [ 3351.103221][T26709] should_fail.cold+0xa/0x15 [ 3351.107817][T26709] ? hex_string+0x580/0x580 [ 3351.112327][T26709] ? fault_create_debugfs_attr+0x180/0x180 [ 3351.118140][T26709] ? page_to_nid.part.0+0x20/0x20 [ 3351.123255][T26709] ? ___might_sleep+0x163/0x280 [ 3351.128127][T26709] __should_failslab+0x121/0x190 [ 3351.133086][T26709] should_failslab+0x9/0x14 [ 3351.137595][T26709] kmem_cache_alloc_trace+0x2d3/0x790 [ 3351.142974][T26709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3351.149216][T26709] ? integrity_kernel_module_request+0x39/0x45 [ 3351.155379][T26709] __request_module+0x33d/0xbab [ 3351.160241][T26709] ? lock_downgrade+0x920/0x920 [ 3351.165107][T26709] ? xt_find_table_lock+0x40/0x430 [ 3351.170216][T26709] ? xt_request_find_table_lock+0x9c/0xe0 [ 3351.170230][T26709] ? free_modprobe_argv+0xa0/0xa0 [ 3351.170248][T26709] ? __kasan_check_write+0x14/0x20 [ 3351.170272][T26709] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 3351.191726][T26709] ? wait_for_completion+0x440/0x440 [ 3351.197018][T26709] ? retint_kernel+0x2b/0x2b [ 3351.201614][T26709] ? mutex_unlock+0xd/0x10 [ 3351.206043][T26709] ? xt_find_table_lock+0x137/0x430 [ 3351.211252][T26709] xt_request_find_table_lock+0x9c/0xe0 [ 3351.216811][T26709] get_info+0x152/0x570 [ 3351.220975][T26709] ? translate_compat_table+0x1820/0x1820 [ 3351.226709][T26709] ? perf_trace_lock+0xeb/0x4c0 [ 3351.231569][T26709] ? __lockdep_free_key_range+0x120/0x120 [ 3351.237302][T26709] ? selinux_capable+0x36/0x40 [ 3351.242075][T26709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3351.248330][T26709] ? security_capable+0x95/0xc0 [ 3351.253191][T26709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3351.259442][T26709] ? ns_capable_common+0x93/0x100 [ 3351.264477][T26709] do_ipt_get_ctl+0x17d/0x930 [ 3351.269178][T26709] ? avc_has_perm+0x401/0x600 [ 3351.273876][T26709] ? do_tune_cpucache.cold+0x16/0x1b [ 3351.279165][T26709] ? get_info+0x570/0x570 [ 3351.283515][T26709] ? __might_fault+0x12b/0x1e0 [ 3351.288300][T26709] ? wait_for_completion+0x440/0x440 [ 3351.293603][T26709] ? mutex_unlock+0xd/0x10 [ 3351.298040][T26709] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 3351.304031][T26709] nf_getsockopt+0x7a/0xd0 [ 3351.308476][T26709] ip_getsockopt+0x176/0x1d0 [ 3351.313077][T26709] ? do_ip_getsockopt+0x1830/0x1830 [ 3351.318285][T26709] ? __kasan_check_write+0x14/0x20 [ 3351.323413][T26709] tcp_getsockopt+0x8f/0xe0 [ 3351.327927][T26709] sock_common_getsockopt+0x94/0xd0 [ 3351.333138][T26709] __sys_getsockopt+0x16d/0x310 [ 3351.337990][T26709] ? kernel_accept+0x310/0x310 [ 3351.342766][T26709] ? switch_fpu_return+0x1fa/0x4f0 [ 3351.347890][T26709] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3351.354052][T26709] __x64_sys_getsockopt+0xbe/0x150 [ 3351.359175][T26709] do_syscall_64+0xfd/0x6a0 [ 3351.363688][T26709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3351.369587][T26709] RIP: 0033:0x459829 [ 3351.373574][T26709] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3351.393178][T26709] RSP: 002b:00007f0c0d48dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 3351.401599][T26709] RAX: ffffffffffffffda RBX: 00007f0c0d48dc90 RCX: 0000000000459829 [ 3351.409572][T26709] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 3351.417543][T26709] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 21:03:15 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x100, 0xffffffffffffffff) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f0000000100)={0x49, 0x29, 0x2, {0xfffffffffffffffb, [{{0x0, 0x3, 0x2}, 0xe5, 0x6, 0x7, './file1'}, {{0x28, 0x0, 0x5}, 0x10a, 0xfffffffffffffffc, 0x7, './file0'}]}}, 0x49) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$cont(0x20, r1, 0x7, 0x5) 21:03:15 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000200bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:16 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000300bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3351.425516][T26709] R10: 00000000200012c0 R11: 0000000000000246 R12: 00007f0c0d48e6d4 [ 3351.433484][T26709] R13: 00000000004c0557 R14: 00000000004d2958 R15: 0000000000000004 21:03:16 executing program 5 (fault-call:4 fault-nth:2): r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:16 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x8020000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x2, 0x0, 0x1, 0x3337ea53}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000140)={r1, 0x100}) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'em1\'*'}, {0x20, 'ecryptfs\x00'}, {0x20, '/selinux/avc/hash_stats\x00'}, {0x20, 'ecryptfs\x00'}], 0xa, "d7062dc4d197fa4743b3470dc54bb229430f91b6c3ba3ebd26a4505790de3e139e9e70e859df21"}, 0x65) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) 21:03:16 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000400bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:16 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000f0008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3351.557092][T26983] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:03:16 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x78000425, &(0x7f00001af000/0x3000)=nil) r1 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statfs(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)=""/231) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000180)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r7, 0x4b33, &(0x7f00000005c0)) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x100000000, r1, r2, r3, r4, 0x4, 0x3ff}, 0x23, 0x9, 0x200, 0xffffffffffffff00, r5, r6, 0x7}) ioctl$KVM_PPC_GET_PVINFO(r7, 0x4080aea1, &(0x7f00000006c0)=""/4096) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r7, 0xc018620c, &(0x7f0000000540)={0x2}) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x200000, 0x0) ioctl$TIOCSCTTY(r10, 0x540e, 0x1) r11 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) setxattr$security_smack_transmute(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='TRUE', 0x4, 0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r9, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$VHOST_SET_OWNER(r12, 0xaf01, 0x0) bind$vsock_stream(r12, &(0x7f00000016c0)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$KVM_RUN(r11, 0xae80, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) 21:03:16 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000500bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:16 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000038934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3351.754770][T27002] FAULT_INJECTION: forcing a failure. [ 3351.754770][T27002] name failslab, interval 1, probability 0, space 0, times 0 21:03:16 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3351.802605][T27002] CPU: 1 PID: 27002 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #86 [ 3351.810619][T27002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3351.820675][T27002] Call Trace: [ 3351.823986][T27002] dump_stack+0x172/0x1f0 [ 3351.828339][T27002] should_fail.cold+0xa/0x15 [ 3351.832937][T27002] ? fault_create_debugfs_attr+0x180/0x180 [ 3351.838750][T27002] ? page_to_nid.part.0+0x20/0x20 [ 3351.843776][T27002] ? ___might_sleep+0x163/0x280 [ 3351.848633][T27002] __should_failslab+0x121/0x190 [ 3351.853571][T27002] should_failslab+0x9/0x14 [ 3351.858073][T27002] __kmalloc_track_caller+0x2dc/0x760 [ 3351.863440][T27002] ? kasan_kmalloc+0x9/0x10 [ 3351.867940][T27002] ? kmem_cache_alloc_trace+0x346/0x790 [ 3351.873489][T27002] ? __request_module+0x35b/0xbab [ 3351.878542][T27002] kstrdup+0x3a/0x70 [ 3351.882439][T27002] __request_module+0x35b/0xbab [ 3351.887319][T27002] ? lock_downgrade+0x920/0x920 [ 3351.893698][T27002] ? xt_find_table_lock+0x40/0x430 [ 3351.898807][T27002] ? xt_request_find_table_lock+0x9c/0xe0 [ 3351.904524][T27002] ? free_modprobe_argv+0xa0/0xa0 [ 3351.909561][T27002] ? __kasan_check_write+0x14/0x20 [ 3351.914674][T27002] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 3351.920225][T27002] ? wait_for_completion+0x440/0x440 [ 3351.925504][T27002] ? retint_kernel+0x2b/0x2b [ 3351.930097][T27002] ? mutex_unlock+0xd/0x10 [ 3351.934514][T27002] ? xt_find_table_lock+0x137/0x430 [ 3351.939731][T27002] xt_request_find_table_lock+0x9c/0xe0 [ 3351.945277][T27002] get_info+0x152/0x570 [ 3351.949440][T27002] ? translate_compat_table+0x1820/0x1820 [ 3351.955162][T27002] ? perf_trace_lock+0xeb/0x4c0 [ 3351.960030][T27002] ? __lockdep_free_key_range+0x120/0x120 [ 3351.965766][T27002] ? selinux_capable+0x36/0x40 [ 3351.970536][T27002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3351.976875][T27002] ? security_capable+0x95/0xc0 [ 3351.981725][T27002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3351.987965][T27002] ? ns_capable_common+0x93/0x100 [ 3351.992995][T27002] do_ipt_get_ctl+0x17d/0x930 [ 3351.997683][T27002] ? avc_has_perm+0x401/0x600 [ 3352.002370][T27002] ? do_tune_cpucache.cold+0x16/0x1b [ 3352.007657][T27002] ? get_info+0x570/0x570 [ 3352.011981][T27002] ? __might_fault+0x12b/0x1e0 [ 3352.016746][T27002] ? wait_for_completion+0x440/0x440 [ 3352.022470][T27002] ? mutex_unlock+0xd/0x10 [ 3352.026886][T27002] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 3352.032881][T27002] nf_getsockopt+0x7a/0xd0 [ 3352.037477][T27002] ip_getsockopt+0x176/0x1d0 [ 3352.042063][T27002] ? do_ip_getsockopt+0x1830/0x1830 [ 3352.047267][T27002] ? __kasan_check_write+0x14/0x20 [ 3352.052379][T27002] tcp_getsockopt+0x8f/0xe0 [ 3352.056893][T27002] sock_common_getsockopt+0x94/0xd0 [ 3352.062092][T27002] __sys_getsockopt+0x16d/0x310 [ 3352.066939][T27002] ? kernel_accept+0x310/0x310 [ 3352.071701][T27002] ? switch_fpu_return+0x1fa/0x4f0 [ 3352.076827][T27002] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3352.082897][T27002] __x64_sys_getsockopt+0xbe/0x150 [ 3352.088010][T27002] do_syscall_64+0xfd/0x6a0 [ 3352.092514][T27002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3352.098407][T27002] RIP: 0033:0x459829 [ 3352.102300][T27002] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3352.121904][T27002] RSP: 002b:00007f0c0d48dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 3352.130322][T27002] RAX: ffffffffffffffda RBX: 00007f0c0d48dc90 RCX: 0000000000459829 [ 3352.138295][T27002] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 3352.146291][T27002] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 3352.154309][T27002] R10: 00000000200012c0 R11: 0000000000000246 R12: 00007f0c0d48e6d4 [ 3352.162273][T27002] R13: 00000000004c0557 R14: 00000000004d2958 R15: 0000000000000004 21:03:17 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 3352.206996][T27034] bond0: (slave bond_slave_1): Releasing backup interface 21:03:17 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000600bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:17 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000058934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x2000000000, 0x0, 0x0, 0x2000, &(0x7f0000358000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:03:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:17 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x10, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:17 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000700bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3352.475463][T27218] Error parsing options; rc = [-22] 21:03:17 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000068934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:17 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x100000000000, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfffffffffffffffa, 0x80400) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000100)="4dbf4adf7d26caedd5dfc1367b8d5e096c00f0c09fd7b45ebb3b37942d5702f7c8e557593f9b394082aa153f47d9dfd439da50f503d788f7fdb1086b0845a6981368fea8859108d54fef04fe7dbf3909da21e2c5676a3106323d87f9c9eeb3ffbb4c6242b7f655859db6ba47e0ae9d68b6bce2695af970b9b3782de37fb2876768d0f887734e15bf8c50883b0afe2850"}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000340)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000003c0)={{0x1, 0x7, 0x8, 0x6, 'syz1\x00', 0xffffffff80000001}, 0x5, 0x10, 0x7d, r1, 0x1, 0x7, 'syz0\x00', &(0x7f0000000380)=['-^mime_type[^wlan1\x00'], 0x13, [], [0xf907, 0x3c98, 0x5, 0x2]}) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000200)=""/151, &(0x7f00000002c0)=0x97) 21:03:17 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000800bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:17 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x125d, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10001, 0x2002) write$P9_RSTAT(r1, &(0x7f0000000040)={0x6e, 0x7d, 0x1, {0x0, 0x67, 0x3, 0x5, {0x45, 0x1, 0x1}, 0x81000000, 0xffffffffffffffc1, 0x3, 0x1, 0x9, '/dev/kvm\x00', 0x9, '/dev/kvm\x00', 0x9, '/dev/kvm\x00', 0x19, 'mime_typemime_type\xf9wlan1}'}}, 0x6e) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:03:17 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000900bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:17 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000078934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3352.781615][T27342] Error parsing options; rc = [-22] 21:03:17 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x800000207fe, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x7], 0x1, 0x6, 0x80000001, 0x5, 0x4, 0xfffffffffffffffd, {0x9, 0x0, 0x3fe0, 0x4, 0x6, 0x5, 0x1, 0xffffffffffffff80, 0x4, 0x875, 0x9, 0x2, 0x6, 0x4000000000000000, "c77380bea805ee3291a19cce97314cf463f8e3eee0aacaf79570c0792f61e61e"}}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x3, 0x9, 0x9, 0x1}) bind(r0, &(0x7f0000000280)=@ethernet={0x1, @dev={[], 0x15}}, 0x80) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1010, r0, 0x100000000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:03:17 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000013c0)=0x0) sched_getattr(r0, &(0x7f0000001400)={0x30}, 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000280)=""/3) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xffffffffffff8001, 0x8000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@timestamp, @window={0x3, 0x7, 0x60b}, @sack_perm, @sack_perm, @timestamp, @timestamp, @sack_perm], 0x7) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000001300)={0x0, @in6={{0xa, 0x4e23, 0x50ed, @mcast1}}, 0x80000000800000, 0x4, 0x3, 0x7, 0x8}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r3, 0x1}, 0x8) r4 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x2}, 0x0) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) dup3(r4, r2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000001c0)={'eql\x00', 0x809}) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r5, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) 21:03:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x80000001, 0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:17 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x2405, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:17 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000a00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:17 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000098934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:17 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000b00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:18 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x100000000, 0x5}, {0xbf86, 0x4}], 0xffffffffffffffff}, 0x18, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:18 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000a8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8341, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="fc9dd7a524885e4ace3faa443d45891921206a16685d0c4c5518c076f4a513caebb5bbb9c136aabaf0dd13b7e8a0d54d125f56a41b46168571471e381a76d41300733676192edea916b504bb91918b788ac8c1c2a7d176540e54a55c13cfb52d2a5732efc04fcac546a90f0a9a483c004579657e6976ad53eee93bdf810139a54078530e5aa48545da81f3807c5ef937", 0x90}, {&(0x7f0000000180)="8c13cf483dea2f23c9dcb169f33d20b4a5cd022659b02f55", 0x18}, {&(0x7f00000001c0)="5f884dfa340e25814f75dedddf810612307a0f07ca1dd03bc8e1", 0x1a}, {&(0x7f0000000200)="775cf092f84c0077a0dc4caad5f8c851ca31153fee8e8ea568949d2b57589e0945d3efbc9dd79dc0a50c3242497bd1d820b982782b0d55fede24bf658e813666d956a99eff44876b9bf962fb07feb8c525586aafa0480969d9f9354095fe1389489ce3438859a2258bae684d9267829a10421865071cd83cd155aa6c4d4ae6efb2c878a80fa0aa969f86e8e56fb09a06246b1029adeb62cfcc7ce39e4892748a779cddf12fd95805416b2e1a9c873226d539b76cd1f69c1aa011e230fd6547ef42f09c9f6a710a7845e9931135", 0xcd}], 0x4, &(0x7f0000001340)=[{0x1010, 0x114, 0x20, "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"}, {0xd8, 0x10f, 0x0, "e0fb8bd7482aa58d21e6b584b00153bb3d99205c97b0583b5ee53f5fdf2efa1c47693daabeb1f83cd4259b7a8e3381b9bd1ebe2abc87f92e15cdd343fc7722233bda0aa92db20c6064f2903e96e998837ca51a93021899fa691fb4690f51b60c09ec6213b1123bece6c6b36f00b0d7a5e5ac9e8a0332a96391912b863371abacf0bec9be4c9126a1b8ff0833c9b381d3a4a79deaaab296f33265de405356b3635cabcac146101c8e1a16451532570b8b8b23d9d0a346d9e52b1d91be5726fb33869d0cd7"}, {0x1010, 0x10b, 0xd50, "1aab4098457a9d081e2100ee94f7947790cf7867c3b8427d0643168ab7dc38e2aecb62575ba900a1775186d0cf26e8f6e1b5b538cee822913b2c2ca646373dbcaa03b0ca96a21288caafa75efbdcb08e30082e0043eadbb38171708ad513d5254dfea048c3ed68ffa857e14f99ee14c45d9e6f8cd77345ca95d309bd8d0cf523ddc7a9bc49ed9c32b47596cb52b3c95c90103681efa37b38e8327cbcade90685b8694b897266b4ec37ca9d238c6e93e5fc4e5a21f493812f2d9461a4c48649f31e2d21c9e3d83790ab379d0374bf324f41662443ee8b55ecff66184cb60a0fb09a57dda06721e005f89c9505c68906e21ff2761212a68d2185f1b1aa272b595b4efec7b482b4f93853b774ccd0215c358b175f85d0bfe6543fb91cd68c30affdd00f7cb5e5e61ee7c8f749172cc99c6082b4314f4d70f13c39355964e0f129640d745928ec6567c285299a4238c93c556a8f08f6722aa256bd934b744c3b5adfc63ffbb40160539bde8f3994c9639d960f588b7a21520ef913fadfe67a35fccd260d543ffcc3a2e27dbd9e00c1b9d0d51e689ff2e7ef7bbd1969fa46cca56f07f6b06dce3148dfda1e27925beba8054eeff5130a3b6aa28811d3452b570e275103ba7817a8edc196fc00d85d1be6aa84cd28d74f7cf0389b833b7634ed0c42aef55bf9265c8885bf0bb3d0289e6c17189dfd6a8fb2a20dc6cbab0c95b69d2feb8ebd7c7a44bb0a1fb3b177e51bd3d7491917bc1345a856b2385ceb3d8051f501dd29020a3867b218ba1df9702d3f930ca89bd0c3c6027539fd0d0c7c6f375528845b85d49626561d5acbf3b18adb25b0011a4c67ee21932804bf6415c7b0ac5701ab274d710f32c077bd82e06ce0b3ebaf3fa6be6c44de5adff41af07101464b6171b0e72421f3864a9acaaf0c622bdd83dc4622281e54dd0fa964e538ff757bd9cf333595fa77456dc0c7f6227c349f0f25b0b0b80dfc604b8fb2676fc0cd524d903ed6f7a36a4be0f322de1a6cd285f073474f8aeeb8576905be656a100a874c77e5203d1822ec111906c8e7b768d2bf2bdce9cad8c16ef2876f7e11a4f2cf81e987ddf5668e459169ce98034a832b39e9df700dc6eb38b415553b6b65c6f6773be0a0eb7c3901e9d5605ffcb2a03668016df0958e53b17fd26ab07b3cf02e63853b38e4a6076dd69313d305751a741afa6d977b2448db0f0b751bdde43773aec8cece1be85ae7df788c343724e5386e6130f80d5764717a94930e101cdd83fb2cf48ba58b2ba651290c46ba0e61c80093c1fd58155e2dbba4feaba136c73952dc0433888fe0da07a9ec9dae7454df0ae1c5a560375035d9b83514317d5cfbde0bd9b2110ca9dbf084237bcb0d56dcabd80a5f28069d7d45bfd99d141739f99244b344132cd0351508067f1e3be628f0eb6acc0fb8d53b560c60d36e57be5f822dfa0e31a9b2df9684e35a2616f2e2c595f3c24798efa018d79526a62b9b86e6b201875ecf5de7388c73712215e9941e4e8a5c902418bd3d600a4d6b3f6196916128c9791b4d5e6550fa081d93548d2bce14eddaf26dd318e228ca713461a9329775b2538544fc8d86f191eeb42d508a6adb1477729a9244cbb60c862c25c362706b695fc0701e8f7404c04ea328851ecbefba8e1ac529b45ea57c7e0f36e62486675724af33b8f8af568987c6e6c8549e43f3541bb8e5996cbfb34e5bcc558a322f36b592f8c7f25b99a1f4e5690c3a85c946f6ef6788d00a75957c1158b84e5cc02e811c8ce817106fe60040f5bcd6d867dc62670adfdf79ee3e7e94b7bff72321ffc687fe43fc1d028250a2f6ce8433ddb21b2e0afe6e48ec531bf3694072036beb66b1e4cf943ab5b09279b08bf92e028c751626c6edf6f2dd822c9d360b036fc875b31029d74428f205d41121c26e4bf2a13a8a3fe6d5ce0cad0f62d677b3ab0a546937fe3ce77a2b14f4609b92110882783ebdf812e2c25cf6b4aaa48b6b0ac791b1738468a52ab3bf27638dc4cf6101f7b372f0f1f92580fd3ed18c0b5904d46195879bbcc732abf1988451e1921ee27c6d8b42c46eca336dbe399491236c5fdcaf03975e25a0f6d734933ab7bb2b3d8e1904735b866aa9bdd26864382e106fd12295b9b2dc5130a3deda594b0f591844df4a488c15bb101cc7794799db0bef6c43411289cb179db3d374c2a1bdc9813716bcd7fc31323300ac9dd5d95de6efbfc409fa8392c4b76071d014197c6394f2042f2a8f6ed8c9c7cb7343d0ac7215b9454c3bcff476111968558d2175cf7f804bee673537179749c333944ebc7c7d9c541920c4ca2ff522a0f1276b6a76f3a3430a4fd6d20d2157b07a474d94996651d526f6848554e472e049c9f316c89beba96eb1e473f296f221bdf5efec98da1d4511d741ec02421351ccfd5a2047dec6ce69a07de591a3e05341b7e856447268c06a18c9b5ffb9e89b0ec4fe6d38e3d17742476315322723fdf7f5ab22258bfefe3893e76047b94ce658873028e99e8a964b49185858cf40d9c5fedfb3677ec7789842f8e29e43d6028fcee5dccf600b2428db7e497e66f87f29fff4d1f47e142fdeaf3395d2261969b9d75aa3a4dcde264dd905f82741c8b92a1e71d9abe4b17fec463afe54d809bc88491b3888d57dc4252bb5bd32f5a5d0284db1437596067f8eea8538b967394092b8c82c6f98aba6528869b01d4be88be0642bd756dda487139e8a8b829f9b073c74754f200e7d779c14ed7763d6110f1654cc62de3e4efcd345f50d65f86b04427f633adf3a15a785f8ac10f8af52762843b0052a9b48fdcda587f811a69741eed4c9f1d8bdb026b97cfb8b12f56e92409a2f0934c99545fcabec8dc8f14e878bbcc50d241d3e70ef2a8d0ce144f71e7263e134fc4a34113208114a034a68c42aa690fe95e3eb52ba5cb1c3160c010f9620f2523cab100ebc86011f40569a8cbae0bb200e829718a33a359e3e90f981cdf1066b1275ff74df00b65629ca20a312752ecaf2efc4fcc7795cf60e719f830322242727f418bfd6aff6cc5ae5c81992ca0a7ac4acadc3578a1cb76bba14d7166b16ae1b2e5db4a1d51a2d687dbcb9a0f9e08e6c48e1d4b1a20c6255496b0e4a0c20e765da54cab26b0864887c3f669d38ca9ce15f893d63097c0da4afbb9f99913bdfb77c8f2ec84ac2dc051a4f449e94ae26f8cede524da378941a685611883c6962582a92d71c3e024f7085d6b75b33b0f8a5207303f7e11edf24bb120b7c7ba95ee84262504830168f4ff596c41bcc832813c2199db1b0eda3ede39eaa7c13fcd570fea4556b8312b07dfea710d4958d2a360e2353561f9b3346635492826603e0ac0c81d0ab8a9a7d578b765109fd19f00a9c0c4bbef7580f2569a4e5a1f2289649ba675c3ec05bfb39e5732e52e9fff3883318419a54f875325365f218879bfff8d8db8c728a20eede8523cdaf700eba8bfa54aa8da6ce416e3136e6d811d28c731ec7ce1aeca0613a5f06f4586645a9bce29e79f567293b592d4c68b34f7c3f32e8de1728e8413675deef4d5761bdaa776223e1b631fadf27eea62fa8ca6b05049d55f2f1d72ffa34b5709286fd8c8970d6a22feb0ab565268195ec0c28968f36f31c4748ecee84d78fc0558adfb58998fde9e848f5400f3ea16bbe08ccd2aec35bc0e64339a8fe4984248c7e4505d59220245dd2660f25a6eb90e7aa049fc2f4cb531fff43ad642594eae04e477327fdeb7d71fa39977cc14faae8b4ea32163a3fae3f53d0425b598d2dcf8b32f0be7a340d22b9ef8371073bf50a4f443b3b9f9941d5c89c7338cccddf1fd2d4a7aa8290f17ec6a8295f7fd706f0bfb6dc20308b6e34ab44fcf70c8ed4495c06dcc57c371a8f4776e2afd2d9e30a167c8e6c9ed5a17429ec3484202247de32bec940ece0ab35a2449fadf08ab606b96d10d8d8d417c4b6d15e635ce4a746288958d84de5710794fd3984449fc4ba9fa6e5f163c5a0549bf46e3de165e83325d6c477eebf308050c5fa9334932e59e6c6bf6d05272cb1320ad1452a8ee50a52b7f3cb7ca2ad0d8abbcdc3679f96adc9e7a75dff24f8419bd4b580aa7ca2ec1b5bfc44e267ce4a001e23d12038a0675bf7a55c6a603bc5a111c8e6715714c6b5381345d854dc60ef41732f3ff738aae3880760bd1e8a78a6cba0006fae4bc9a0dd6f7249c3ec98f464cfb99b215f6285d5b454b703619c09612681ebf62810eed9a6e6bd3cd62d2c03532260b174763b859d257fe4935950a3721c94460835f3157016a0b7163cc9216267d886146065cebdc219c86c1ec0c2337d3214586576c7279cd22d7fa56b8513cd9493cb7f58fb15ccf715b38cf3355f74e44a931c21e450a2d4023f95bcc42fc76b2ecd9c82a116f760ccd7586992fc707224e185bba37137d02809e3e32de9f933d0bd8dd4bebcf768d2949ee4b9b60178d7321cab56711833a154e44b5039db023f69af15b1eb3338ffae1737efa2fa61e08d2b4610803e59534884bae1210788dc161c9287e6d6a0993b2099983fbdb46484b6efe85d9a81e17b5cdeb6f046ec0096f6cd3fa0633d9de2ebdba1c8f54e8601ada9f9fdb23f35755cd6a1dde7d095dfddfb20efe1256b7b29fd6e5facb08e80ffa82b44175a8c064c49d31479578950587a2f5110b0e28cded83c592f34b7a5e6340d793f530a4633c7e921b2553905171c52e8572741622ae9677c1f5c68dc288635c0910311a5fb03d6e5314ec754aa98af51ef7776766882f14950eab30d005a4ce202d80b027a9d093fedfa282a9af3cc7c4a0ce7edc0b4429046dedb17e6162c970adddad9299c1e3efaa13c91d1c39148d5ded3f6efd8ba8e1b41ea728f86d929d9f36980ffdd3283d68e8f3a74f1067e866686057b8f8c274b956de668d3855262794ea6c5dc675ba65d4a114e9e97465dbf7923173194369ac38fedb252ca8482ca0ce7e309fe73e92deeed5ca54f5567127bfb166d9e884f3fe55b94150e65c83502cb6b6b709e9ea4e8386487b08b0136e405ad18ead48428a252f036e9a19ad39c7a8142a8f6f550931a2bbce9613043b4a75094ed6b0ca87e49f3f0c239a594fd6e8f2e3c8addd1d0df17ad245a4075966bf59e75f2797857fd48c009c6f1a68eb23f89e45821d6fe1373ce170ffcca442ac23dd0877201538ea0611a684f788c8c5845c80f24daa95b70e22cf88e209167cd5ffb9322443558b3b514331cd71d69b3b30882fa4a0f86f4309cd189a6cbc2e991d9a3f5fa6f15f618623e4eae6f69e8a879865b1b53fbbb27907dbb340ded8b7f9269d37e8f67bda410b07aff135e6f686b7039da2c3e03633dfdbc8279241fd3acf9d4cabb19346d268dafbb5b00b6f78ea5102b5601ed1bfce5066170236503ab2d5203299f284ce54a0ce3b241e4630830c185bf992030d64cdf37b68856220b9d457b5240c424b99ba165b8107df272d53ba2875b4514dfa45e1110276bfd8de83a6b51d08743f13bb5cd7ce3b5c9b3ef4a03c8af7777111a77d3326d8a7ce3148cd97ce54881485762071178f1ac5f82dcab076aaaf34a728f91dab775c0c1e86c8db7d1e1a5a2bdfca0c58c6aa4442de1ea99dff1630603ab924e85eba4fd596cad570fe141139fa995a9455ff3d1c79e1d240a09c295ad4a369c2f1e2a38c06436333912e7be9a5a960e3789aabd8c0a100f612b4eece68e4ef6023729f686b1244cbcc4dc8d16f1250379015156838764042f0b3aebacf436c0d68f421fd93b7d12bed5736e5e5e540836ffcc5e528b9d15773ebf93"}, {0x10, 0x112, 0xcf5e}], 0x2108}, 0x1) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000003480)="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", 0x1000, 0xfffffffffffffff8) keyctl$instantiate(0xc, r2, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000003c0)={'raw\x00'}, &(0x7f0000000380)=0xfffffffffffffeca) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x8, @local, 0x4e21, 0x7, 'wrr\x00', 0x4, 0x3c, 0x3f}, 0x2c) 21:03:18 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4b47, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:18 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000f00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3353.341586][T27787] Error parsing options; rc = [-22] 21:03:18 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000b8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3353.451826][T27841] IPVS: set_ctl: invalid protocol: 8 172.20.20.170:20001 21:03:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x80000001, 0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:18 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:18 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0xfffffffffffffffc, 0x200000) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000003c0)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000400)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000440)=0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000480)='security.selinux\x00', &(0x7f00000014c0)='system_u:object_r:getty_var_run_t:s0\x00', 0x25, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) recvmsg$kcm(r1, &(0x7f0000001600)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000001680)=""/55, 0x37}, {&(0x7f00000001c0)=""/239, 0x148}, {&(0x7f00000002c0)=""/196, 0xc4}, {&(0x7f00000016c0)=""/208, 0xd0}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000001640)=""/14, 0xe}], 0x2, &(0x7f0000001580)=""/73, 0x49}, 0x1) 21:03:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000080)={0x200, 0x0, 'client1\x00', 0x3, "b018042e1c8f680a", "7fa03ff11ca10ae1858fc33b06061f49bb91ce56e6ddcbb5aae11b35f3121c8b", 0x8, 0x81}) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)={0x2b, 0x4, 0x0, {0x4, 0x235a124a, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:18 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4b49, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:18 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000c8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:18 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000e8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x21000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:18 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001100bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3353.953424][T28021] Error parsing options; rc = [-22] 21:03:18 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4b61, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:18 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000f8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:18 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/full\x00', 0x200000, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000a40)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$nfs4(&(0x7f0000000340)='nfs4\x00', &(0x7f0000000540)='./file0\x00', 0x10001, 0x6, &(0x7f0000000880)=[{&(0x7f0000000580)="56da024be4db07a600e139e92c7e13025332372ce8b0d39b464bd076b1040a61165a837771296164d18dc9a4e51af31e2549ab76b2c51c409cddf8b3b1b48cd2f88e73215f5cb147e7a0a6994a93d0006678dc851c9155d9dc5d552918ccad57625c24a73c84e203ba0df02f804fca", 0x6f, 0x3}, {&(0x7f0000000600)="d86a1996cb6b6a900666b781a9c3b79591f9dabeaab8decf403976888b17430031c9cf5957593807d5d87574cc1c44e9bd13bddebde4cd1fbcf2bf53228247a4e2171e960c475121055a848e24239d901cf6c36275cfae29efda70dc4d1c2bc6f23a8e", 0x63, 0x6}, {&(0x7f0000000680)="9bddbd2faf3c9949a10419390a39b98483b20d7a7bd68177dac4697e13a7624279c11441fe8925d0ec17a48a50f22e1c6d79079730cb5ac96b21ed66c9e4d2394ce8cfee0cab91d5952e7ced499e0497a050089ba8b7d9d02bfa7bbd220cdfa7f91c93dbbbb10fbfacad8cfeca91818516ce733e208ed3bfaa09fd5bd3263a4f840936f6b57dba788e733179af26e3f119ea9c41cd13edd5139bd31e6355bf6c5d509f51009ca2f3e1ad7431900f3c2c33aec24918a17163ec8e646aab4a3a", 0xbf, 0x3}, {&(0x7f0000000740)="38852281198f8d170a3711ecff6f16ed48ab468fae11047006e67a1879", 0x1d, 0x3f}, {&(0x7f0000000780)="6cc576f09fdf347e39968e7abf98b40ad1eae10040e28d7542de557310f94f2ddaa3cd1b4c726d0c80da2ef472228744537da18a3e47fa00ac1c3943049b734ee6940878fd321361d4752d905908b7c3d74135a029e17b872944147bff519dfebc5fae2e92d9962ded3f7d07f1220bd85712da3412df7c302b2c9606f3bad2489b5706e1686aae1acd462fa71cfa56cc568301d75f19195719", 0x99, 0x3}, {&(0x7f0000000840)="dae7288e81bc361fa7891801c35eeae27dba87f94b9c610d6b2e78be62dd40b8385673e4b608c652171c", 0x2a, 0x3}], 0x20008, &(0x7f0000000940)='^vboxnet0\x00') syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="7d88471fae260b4e5edcc44864050eeaac2a14c011b0f22c6d468a81fe7cc45ff753b4d09ac4189e77458591ac3a91fac20ba03843ad20d71048919ba976dd52fd2e61a273205b0428b7110834411ac048530e941993f42a4df64e31ee00f27a7852987db3c6aedeebb6d33c0e959b3dc1457f4fb9e2979152a08f88e1be74ff1008788ad2d6c7cfc9d926acb3b4892a95a33b1c271bdedde08553ff16c0ee310b3b8c689bb9c41febbf49b5a802ca455535ae5ec1811fd34d662e4c68a62a1ebc5c5d0bceb3e5a4d3dc94fce256fcba59f3ffa309fd77579379785ffaeb30b1e1e85a5b20bd5e", 0xe7, 0xfff}, {&(0x7f0000000240)="580fe43fbf9659c303e2f161956469103b7b01dc60e1e38c3b3efdbd7725a592d70c1640d881ed9b64acd6b56d3f45b49a6de8ca8395634bf4a37f578268bd00b1af76bbd57f86a13c9dd92478696a4b42897e20f6ecb30f0aa2e92d6a40a82a466127459154cb25fbbe28d18164a300de9a16d08ffeac2ddd4fbb4782923b4eaef1f3fb9646f03bda840d7ec052d06c0333456e7e473ca8b1d663fd232d94e5e77fc2c5200c2ddfb853254a949db6dfc2e102f9e8311cd2edff8c3e3aad183146af6fc729eef37d27c5b3dbf7493045fe49a36b11af0617dfcdf843d6e4cafe2e760e6322", 0xe5, 0x5}, {&(0x7f0000000340), 0x0, 0x4}, {&(0x7f0000000380)="b497d323850d1743c2883f1d25d769f210e0c52e33d46fa1a8ab6d70e6913e1b7693de", 0x23, 0x800}, {&(0x7f00000003c0)="54eadbd1f3b4a6c0f36b6a958589623761d9385458b2c03834de036238768aa2faa85fed33d1cf5420a2e6298758250bc885dad73511a68d247455eb455aa65a16f8fe5ec9d45294023bb8116671b02825b28e80d56b9ca22902c0078dd6904e502bf25b2880822a197368d1b9c447f232a162c18dc0afe567816015bab9514d9377a36b891c9f1f4df043720c7401809113482135e57b105696c95b598cae5d", 0xa0, 0xfffffffffffffff7}], 0x2000000, &(0x7f0000000500)=ANY=[@ANYBLOB='sewsion=0x00000000000p0005,seclabel,\x00']) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ashmem\x00', 0x20003, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$get_security(0x11, r3, &(0x7f0000000980)=""/25, 0x19) 21:03:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x80000001, 0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:19 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001200bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:19 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000118934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4c01, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:19 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001300bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x80000001, 0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:19 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000100)=0x1) 21:03:19 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000128934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001400bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4c80, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x612, 0x70bd25, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8800) 21:03:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x81, 0x40480) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') creat(&(0x7f00000000c0)='./file0\x00', 0xc) preadv(r1, &(0x7f00000017c0), 0x333, 0x0) [ 3354.695989][T28588] Error parsing options; rc = [-22] 21:03:19 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000138934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001c00bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x294b}, &(0x7f00000001c0)=0x8) recvmsg(r0, &(0x7f00000018c0)={&(0x7f0000000200)=@ethernet={0x0, @local}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/230, 0xe6}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/125, 0x7d}, {&(0x7f0000001500)=""/164, 0xa4}, {&(0x7f00000015c0)=""/27, 0x1b}, {&(0x7f0000001600)=""/133, 0x85}, {&(0x7f00000016c0)=""/133, 0x85}, {&(0x7f0000001780)}], 0x9, &(0x7f0000001880)=""/35, 0x23}, 0x40) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:19 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x540d, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x9, 0x2}, 0x8) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:19 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000148934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe006000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:19 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000002c0)=0x7, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) [ 3355.059635][T28819] Error parsing options; rc = [-22] 21:03:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = pkey_alloc(0x0, 0x3) pkey_free(r1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x0, 0x10001, 0x7, 0x2, 0x3e, 0x10001, 0x105, 0x40, 0x139, 0x8, 0x2, 0x38, 0x1, 0x6, 0x6, 0x9}, [{0x60000000, 0x0, 0x9, 0x7f, 0x80000001, 0x1, 0xd0, 0x1ff}], "5e9a9d1d3467fc28c3663eb0fbebd4e5ae3b0eea46d3f266a66ee3689319fb00a67fbc382ac6d1c02cd6cfa9de27d014241ff0cea13c1b17eafe070d4394818c4412f47ff8526f8b6c8124899d77b9e54df17d9750e168fe94d266fe3b9a213b017abe4a456c1169fa5bdd810b9537b390d29a714f8665ceed218c89802743320c4820e07bd02a7fb51aaa229a248cf9194d684b1ac36d5b3dc605cc12da6f174320499c0bfa33e539538f5e7c64ce1d", [[], []]}, 0x328) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:20 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3355.200507][T28979] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:03:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000037178934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xc) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:20 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:20 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00e100bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x3b, @rand_addr=0xfff, 0x4e20, 0x1, 'dh\x00', 0x20, 0x0, 0x24}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="5bbdca202cc55264f84a6a4de96b85d6bee298359ac4718c68c44309588ffa9c3108d21111447b729dc66660f7bb3cf4fe937c7e9ece60ae9136cb09035939989f58ce7ae42c361900"/84], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x10001) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 21:03:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000001c8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:20 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x541c, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:20 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00f000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3355.571820][ T26] audit: type=1804 audit(1564779800.335:256): pid=29167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir730521562/syzkaller.FOWHpU/3036/memory.events" dev="sda1" ino=17656 res=1 21:03:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={@loopback, 0x6e, r2}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r3 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x1) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='raw\x00\x00\x00\x00\x00\x00\xc6\x00', 0xb, 0x1) 21:03:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000208934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:20 executing program 0: r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @rose}, [@remote, @netrom, @rose, @netrom, @remote, @null, @netrom, @null]}, &(0x7f0000000040)=0x48) sendto(r0, &(0x7f0000000180)="dc89ec5dd82bb867a2f9032ee4f1af7a89936201effcd538cbcfab84923b840e46848814f05a", 0x26, 0x20000000, &(0x7f00000001c0)=@un=@file={0x1, './file0\x00'}, 0x80) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:20 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000003bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3355.760127][T29300] Error parsing options; rc = [-22] 21:03:20 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0/../file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000180)) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000100)='./bus\x00', r1, &(0x7f00000004c0)='./file1\x00', 0x4) [ 3355.794599][ T26] audit: type=1804 audit(1564779800.425:257): pid=29273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir730521562/syzkaller.FOWHpU/3036/memory.events" dev="sda1" ino=17656 res=1 21:03:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000017378934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:20 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5421, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10034, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x160, r2, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x39}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @loopback, 0x6}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xed73}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x94}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x68a7360b}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x81}, 0x4040) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x0) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000001000/0x1000)=nil, 0x1000}, 0xfffffffffffffffe}) 21:03:20 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000005bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:20 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x4, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200002, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000100)={0x1, 0x7ff, 0x938d, 0x3}) [ 3356.017636][ T26] audit: type=1804 audit(1564779800.425:258): pid=29167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir730521562/syzkaller.FOWHpU/3036/memory.events" dev="sda1" ino=17656 res=1 21:03:20 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x14400) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") sendmsg$alg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, 'GPLvmnet0:)trustedcgroupGPLsecurity.keyring\'[eth1'}], 0xa, "3fc8349efb1680e87bdd4203d08b6ee1b48c83789aab48819794ce96c4c1c9fae1e497567103f99b8865699673a677bdee9fe227ea0c9844ef2a1a11f5ab52d2aad501"}, 0x80) read$alg(r2, &(0x7f0000000040)=""/38, 0x3d0) 21:03:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000003f8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x80, 0x2000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x7ff, 0x101}, &(0x7f00000001c0)=0x8) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0xfffffffffffffff8, 0x4, 0x3, 0x2}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:20 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000006bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3356.140721][ T26] audit: type=1400 audit(1564779800.885:259): avc: denied { create } for pid=29508 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 [ 3356.182753][T29511] Error parsing options; rc = [-22] 21:03:21 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5450, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:21 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000007bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000408934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3356.377789][ T26] audit: type=1400 audit(1564779800.885:260): avc: denied { write } for pid=29508 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 21:03:21 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x80000000000, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000009, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000080)={0x1, "367683793611e7df49c4ab282b4935577597a5dc47d38811a6bfb910ca926a24", 0x1, 0x1}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 21:03:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000065588934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:21 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000009bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3356.595678][T29837] Error parsing options; rc = [-22] 21:03:21 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5451, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:21 executing program 1: syz_emit_ethernet(0x5a, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)={0x0, 0x2, [0x1, 0xc17]}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20040, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000040)={0x9, 0xf6, {0x57, 0x9, 0x6, {0x1, 0x2}, {0x5, 0x100000001}, @const={0x3, {0x5, 0x200, 0x0, 0x7fff}}}, {0x54, 0xf3ea, 0x3ff, {0x4, 0x1}, {0x3, 0x23}, @cond=[{0x0, 0x0, 0xfffffffffffffffa, 0x3ff, 0x5, 0xfffffffffffffffd}, {0x6, 0x1, 0x8, 0x6, 0xfff, 0xffffffffffffffff}]}}) 21:03:21 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x9, 0x7, 0x40, 0x2}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x80042, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200)=0x80, 0x4) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) epoll_create(0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'ecryptfs\x00'}, {}], 0xa, "7db7dce2d7ed6bbc785d8921987bfb41934fb093b39ad6a5e120051441f0a80c3eab1f7af87698b2b6df8023d183702475845de9f426c84fcceed98e37eff1f1938c071cbddbb44e0d7e9782484051d13b18a3465ab66406c68463375a4bf35d8c2736bbcbfa66d7b064b2c933cdf883422a2faeb93f01121d86fd18e44e2977552bc9e4fdc64d8be1a439c59d0f09e373f76e14e0397824b93de290"}, 0xb2) 21:03:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000608934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:21 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10032, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xfffffffffffffda2) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000400)=0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) ioctl(r1, 0x401, &(0x7f0000000240)="f94c940cf47042aec80f9f837e9e326ae2b68b64dc47f5eff6af4ef99a09ed504a8d9208a10ea8066e423010fc2f9b25a62ea21b2b83414ad2fae36fb318fcd7e7990063590aac2a47aafe1e667f003fd8d287f4761f87c08c200bf971338257598d420cd90b8ab1c1ec64a93950190fa4e7d659d10f9665e00575b231b6882c11c22c9c75eeb3bc608b56") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000440)=[@in6={0xa, 0x4e22, 0x9, @loopback, 0x80000000}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @broadcast}, 0x3}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e21, @rand_addr=0x8000}], 0x58) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) fcntl$setown(r1, 0x8, r2) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="44e7eb1970c510ae510bb90083dabdab0284baa920002a0d6f20cd84746497f92c06d2373917eb5eb9edaade388cbeb23bacec60f27c9302ffcebfd595eaa4e4db3161d5ac6777eaf4719503d53b0b8c85f84671d2bbba87cdc933b66a880c451d089c8daecdb4e2f7d902f5cb00aee7eb86d4120478b0f7b5d703116e796e9e2e9cf834c7f97d777f33658c543fb79328e7cab9f2eef665cb46265d5cdfdea041749746f63cec926f96a523b0", 0xad}, {&(0x7f0000000000)="fbd1daa25b5e5daed9dc5a4ffc30087cc5a2c09f152d5adb9761d7d6a1fb9bdd7a11bab9fb334cd1a0f65af984e24769224110a50eb8", 0x36}, {&(0x7f0000000140)="81353a85aa545470ad72c37d184bd8740a302a79536731832681b90f8bd88a796bd190f8943fc97cb61588938ec50f6fbabc8b9de2e6374ca1a8cb6769b4b57248f6610d5ae1abbc09a1d6e16cbfbd50d7d93d89b192f821f4ce33b7c1630efa16ae9ab07463ddf0b2", 0x69}], 0x3, 0x6) 21:03:21 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00000abc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000009, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000080)={0x1, "367683793611e7df49c4ab282b4935577597a5dc47d38811a6bfb910ca926a24", 0x1, 0x1}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 21:03:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000058658934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3356.972151][T30065] Error parsing options; rc = [-22] 21:03:21 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00000bbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:21 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:21 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x4, 0x40000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000004c0), &(0x7f0000000640)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x41000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000008c0)=0x2) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000740)={0x2, 0x1, @stop_pts=0x1}) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000680)={{0x3f, @loopback, 0x4e24, 0x3, 'dh\x00', 0x1, 0xb06, 0x62}, {@multicast2, 0x4e21, 0x2000, 0x8001, 0x8, 0x1}}, 0x44) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000880)='./file0\x00', r4, r6, 0x1500) fstat(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000700)=0x3, 0x2) prctl$PR_SVE_GET_VL(0x33, 0x1856d) r8 = getegid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendto$rxrpc(r2, &(0x7f0000000580)="3139aca34e5de2335a4f9d5eda645fac78d9778a72e6a1da4c0cea67b8ac51fc830d11f218f6686af5fee35231b142ae35c05465fd061d201feac901a52aa3ae2c37090aee9d34d25e21580c7e81f9e99badefd32d160abeaee5ac5f7402efae834e5845728b7907e6c55e434095cafbd08d1cd693457492ccbc612b981e7ef806219dbdaac0dc39a20bf0fffd", 0x8d, 0x8004, &(0x7f00000002c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x1000000000000, @local, 0x1}}, 0x24) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000007c0)={{0x2, 0x4e20, @rand_addr=0xfffffffffffffff9}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x8, {0x2, 0x4e24, @broadcast}, 'ip6gre0\x00'}) getgroups(0x3, &(0x7f00000003c0)=[0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000280)={0x5, 0xde96, 0x7fffffff, 0x8, 0x5, 0x1ff, 0x4000000000000, 0x8, 0x18, 0xffffffff, 0x1}, 0xb) getgroups(0x7, &(0x7f0000000400)=[r3, r5, r6, r7, r8, r9, r10]) openat$rtc(0xffffffffffffff9c, &(0x7f0000000840)='/dev/rtc0\x00', 0xc100, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:21 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x98f905, 0x3, [], @p_u16=&(0x7f0000000040)=0x390e733b}}) unshare(0x20040000) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x200, 0x4}, 0x10}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x9, 0x1ff, {"130440f312d4d8195dc344890d7925cc"}, 0x8, 0x8, 0xdc}}}, 0x90) write$P9_RAUTH(r0, &(0x7f0000000600)={0x14, 0x67, 0x1, {0x12, 0x2, 0x8}}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000640)={0x1, 0x0, 0x113f, 'queue1\x00', 0xffffffffffff8001}) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r2, 0xab, "71eab2", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x6, @mcast1}, r3}}, 0x30) accept4$packet(r0, &(0x7f0000000100), &(0x7f0000000140)=0x14, 0x800) futimesat(r0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={{0x77359400}, {0x0, 0x7530}}) 21:03:22 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0xfffffffffffffffe, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1518, 0x200000) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffffffffffffe, 0x7}, 0x10) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000001c0)={0x0, 0x5, 0x2, 0x9, 0x7}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) 21:03:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000818934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00000fbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000e18934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5460, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2801, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) 21:03:22 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000011bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000100)=""/113) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x300000000}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={r1, 0x26}, 0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000180)='vmnet0&#\x00') ioctl$TCSBRKP(r0, 0x5425, 0x9) 21:03:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000f08934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000012bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3357.692956][T30559] Error parsing options; rc = [-22] 21:03:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipx\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x7, 0x8, 0x5, 0x100000001, 0x0}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000003c0)={r2, 0x5, 0x5, [0x7, 0x4, 0x9, 0x0, 0x8]}, 0x12) write(r0, &(0x7f0000000200)="118186ebe732408e54c3afed8722f24f03d93983bb3314de11054f3d76da1842fb095a06397568af434c3304e2d434db0d7843b09d30a83e3bd29082e3a0a441e225ebb21ebcadddd04835b740a9fdbdb9d37fd56c5414a2c9481f6891017f832ab6f7cf3b509a6a36edae1300ed8bf63bb07e1af0e535361ddb0290e39deb90cb3b003e539589c1a9ade4ec55b6cd126c40929ce9c2f3bd85395f77f4fca47fc1e5d64d5d2f54032bbf47bbf1acf25bd4be694a87f994d23b68f3af46847d6d09aa8a70c14efcfb3fe2ab", 0xcb) clone(0x4001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0xc4c, @remote, 0x29}}, [0x8001, 0xeb, 0x4, 0x10000, 0x0, 0x2, 0xcd, 0x9, 0x6, 0x80000000, 0xba5, 0x0, 0x1, 0x10000, 0x5]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000001c0)={r4, 0x101, 0x10001, 0x100000001}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:22 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x6364, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x22000, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000300)) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x200) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000200)={r3, 0x800000000000000, 0x2, r4}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0x0) recvmmsg(r5, &(0x7f00000000c0)=[{{&(0x7f0000000e40)=@nfc_llcp, 0x80, &(0x7f0000004580)=[{&(0x7f0000000ec0)=""/92, 0x2f5}, {&(0x7f0000000100)=""/168, 0x3d0}, {&(0x7f0000001000)=""/253, 0xffffff35}, {&(0x7f0000001100)=""/231, 0xe7}, {&(0x7f00000012c0)=""/90, 0x5a}], 0x5, &(0x7f00000013c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007fc0)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f0000000280)) 21:03:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000028934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'bond0\x00', 0xee6}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:22 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000013bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl(r0, 0x10001000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070e7929ee0b0bd4cc9afeaeb85761ce91e63b4b5922631929d94fe1297d4c49cc066642cf1befd30680b25cd291889b11266173048cefc38c4193682a85ed913b76bd4cc370000000100010000000000235a820a086bf9beb22dad03139b92f020a797459c36c05c19a311c925e53357f2e3a358f96f7350467d90debbf8bd10350f5b0a09bae25d6f05d1969ccb8c58f13074d6de5f102f7723e18616b279882067d4de9a820bf52ca626e0e9e4eb8641b58a0c590f9ed11ecd16628f23fbe5dd85aaf61e3cf4d7fadfe57047ff0000000000000000000000004231d572b6f7cfa862e658c4479df46fd675f36e28a71a") r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) 21:03:22 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x6611, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000038934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x2800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000000c0)={r2, 0x1}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:22 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000014bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000048934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3358.138128][T30791] Error parsing options; rc = [-22] 21:03:23 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x6800, 0x0) getsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) accept4$tipc(r0, &(0x7f0000000200)=@name, &(0x7f0000000240)=0x10, 0x800) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x74, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x5, @empty, 0x7}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0x5, @loopback, 0x887}, @in6={0xa, 0x4e20, 0x8001, @remote, 0x10000000000}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0x915d, 0x3}, 0xc) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x10d, 0x10, &(0x7f00000003c0)={0x0, 'dummy\xff\a\x00'}, 0xd6) 21:03:23 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00001cbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8901, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:23 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2080, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000100)) open(&(0x7f0000000140)='./file0\x00', 0x400840, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x80000000000000, 0x0) 21:03:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000058934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e20, 0x1f, @remote, 0x20}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) 21:03:23 executing program 1: socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00002dbd7000fbdbdf250900000038000200140001000000000500000000000000000000050000000900000100000800060003000000080002004e230000080003000000000024000200080003000700000008000d000100000008b60200010400000800050003000000"], 0x70}, 0x1, 0x0, 0x0, 0x840}, 0x80) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x27f, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 21:03:23 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00441fbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000068934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8902, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:23 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x100) write$selinux_create(r0, &(0x7f0000000180)=@objname={'system_u:object_r:chfn_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x1, 0x20, './file0/../file0\x00'}, 0x65) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x400, 0x40000200) getsockopt$inet6_buf(r1, 0x29, 0x2e, &(0x7f0000000200)=""/193, &(0x7f0000000300)=0xc1) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000100)={0x76, 0x80000000}) 21:03:23 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000020bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1000000, 0x10031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x800) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)="67792c589aa684cff03d62d441524fe380f87c631405c8d0132a408a4abfd51d2ee26d5abab52277770e61e0c8d6a7eb9e54b8707729daee4013214581bc03da4c3c82a0ab1ba777b306dc5f69e972ae1c9dcbd05a1516bd9ba3839519d19e0a385f83eac81a42e99acfc9e7bd9b5a49ac788481d25e50d63addf63a0e7c02b97ae0541c07b2a0fe7a11cf3f"}, 0x10) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000078934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086607, &(0x7f0000000180)=0x7ff00) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) 21:03:23 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00003fbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3358.841393][T31333] Error parsing options; rc = [-22] 21:03:23 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8903, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000088934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket(0x1000, 0xd, 0x9) getsockname$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001a0081b4e4050c00000f00fe0a9ac32e0073fb8606547fcee40000000000fc", 0x23}], 0x1}, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 21:03:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000240)={0x4, 0x7fffffff, 0x927, [], &(0x7f0000000200)={0x9b096f, 0x9, [], @p_u32=&(0x7f00000001c0)=0x100}}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/186, &(0x7f0000000140)=0xba) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'tunl0\x00', 0x2}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:23 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000040bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:23 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000001240)="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", 0x1000, 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0x4c9a, r1) clone(0x3ffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_NAME(0x10, &(0x7f0000001200)=""/35) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000098934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3359.173026][T31541] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.1'. 21:03:24 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8904, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:24 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe001f44bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000a8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3359.233355][T31603] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3359.254159][T31579] Error parsing options; rc = [-22] 21:03:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x4}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000280)={r4, 0x3ff8000000000000}, 0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="b7f2288a911993f0265df5cf1cdd8b04b062950b615100000000f9ffff8d00008de94ba5ba85c38ed4e927", 0x2b) r5 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x759a}], 0x30}], 0x1, 0x0) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r5, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x7510}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x23d86, 0x0, &(0x7f0000008bc0)) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00', &(0x7f0000000100)='aegis256-generic\x00', 0x11, 0x1) 21:03:24 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000060bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x1002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000b8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8906, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x30, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000080)=@rose={'rose', 0x0}, 0x10) 21:03:24 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0000e1bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400240, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000240)={0x3, @default, r1}) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000180)={0x1000, 0x5, 0x4, 0x4, 0x0, 0x1ff, 0x5, 0xa8f, 0x2, 0x9, 0x8000, 0x7, 0x6, 0x45, &(0x7f0000000280)=""/252, 0x4, 0x1, 0x8}) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x20) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000200)={0x0, {0x0, 0xffff}}) perf_event_open(&(0x7f000001d000)={0x8000000000000001, 0x70, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:03:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000c8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f00000000c0)) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000180)=0x800) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet6_tcp_buf(r1, 0x6, 0x2f, &(0x7f0000000100)="39889ae79c61caa4db1dfd53e34ace035e417ca9232db6320bdd09bac3e6ed3f8bdadf6fd23a6f117b4d080b668650b5ee012d2cd37a42695cecdb5fe862ef6b9db64d4b85540e309e30cf581ece68b2f12c60d900", 0x55) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) 21:03:24 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8907, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:24 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x2002}, {r0, 0x400}], 0x2, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)={0x8}, 0x8) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x1, 0x4) r1 = dup3(r0, r0, 0x80000) r2 = gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000200)={0x0, 0x8, r2, 0x0, r3, 0x0, 0xfffffffffffffffa, 0x1}) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000100)={0x3, 0x3, 0x81, 0x7, 0x5, 0x9, 0x7fffffff, 0x0, 0x7, 0x3f, 0x58a15d1a, 0xdf3}) 21:03:24 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0000f0bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x7, @mcast2, 0x8}}, 0x6, 0x0, 0x7, 0xdde, 0x82b}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={r2, 0x48, &(0x7f0000000540)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4, 0xffffffffffffac22, @mcast2, 0x9}, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x26}, 0x2}]}, &(0x7f0000000480)=0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) splice(r1, &(0x7f0000000000), r1, &(0x7f0000000080)=0x57, 0x4, 0x2) 21:03:24 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr$security_evm(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@v1={0x2, "86fe9049d0d2ba85a5b26d"}, 0xc, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000e8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x14000, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="9f585ab700000000000000840000200000000067000d000000122095000000fff80000"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 21:03:24 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0000000300020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000000f8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x0, 0x0) sendto$netrom(r1, &(0x7f00000000c0)="55b991428a7e6171fa60feeb1c88ee7010f183f05dfb0fbd1238e5117293e6634dd65ee7ccd473c2509a34266e6882e7e143a9b49f67c51c77f672b52269fc915fb45fa8be72b4bd9c59e146f56fda74cf52db46a8ade3daafe8d54e71f19324ce6ef4443adddaafaf6de7f442724d8097e34732dd206c015e9305e8fe5023", 0x7f, 0x800, &(0x7f0000000140)={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)=r1) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xde) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'filter\x00'}, &(0x7f0000000080)=0x54) syncfs(r0) [ 3360.105385][T32170] Error parsing options; rc = [-22] 21:03:24 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000700)={0x2, &(0x7f00000006c0)=[{}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000940)={r1, 0x2, &(0x7f0000000840)=[0x0, 0x200], &(0x7f0000000880)=[0x0, 0x10001, 0x81, 0x0, 0x7, 0x2, 0x7, 0x9, 0x101], 0x14, 0x7, 0x1, &(0x7f00000008c0)=[0x5, 0x8, 0x100, 0x38, 0x100, 0x2, 0x0], &(0x7f0000000900)=[0x2]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffec, 0x4, &(0x7f0000000440)=[{&(0x7f0000000300)="f3b25d6100f4d5e25dc34771c4fc8614f5beedb93e30bb4b6562e72337c16aa50a712860d12220ed19f3a0a859e108ba65f092d8c3bcb4081713272e410b77fff95e4ec2f8098c3b04f5dc6b172e10daa35f2d306afe349895a082a6c64824cf67eae64d3e73a1bc7be510884e38035214bb1512d09811139ea538e7f62f2e7410a0d59696780398d82f761ba0a18869e0c36b674337d6313d110b43503cafd8471819896eb6be38c0f300", 0xab, 0x434}, {&(0x7f0000000240)="aabcc1758cf9e190036e3c2cd4d6c1a936b2abb50101c08f900f3e991f860c9e8406e7eacafe114c770c36", 0x2b, 0x401}, {&(0x7f00000003c0)="7db25d4e4bf9f7587b1792712d90f91378abbbcd4c75bf1c77195814f464ea2c0f3a9099cd316193e0258cffc244f76b789b9c97559050f52de23a9a2852aa5e3c6b1637d4cdfad20e37aabaa030a5", 0x4f, 0x9}, {&(0x7f0000000280)="eb049aea8a6648230d7497f3369216", 0xf, 0x8001}], 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="686f7374646174613d40245b2c6e6f626172726965722c757067726164652c736d615d7d2f392c7569643d00000000000000000000000000000036a290996feb2724c5047c46e98290b5a45780eb797acb2a712c5ab6677101a3d5681a87d2148596a344b7da5f9c0d5832c987451833083212729fe1f32954a6d4859a1e75de05f2b8aaa817558ec57f93c5db70d126e617bbbfd96c89c4a3891482e599cac5", @ANYRESDEC=r4, @ANYBLOB="2c666fc9ad2ee440b251c6c88cd6776e65723a", @ANYRESDEC=r5, @ANYBLOB=',appraise,mask=^MAY_APPEND,\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r7 = accept4(r3, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80, 0x800) getsockname$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000740)={0x1, 0x0, 0x102, 0x3, {0x7, 0x6, 0x5, 0x2}}) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x2}, 0x8) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000002c0)=0x2, 0x4) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000640)={0x0, 0x7}, 0x8) sendto$inet6(r8, 0x0, 0xffffffffffffffd1, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x400000000004e22}, 0x1c) close(r8) [ 3360.287584][T32233] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 21:03:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000108934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:25 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fchdir(r0) 21:03:25 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000002bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e23, 0x4, @rand_addr="3248a1d10fcadff9df7de6fb7227433c", 0x100}, {0xa, 0x4e22, 0xff, @ipv4={[], [], @multicast2}}, 0x7, [0x72f, 0x2, 0x8, 0x401, 0xffffffffffffffb5, 0x1f, 0x1, 0x1]}, 0x5c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3360.475967][T32400] Error parsing options; rc = [-22] 21:03:25 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) recvmsg$kcm(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={r0, r3, r4}, 0xc) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") tkill(r0, 0x1004000000016) 21:03:25 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8911, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:25 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000003bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x2, 0x20, 0x0, 0x100000000, 0x3000000}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x40000000010007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000118934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:25 executing program 0: mknod$loop(&(0x7f0000000180)='./file0/file0\x00', 0x10, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x10c80, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xaa}}, {@mode={'mode', 0x3d, 0x3ff}}, {@mode={'mode', 0x3d, 0x81}}, {@mode={'mode', 0x3d, 0x3f}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_type={'obj_type', 0x3d, 'ecryptfs\x00'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r2}}, {@fowner_gt={'fowner>', r3}}]}) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x9e4, 0x8, 0x9, 0x7, 0x0, 0x5, 0x0, 0x0, 0x7fff, 0xea6c, 0x80000000, 0x0, 0x55f1, 0x3, 0x3f, 0x1, 0x3, 0x2, 0xbd, 0x3f, 0x8001, 0x7, 0x5, 0x7f, 0x2, 0x0, 0x5, 0x9597, 0x1000, 0x6, 0x40, 0x8389, 0x2, 0x5, 0x8, 0x7fff, 0x0, 0x5, 0x6, @perf_config_ext={0x7, 0x1000}, 0x20, 0xffff, 0x8a5, 0x4, 0x3, 0x80, 0x70000000000000}, r0, 0x8, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000640)='/dev/midi#\x00', 0x1, 0x280000) connect(r4, &(0x7f0000000680)=@xdp={0x2c, 0x1, r1, 0x1a}, 0x80) mount$9p_unix(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='9p\x00', 0x4, &(0x7f00000005c0)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@version_9p2000='version=9p2000'}], [{@appraise_type='appraise_type=imasig'}, {@measure='measure'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000128934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) eventfd2(0x3, 0x80000) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:25 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:25 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000004bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000138934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:25 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000005bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3361.106477][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3361.106483][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3361.106537][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3361.112607][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3361.130239][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3361.136368][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3361.346374][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3361.352651][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:03:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f00000007c0)={0x1000, "e5a8ff35b708ccc299a0a17f98f8f426e936afdd3c08abd69430ec83488a3e0a", 0x7, 0x1, 0x9, 0xca1, 0x14, 0x0, 0xb1, 0x94c}) write(0xffffffffffffffff, &(0x7f0000000140)="0f4250", 0x3) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x1f004, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r4 = accept(0xffffffffffffffff, &(0x7f0000000180)=@can={0x1d, 0x0}, &(0x7f0000000300)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) accept4$llc(r4, &(0x7f00000005c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000640)=0x10, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) poll(&(0x7f0000000500)=[{r0, 0x200}, {r6, 0x100}, {r7, 0x4a0}, {r7, 0x20}, {r4, 0x200}, {r0, 0x4040}, {r6, 0x90}, {r6, 0x202}], 0x8, 0x100000000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x9, 0x8f7a99bbe5b13b0f) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/enforce\x00', 0x10042, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x5) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000100)=0x8) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r9, 0x40505331, &(0x7f00000006c0)={{0x100000000, 0x8}, {0x0, 0x4}, 0x39, 0x3, 0x2}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000680)={r5, @dev={0xac, 0x14, 0x14, 0x1b}, @dev={0xac, 0x14, 0x14, 0x25}}, 0xc) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r6, 0xae80, 0x0) 21:03:26 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ecryptfs\x00', 0x0, 0x0) 21:03:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) io_setup(0x3e65, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000000100)="677d25978c1bab1394db268264f98f97db69e4f4a143ced16212eb7a264fd1c1b2922c7fd173a4ee5223357993b4b0b9d73abd5dc3d41c7fdbf039e78e7b6aab1f6a3fc903dea797fa96b6e4b2da3a824330d49b0d6ffc6008e1404797efbca5307885fc06265888990a3cab891d416ef8038010eb4fb7101a5bb1f92fefd4076700db505dcda300ce77e05b8b18c4e16d4ec5ac5b7fbe25a9f90bba241a8e822a2cb5f1766958f2b671a650aa42a7d61f8a67a275f7eff7ca1ae3aace0ce7c2095d7c86a1516b8dd4b43ea9851a4f36e88a523ac19003", 0xd7, 0x31, 0x0, 0x3, r1}, &(0x7f0000000240)) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x7b) 21:03:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000148934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:26 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:26 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000006bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='raw\x00\x00\x00\x00\x00\x00\xc6\x00', 0xfffffffffffffff8) keyctl$set_timeout(0xf, r1, 0x1f) 21:03:26 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000007bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3361.651295][ T434] Error parsing options; rc = [-22] 21:03:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000000001c8934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:26 executing program 0: mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x3, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x42400, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000100)={{0xffffffffffffffff, 0x1, 0x7, 0x3, 0x10000}, 0x401, 0x3f, 'id1\x00', 'timer1\x00', 0x0, 0x468f03a7, 0x100, 0xff, 0x2}) 21:03:26 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x248000, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, &(0x7f0000000200)=""/213, &(0x7f0000000300)=0xd5) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2800011}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0x0, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040}, 0x4004) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:26 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)}], 0x1}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 21:03:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000608934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:26 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000008bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3361.972076][ T649] device bond0 entered promiscuous mode [ 3361.981831][ T651] Error parsing options; rc = [-22] [ 3361.997998][ T649] device bond_slave_0 entered promiscuous mode 21:03:26 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000e18934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:26 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000009bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:27 executing program 0: times(&(0x7f0000000140)) prctl$PR_GET_FP_MODE(0x2e) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x200) lsetxattr$trusted_overlay_upper(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='trusted.overlay.upper\x00', &(0x7f0000000b40)={0x0, 0xfb, 0x1d, 0x2, 0x2, "61e25531dcb18148335978372eac6641", "63f762c5a8d62c30"}, 0x1d, 0x1) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000780)={0x6, {0x100000001, 0x7f, 0x0, 0x10000}}) accept4$unix(r0, 0x0, &(0x7f0000000880), 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000006c0)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0x3, 0x101, {"ebfc085ec3bb50e3666d90252975dd66"}, 0x7, 0x2, 0x8001}}}, 0x90) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000007c0)=""/173) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400010}, 0xc, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="a3dde8648821c81d9181e651e0f03efc62e43ada507fe9419e2d85b80eedd28f3fe1db0c946063f96fa6d7fa1d63e2095e1277324d92f73205794199d8ba8261481bd3593a8f5671fead8d14561bc8606264ac456b1b0c5a6bb365ccc19f6cb9d77854aac4eb60a5094cab0a1700537b5051917770c0e59163f2", @ANYRES16=r3, @ANYBLOB="00022cbd7000fddbdf25010000003c0003000800010002000000080003000100000008e60700030000000800010000000020080004000300000008000400fff77029cdc3bbc2a5270a53d0b0a0ae9dff000008000100000000000800ff0101ffffff"], 0x68}, 0x1, 0x0, 0x0, 0x4001}, 0x48804) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='ecryptfs\x00', 0x80, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r4, 0x800, 0x70bd2d, 0x4, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x448c1) fsconfig$FSCONFIG_SET_BINARY(r2, 0x2, &(0x7f0000000180)='/dev/audio\x00', &(0x7f0000000300)="5ed9558f74719f4a3325f700b1aab899b49407bd3b0a2e5e1c5296a6ce497233163eaebda28bf6f3dab03c48bd3fc615a1ed9e86f2fca2b4c63adcb64205e8f93d54017fd26318621e0d5aede324a3f542cd1a3f5537e3485b569c3c2f2c8caaf5cac295a755138e29c2f920cdb8c572caa1dea313dce274a0e4df56ada17a3ec9459fd3e2a4bc96ebac3dd189d94a95711fc82cc3e2772fc20711888feb47833367dbc3163da9c32e0407c22327f2863d5b8d9b86284b2e2e4c6c665b4a326634125c781bac860f62ad3ba86aeaf38fe40003d36e4aa5a9e383ca3e05df7adc238cb4335a200413d33aabd5435c429e0b538f", 0xf3) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f00000008c0)=ANY=[@ANYBLOB="680001a0d5c203675e8ee2856f47587a6868df9717424c2ed7bfa002cfdcedbeb3e728015ef844d311ccacd7e848a20ec4b7bf9aca8290bf81d4f210e8d71a0f6648e2867db0d3161451ff7f00000000000036eacaa1bd1747b9cc6b1fe1abf4b954511153dbafc39a", @ANYRES16=r3, @ANYBLOB="000128bd7000ffd31a8e597796d2d8dbdf25050000004c00010008000b007369700008000a00160000001400030000000000000000000000000000000000080006000000000000000300fe8000000000000000000000000000bb08000b007369700008000400aa000000"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000500)=0x0) syz_open_procfs(r5, &(0x7f0000000540)='projid_map\x00') 21:03:27 executing program 5: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x204400) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x1000, &(0x7f00000000c0)=0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x100001, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000100)=0x4, 0x3b) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 21:03:27 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00000abc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3362.380188][ T875] Error parsing options; rc = [-22] 21:03:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x20000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000080)=""/145) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xffffffffffffffc7) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x6) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) 21:03:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008948d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:27 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:27 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00000bbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:27 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3ff, 0x40) accept4$netrom(r0, 0x0, &(0x7f00000000c0), 0x80800) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07303ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x10) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000240)=0x7ff) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000002000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x6, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@generic={0x7ff, 0x7, 0x100000000, 0x5, 0x8001}, @generic={0x5, 0x400, 0x8544, 0x100000001}, @ldst={0x0, 0x5ea4e977ba4f6193, 0x1, 0x3, 0x4, 0x1e}]}, &(0x7f0000000200)='GPL\x00', 0x3e2a32e2, 0x0, &(0x7f0000000240), 0x41100, 0x0, [], r2, 0x0, r0, 0x8, &(0x7f0000000300)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x3, 0x6, 0x7fffffff}, 0x10}, 0x70) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07305ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:27 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00000fbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07338ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x100001, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000100)=0x4, 0x3b) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 21:03:28 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad021720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:28 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000010bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:28 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETXW(r1, 0x5435, &(0x7f00000001c0)={0x6, 0xa8f, [0x11, 0x81, 0x11, 0xffff], 0x1000}) 21:03:28 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54) 21:03:28 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f00000000c0)={0x8001003, 0x13a, 0x2}) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) times(&(0x7f0000000100)) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000000)=0x54) move_mount(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x20) [ 3363.310663][ T1354] Error parsing options; rc = [-22] 21:03:28 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad041720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:28 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000011bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:28 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00'}, &(0x7f0000000040)=0x54) 21:03:28 executing program 0: mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0xffffffffffffffff) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x6, 0xa00) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x5, 0x50880) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x42100180}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4f008000", @ANYRES16=r1, @ANYBLOB="000127bd7000fedbdf25020000001c00070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000000c0)={0xffffffffffff0d57, 0x9, 0x59c, 0x1400000000000000, 0x8}, 0x14) 21:03:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r1, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, r1, 0xb) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000100)=""/129, &(0x7f0000000000)=0x81) dup2(r1, r2) 21:03:28 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000012bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:28 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad381720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:28 executing program 5: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) socket$inet(0x2, 0x803, 0x1000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000900)='/dev/btrfs-control\x00', 0x1a50c1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000940)={'\x85aw\x00\x00\x00\x00\x00\x00\xc6\x00\x00\x00\x00\x1c\x00'}, &(0x7f0000000140)=0xfffffe11) 21:03:28 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:28 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x2) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 3364.167368][ T1826] Error parsing options; rc = [-22] 21:03:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x101000) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:29 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000013bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad033820d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:29 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x6404c1, 0x0) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz0\x00', {0x100000000, 0xc3a, 0xe1d, 0x2}, 0x35, [0x4, 0x2, 0x17fd, 0x6, 0x401, 0xf22, 0x1ff, 0xcf11, 0x1, 0x81, 0x2b, 0x5, 0x8001, 0x2, 0x7ff, 0x45cb, 0x7, 0x19f, 0x40, 0x80, 0x9, 0x6, 0x5, 0x10001, 0x8, 0x6, 0x7ff, 0x7, 0x99, 0x6, 0xe4, 0x0, 0x3f, 0x800, 0x6, 0x3a, 0x2aaf, 0x8001, 0x9a9, 0x0, 0x6, 0x7fffffff, 0xfffffffffffffff7, 0xf32, 0x40, 0x2, 0xf504, 0x7ff, 0xff, 0x3, 0x7, 0x3, 0x4, 0x4, 0x9, 0xff, 0x0, 0x7, 0x1, 0x4, 0x3f, 0x9, 0x3, 0xffed], [0x5, 0x6, 0x2, 0x7fff, 0x3, 0x8, 0x5, 0x8001, 0x1, 0x5, 0x7, 0x81, 0x0, 0x3, 0x2, 0x0, 0x6, 0x6, 0xa8, 0x401, 0x800, 0x4, 0x100000001, 0xc63, 0x7, 0x200, 0x8000, 0x2, 0xcc, 0x6, 0x8, 0x3, 0x9, 0x0, 0x8, 0x6, 0x6, 0x3, 0x7f, 0x8, 0x9, 0x3, 0x1, 0x80000001, 0x7fffffff, 0x1ff, 0x3, 0x4, 0x7ff, 0x10001, 0x5, 0x1, 0x1f, 0x9, 0xffffffff, 0x874, 0x2, 0xffffffffffffffe0, 0xed0, 0xaa, 0x4, 0x0, 0x5, 0x9], [0xfffffffffffffff7, 0x4, 0xab7d, 0x800, 0xf0, 0x1, 0x9b4, 0x4, 0x9, 0x7f, 0xdb, 0x8, 0x5, 0x8, 0xaaf, 0xdca, 0x2, 0x1, 0x7, 0x10, 0x7fff, 0x3, 0x2, 0x8, 0x80, 0xff, 0x10000, 0x6, 0xc30b, 0x1, 0x6, 0x400, 0x1c00000000000, 0x100000001, 0x2, 0x4, 0x2, 0x1, 0x1ff, 0x90, 0xffffffffffffffe1, 0x5, 0x800, 0xac, 0x400, 0x1000, 0x401, 0xffffffffffffffe0, 0x100, 0xed67, 0x0, 0xffffffffffff7fff, 0x316, 0x29, 0x20, 0x5, 0x10001, 0x9, 0x3, 0x7, 0x5, 0x2, 0x0, 0x7ff], [0x32a3, 0x1, 0x48, 0x545, 0x492f, 0x80000000, 0x8, 0x4, 0xa96e, 0x8, 0x784, 0x101, 0x3bb, 0x9, 0xfffffffffffffffe, 0x4, 0x2, 0x8000, 0x2, 0x49194b10, 0xffffffffffffff56, 0xab90, 0x6, 0x100000000, 0x100, 0x2, 0x100, 0x3, 0x1000, 0x2, 0x24, 0x8, 0xe7b6, 0xfff, 0xba, 0x8, 0x7f, 0x4, 0x2, 0x4, 0x7, 0x7, 0x200, 0x81, 0x7fff, 0x7, 0xffff, 0x1ff, 0x4e5, 0xffffffffffff8001, 0x1, 0xffffffff, 0x4, 0x6, 0x8001000000, 0x3ff, 0x20, 0x8, 0x101, 0x10000, 0x7, 0x5, 0xc924, 0x7fff]}, 0x45c) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:29 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, {0xb2, 0xd27, 0xde, 0x1, 0x400, 0xac67}}, 0x8) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3364.451441][ T2060] Error parsing options; rc = [-22] 21:03:29 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x55, 0x2, 0x100000001, "34b827c864266fb023bf18a9953b64fa", "7598efc2eb0ac4049c88f8e4b52d945b58320859963322e9ec03bad19d14654c7e1c523f4f856bb161368e510a4d1fadabfacd2d199f0f201b69c95c507f077e"}, 0x55, 0x3) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) sync_file_range(r0, 0xffffffff, 0x7f, 0x1) 21:03:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031738d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:29 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000014bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:29 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\xfa\xff\xfd\xc5\x00\x00\x00\x8a\v\x00\x00\x1f\xfa\xff\x00'}, &(0x7f0000000040)=0xffffffffffffff3d) 21:03:29 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe00001cbc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x200001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000300)={0x6, 0x1, 0x0, [{0x2, 0xae, 0x8, 0x1, 0x0, 0x40, 0xafe9}]}) setxattr$security_evm(&(0x7f0000000140)='\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@ng={0x4, 0x11, "b5782326fe5964d960685eb933fa2780e5acdf"}, 0x15, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000100)={0x1}) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000280)) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@md5={0x1, "aec877e499e1157eb7fe700a0d97efe8"}, 0x11, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc002, 0x1) 21:03:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031748d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3364.726377][ T26] audit: type=1107 audit(1564779809.485:261): pid=2265 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:29 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x55, 0x2, 0x100000001, "34b827c864266fb023bf18a9953b64fa", "7598efc2eb0ac4049c88f8e4b52d945b58320859963322e9ec03bad19d14654c7e1c523f4f856bb161368e510a4d1fadabfacd2d199f0f201b69c95c507f077e"}, 0x55, 0x3) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) sync_file_range(r0, 0xffffffff, 0x7f, 0x1) [ 3364.776807][ T26] audit: type=1107 audit(1564779809.485:262): pid=2265 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:29 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3364.872635][ T2391] Error parsing options; rc = [-22] 21:03:29 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000060bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xf) [ 3364.958209][ T26] audit: type=1107 audit(1564779809.725:263): pid=2407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3364.992809][ T2443] bond0: mtu greater than device maximum 21:03:29 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x55, 0x2, 0x100000001, "34b827c864266fb023bf18a9953b64fa", "7598efc2eb0ac4049c88f8e4b52d945b58320859963322e9ec03bad19d14654c7e1c523f4f856bb161368e510a4d1fadabfacd2d199f0f201b69c95c507f077e"}, 0x55, 0x3) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) sync_file_range(r0, 0xffffffff, 0x7f, 0x1) 21:03:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "c09a8ed9e9b85fbce5289159b2fde308"}, 0x11, 0x2) 21:03:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x10) 21:03:29 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1, 0x1) clone(0x4000800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, 0x0) 21:03:29 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0000e1bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3365.221322][ T26] audit: type=1107 audit(1564779809.985:264): pid=2537 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)=""/136, &(0x7f0000000140)=0x88) r2 = shmget(0x2, 0x3000, 0x20, &(0x7f0000000000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000180)) 21:03:30 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x55, 0x2, 0x100000001, "34b827c864266fb023bf18a9953b64fa", "7598efc2eb0ac4049c88f8e4b52d945b58320859963322e9ec03bad19d14654c7e1c523f4f856bb161368e510a4d1fadabfacd2d199f0f201b69c95c507f077e"}, 0x55, 0x3) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) sync_file_range(r0, 0xffffffff, 0x7f, 0x1) 21:03:30 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3365.268337][ T2639] cgroup: fork rejected by pids controller in /syz5 21:03:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x1b) 21:03:30 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe0000000300020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:30 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x101000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000180)={0x0, r0}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1398, 0x203) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000100)={0xa, 0x7, 0x9, 0xfffffffffffffffe}, 0xa) 21:03:30 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x55, 0x2, 0x100000001, "34b827c864266fb023bf18a9953b64fa", "7598efc2eb0ac4049c88f8e4b52d945b58320859963322e9ec03bad19d14654c7e1c523f4f856bb161368e510a4d1fadabfacd2d199f0f201b69c95c507f077e"}, 0x55, 0x3) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3365.458254][ T26] audit: type=1107 audit(1564779810.225:265): pid=2741 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3365.534190][ T2775] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 21:03:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x2c0) 21:03:30 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:30 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc02020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3365.657633][ T26] audit: type=1107 audit(1564779810.425:266): pid=2886 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:30 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3365.727394][ T3021] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 21:03:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, r0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) signalfd(r1, &(0x7f0000000080)={0x800}, 0x8) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xb091b1efe7cb2add) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xec0) 21:03:30 executing program 0: prctl$PR_GET_KEEPCAPS(0x7) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x103) pkey_free(r0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0xfffffffffffefffe}}, {@mode={'mode', 0x3d, 0x401}}]}) 21:03:30 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc03020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:30 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3365.904564][ T26] audit: type=1107 audit(1564779810.665:267): pid=3220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:30 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfdef) 21:03:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000380)={0x9, 0x7fff, 0x1, {0x4, @win={{0x0, 0x9, 0x4, 0x6}, 0x2, 0x4, &(0x7f0000000240)={{0x7, 0x0, 0x2962a88e, 0x401}, &(0x7f0000000200)={{0x8, 0x3, 0x4, 0x2}, &(0x7f00000001c0)={{0x3f, 0x8, 0x2, 0x8a45}}}}, 0x4, &(0x7f0000000280)="7993bb7981fc0dd8961d606a29dfd85aa9c4dbf55ef012d3a6b7e78c7a808849b35f626e7515b30f7d123d05377a13d6598769266c17ea65e8dafffaa871d846323bb9af860e29cf95cb8e7613a712a612706c654851027b33b3c3c708d558d26b2042a7d42e44b25fe97fabaa914a2d57d269010fc31ffda53ba9496239464a059953d55147453bf28531e55748a5fba434cc2855cf67e6be9a93c10584296ed4fe24ce8b2fcb8d67c7dfdffd86c81b78ce79bc0026654c3aa1c9786cbf1f8dd87a65845c08dbfdeac9ee09685b765d3a2edcf9b353744a4115b25a27121472", 0x17}}}) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40000, 0x0) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000140)) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xfeb6) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x8000, 0x5}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x482440) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f00000000c0)=0x77, 0x8) [ 3366.077274][ T3237] Error parsing options; rc = [-22] [ 3366.087464][ T3243] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 21:03:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x33fe0) 21:03:30 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:30 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc04020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:31 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:31 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x7, 0x800) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000180)="34caf1a2d152b2a7a55717b7a26c777a08cfb97d1713e8801384886a4a4db98ca5f40a260a799cce999eefd8e1ceb701c8224c0cb1898853863eb0bc3c8f813c1eeab4e06653b61f9731fc466741fd7f4fd579acafc2b5c9862a0fccf5e708951b16278363917507e95561e597c7c5b0257942d1", &(0x7f0000000200)=""/122}, 0x18) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) write$apparmor_exec(r1, &(0x7f0000000100)={'exec ', 'ecryptfs\x00'}, 0xe) 21:03:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = accept4(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000004c0)=0xffffffffffffff18) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r2}, 0x10, &(0x7f0000000280)={&(0x7f00000001c0)=@canfd={{0x4, 0x1f, 0x1, 0x1ff}, 0x29, 0x2, 0x0, 0x0, "6b5b0d29da0fd7e503ececef841fc503e618fc3d85728d293cf94c320114d037319790f4f5d65e26f4f468c1f1b2db1e66e3f4d2de91ac75d612d1611e80e4b6"}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008081) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000840)={@pppoe={0x18, 0x0, {0x2, @broadcast, 'ifb0\x00'}}, {&(0x7f0000002340)=""/4096, 0x1000}, &(0x7f0000000800), 0x19}, 0xa0) syz_init_net_socket$nfc_llcp(0x27, 0xfffffffffffffffd, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f0000000140)=0x8) poll(&(0x7f0000000240)=[{r1, 0x20}, {r0, 0x402}, {r0, 0x20}, {r0, 0xa0}], 0x4, 0xd7e0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000780)=0x4, &(0x7f00000007c0)=0x2) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) sendmsg$tipc(r3, &(0x7f00000006c0)={&(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x41, 0x2}, 0x2}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000500)="40afd51c5f6aff28f4ed5aebd6c016a3cc4f0e76597618c8b7037c1e266d755996236775ee7dfd25eaf527e2580ffa344f76df135d4a27f662cd0304a0ac0137fed49a3ae9c130daa0c257f353836eacaf6be0a96ec53786b20ee1c31ab287ab7eb69ce0969a67e7b63fa0d6c40ca329b11e4d07aeaeaa2311aa41584a3fa8eabb4a93bcc8cf00ef9b2019eac703e6e2fdb69d4065", 0x95}, {&(0x7f0000000340)="7b19d01441bfec06839d", 0xa}, {&(0x7f0000001340)="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", 0x1000}], 0x3, &(0x7f00000005c0)="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", 0xfc, 0x40}, 0x800) 21:03:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x2000023c) 21:03:31 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3366.365397][ T3563] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3366.431983][ T3568] Error parsing options; rc = [-22] 21:03:31 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc05020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfffffdef) 21:03:31 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:31 executing program 1: r0 = socket$inet(0x10, 0x0, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) 21:03:31 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x90100, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000100)=0x200, 0x4) 21:03:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfffffffffffffdef) 21:03:31 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc06020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:31 executing program 1: r0 = socket$inet(0x10, 0x0, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:31 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3366.874128][ T4128] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 21:03:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x10002) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x10}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000000)={{0x6, 0x4, 0x7fff, 0x100000001, 0xfffffffffffff000, 0x5}, 0x462d, 0xf53a, 0x8, 0x0, 0x7, "5d0e373c0b4b9229e4abae4cd1e306303a90e3006ca3fbd102fa6ef979de7443f96984e6234fc1a7fcfc6bf388289963acb8d1f68271cc8e107c455d79cfa094326aae2d06eb5270e4c662f136979599184c06899e9490cc18466fce37e01ce205a463a9a1ec73569c6ede31908bad8ce7166f560bd3b5378b9cfa534132bfa3"}) 21:03:31 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='aio\x00', 0x3fffe, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x14) 21:03:31 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc07020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:31 executing program 1: r0 = socket$inet(0x10, 0x0, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:31 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:31 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3367.159577][ T4349] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 21:03:32 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc08020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000140)=""/4096) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x22400, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:32 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20001, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x2000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000100)='\x00', &(0x7f0000000140)='./file0\x00', r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:32 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000500)="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", 0xfffffffffffffe5b) [ 3367.325243][ T4546] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3367.346514][ T4547] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pig=4547 comm=syz-executor.1 21:03:32 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc09020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3367.433952][ T4568] Error parsing options; rc = [-22] 21:03:32 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:32 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:32 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = shmget(0x3, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) 21:03:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) write$P9_RSTAT(r1, &(0x7f0000000080)={0x73, 0x7d, 0x2, {0x0, 0x6c, 0x4, 0x5, {0x1, 0x3, 0x4}, 0x1800000, 0x200, 0x9, 0x9, 0xb, 'raw\x00\x00\x00\x00\x00\x00\xc6\x00', 0xb, 'raw\x00\x00\x00\x00\x00\x00\xc6\x00', 0x18, '%cgroupeth1ppp0mime_type', 0xb, 'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}}, 0x73) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:32 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xf3, 0x8000) write$P9_RRENAMEAT(r0, &(0x7f0000000180)={0x7, 0x4b, 0x2}, 0x7) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="15000000509b53803199e87f4e538307131fd8d866b0c9e569cfb94048ccd22900a7dbfed9968ae2f14f3976f967dadbc712e43c9bb46e24ac33297290ad9665765e3c79ce9b1162a686ebc57fc1466acd7536", @ANYRES16=r1, @ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x1}, 0x200000c0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 3367.612980][ T4864] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3367.624111][ T4866] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pig=4866 comm=syz-executor.1 21:03:32 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0a020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:32 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3367.745026][ T4879] Error parsing options; rc = [-22] 21:03:32 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x84900, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r2, 0x0, 0x0, @ib={0x1b, 0x5, 0x7fffffff, {"4e9b4f0b11c9a042f8ec37cb3d06c3a6"}, 0xc4, 0x8, 0x99}}}, 0x90) 21:03:32 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3367.850245][ T5035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pig=5035 comm=syz-executor.1 21:03:32 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x80, 0x100) write(r0, &(0x7f0000000080)="f334b0e1ec32cfcf4f91f4fdee27c087077a4203572ddb75f8a8477e9e2bc4a34f14d5aa89d75a5f961433f4ec8979369987fafb6096ca770d6c10fec26f67f769bf16b46fa76f939f6304d9c4ba6854a5d4d324385c71cbc7f73bb03fe0043691e7dc19a3a369c8050268450ada762c1ab95beecbc64b5892ed1eaef5f16dc4ad09ea53591641ecd4e750b81c3533ee5f66ec576423ac8a625eecf66b3b7ee0e5fb2e07f3898c1306eb1da094d7f869", 0xb0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r1, &(0x7f0000000480)=@ethernet={0x1, @random="bea01dfbc425"}, 0x80) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x400000010031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="0000010416000000c10000000000000007010000000000000000000000000000478c561672f53d3bdd11af4500000000000000000000000000000000000000000000000000000000000000000000000000000000000059a37d5a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003d8159a930761da4f14b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038c9417e41a3f969bf897f084361220ab8313b874631b986bc9d019dd34e65a86"], 0x32c) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:32 executing program 1: socket$inet(0x10, 0x10000000003, 0x9) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3367.919450][ T5175] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3368.032966][ T5216] Error parsing options; rc = [-22] 21:03:32 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0b020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:32 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="6a000000cab113fc9a43d37479de399b99368effb523722e4333ba373bb3dfbc6c8aa4111ca17fa385dfb5e56c5a7a784a2ed749ef9698447d9eac776f0e56cfb1b5d823fe348f211fc6aa94b822249d5481847bfa41c3e342a47f10090000000000002c9da0cad029a78e158153"], &(0x7f0000000100)=0x72) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e22, 0x80000000000000, @loopback, 0x20}}, 0x40000000000000, 0x4, 0xf300, 0x6, 0x60}, &(0x7f0000000380)=0x98) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x7fff, 0x4) 21:03:32 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8940, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:32 executing program 1: socket$inet(0x10, 0x10000000003, 0x9) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:33 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f0000000600)=0x14080, 0x4) r6 = getgid() stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x7}, [{0x2, 0x2, r0}, {0x2, 0x2, r1}, {0x2, 0x5, r2}, {0x2, 0x0, r3}], {0x4, 0x7}, [{0x8, 0x1, r4}, {0x8, 0x2, r6}, {0x8, 0x0, r7}], {0x10, 0x2}, {0x20, 0x2}}, 0x5c, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x99, 0x400) bind$bt_sco(r1, &(0x7f0000000140)={0x1f, {0xfb0, 0xffff, 0x0, 0x8, 0x1ff, 0xc4956a6e000}}, 0x8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:33 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = semget(0x2, 0x7, 0xa) semget(0x1, 0x4, 0x420) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) r3 = getegid() fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000380)={{0x35fcb890, r2, r3, r4, r5, 0x110, 0x9}, 0x3, 0x5, 0x3ff}) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfffffffffffffe0e) [ 3368.251791][ T5525] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 21:03:33 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0f020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:33 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8941, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:33 executing program 1: socket$inet(0x10, 0x10000000003, 0x9) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3368.425594][ T5627] Error parsing options; rc = [-22] 21:03:33 executing program 3: r0 = socket(0x1d, 0x3, 0x9) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:33 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 21:03:33 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc10020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:33 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, 0x0, 0x0) 21:03:33 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:33 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x10000000, 0x0) rt_sigsuspend(&(0x7f0000000040)={0x9}, 0x8) 21:03:33 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:33 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, 0x0, 0x0) 21:03:33 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc11020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x103000, 0x90) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x67, 0xffffffffffffffa0, 0x5}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0x1, 0x3}, 0x8) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000140)={0x1, [0x0, 0x3ff, 0x6, 0x2000000000000000, 0x2, 0x4, 0xfff, 0x9, 0xfffffffffffffff8, 0x5, 0x5, 0x401, 0x7, 0x20, 0x1, 0x7, 0x3, 0xd4, 0x4, 0x3, 0x660c, 0xf3, 0x400, 0xaa6, 0x9, 0x0, 0x6, 0x30b0ca65, 0x55a6, 0x5, 0x4, 0x8, 0x7fffffff, 0x7, 0x8, 0x100000001, 0x7ff, 0x9901, 0x20, 0x3, 0x6, 0x80000000, 0x537e, 0x4, 0xffffffff, 0x40, 0x1]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000440)={'nlmon0\x00\v\x00', &(0x7f0000000400)=@ethtool_sset_info={0xa}}) clone(0x3ffffffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:33 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:33 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000140)={0xa, 0x9, 0x3, 0x2}, 0xa) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x5, 0x9, 0x9}, 0xa) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000010000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/237, 0xfffffffffffffe00) 21:03:33 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, 0x0, 0x0) 21:03:33 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc12020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:33 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:03:33 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x90, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff001}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x4000010) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 21:03:33 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc13020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:34 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000080) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:34 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:34 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:03:34 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc14020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_GET_DUMPABLE(0x3) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x3a1000, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 21:03:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000240)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x51) [ 3369.731291][ T6552] Error parsing options; rc = [-22] [ 3370.322730][ T7065] FAT-fs (loop3): Unrecognized mount option "smackfsdef=/selinux/enforce" or missing value 21:03:34 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc1c020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:34 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:03:34 executing program 3: r0 = socket(0x14, 0x4, 0x7f) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc000200f5026c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605082038f4f8b29d8c8fd92c83170e5bba4a463ae4f5566f91cf190201ded8150000d243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4fa0ca57b577c048ae41f0d48f6f0000080548de873cf1587c3b4100"/246, 0x41af2b6) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x100400000000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x5}, 0xf) 21:03:34 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) r2 = syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xff}, [@call={0x85, 0x0, 0x0, 0x28}, @ldst={0x0, 0x3, 0x3, 0xa, 0xa, 0x6, 0xfffffffffffffff4}, @ldst={0x2, 0x0, 0x7, 0xf, 0xa7744a0ffbf4d72c, 0x4c, 0xfffffffffffffff0}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0xe3, &(0x7f0000000240)=""/227, 0x0, 0x2, [], r1, 0xb, r2, 0x8, &(0x7f00000003c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x7, 0x31b4, 0x7}, 0x10}, 0x70) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r3 = getpid() getpid() syz_open_procfs(r3, &(0x7f0000000000)='net/mcfilter\x00') getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000001c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000180)=0x54) syz_init_net_socket$ax25(0x3, 0x2, 0xcf) 21:03:34 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc60020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:34 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecrypue}\x15\x8c\xe5\xc8\x11|\xdb\xeei!\x00\x00\x00\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) 21:03:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000240)="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", 0xfffffe48) 21:03:34 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 21:03:34 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bce1020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2080, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:34 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:34 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00030000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:34 executing program 3: r0 = getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x49, 0x200) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000180)=0x3f) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x105400, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xc02, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000100)={r3, r3, 0x6}) write(r3, &(0x7f0000000240)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000500)='./file0\x00', 0x9, 0x6, &(0x7f00000009c0)=[{&(0x7f0000000540)="b02b4c666cb29f95784ea234dd94aee29dbbf509db6d3c9cde921286fd7dda9f917ada9a049d6a0f9294a732759d1d3fdf13ab8e4a2dece414b8b89ce454fed4a67d7f57718ede2e1edec8a99fcc3020421f07ce608a5584f36c51ac2d8893c7b8d1f94bd5039b2279f246e650", 0x6d, 0x81}, {&(0x7f00000005c0)="9a9a7febcd63b303242f839ebfcf7e1dc30d52fe33e76d03d07f4f24b1cd0ee8c1860086e73ce63ac02a03794002c86859b10173b079c5058c3249a51d3ee0ad8f05b4a6d52d02fcf27a3fab803ba6f7ca0a1755e64b1a698c1ab7c9bb32c1dee4ba7cb8fcc3eb3c253b6061d7b11ca43d69bb8b71ba860be9cf523153cbe4a781cfb236b1bf99b5138a1126edca91d229b7", 0x92}, {&(0x7f0000000680)="7365c859f256edf063ea3ec3dddc6705a14c15f3683d2ecf95fef464ce6f999db0e54e62767207bf", 0x28}, {&(0x7f00000006c0)="9fcf232420d648ea2db7733a8922d0654f86e174f5414c29157b27f18bac7189b3187aa76189279152cff39948859f3158115255abc929a2d822518eaa3adc520fc8eb7c13e91d16a7e95ab06ab19180b8305845e78e8ce1061f8f82200ed27844f9ec977216a1e1914508ba08f5ff39b8951256e0582a826659bf4b6081c976b2535f7ee7397ddf739f2b3bd2e98e458851ef2569243c0d83a38f7f9313a356d7a235644dd2b67e928373f85d773add79beae4ebe3426f53eba09d620686624b94e4784d160c6ef3c309ae5a33ad76da907457bb1f8f6816ed4c1a1308d20881c2ac80cd15fd9bc77eeb786f7", 0xed, 0x7}, {&(0x7f00000007c0)="5eea899db9329053b5d884b7b6ce62db6d729ed9d76d6f56b156b298baa0ecb8096c08101ba2d0f7bec0be74d3ffb12ddb61f3ebbf8ec9ca2668401f6b50d46fb13cf7632d3062052045037ad0ea8b2cf0af6694b26ab7f8c020d8fa92eedb970b5e1609fbbca1124d4e0690545eadd89c591d6a1024fe582bc0da02998618f465d3a1f76685b25a67357e920070660ca1b65bc6a5df4c0632b06853094f46ee96e8cb1779f28af99e86ecb2740cf0aef5e841ff1ad6a1c266011673d626c7e7325cba7804920a5b3443b1fa077c37ee50879c80a63f2eba50e5", 0xda, 0x9}, {&(0x7f00000008c0)="b20e55f5f0d76f12a536c9e7e9b3c5b657efc18c8529a7ed4af6ada2d3f4833e933ebe76f3a6b44ae36d92278c02c98c7a8ec60674bd010d3ce46e860900b6a7511a20a889a321154a0bc622cbc6d9839b3e32c83b7725992cbce6e738c80b20314fe34faacc8da702d046c1b765c7d7ef6bc7f92c24c7d38fdfa02bb639eea362b726416986ebe8d80d77cab612fc6e544843c06ef62b341db3551636d3a319e98232e5371689049c498e1b132e7a7d8d64f4c7591efadf0767d7a453c611d5cb59", 0xc2, 0x7}], 0x400, &(0x7f0000000a80)=ANY=[@ANYBLOB='dots,nfs,nodots,nodots,nodots,nodots,dots,dots,nodots,smackfsdef=/selinux/enforce\x00,subj_type=/dev/sg#\x00,permit_direMtio,rootcontext=root,\x00']) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000340)="c6668ab9d8fd53f2baa82732cf962c9dc58622d2ad1c0a31297665c59832863600a1d6c6975967e188ef2003934f094425d036ab86f7f0ee603b1deac68ccff7182ea5ef803ec455c5753aa78a70f269773873345361596216d1bbe89c20d646bce89cd7032243a7899f47e57802b1e3450c2bbaa000ca8e26d0693381fa880dce78c1f5b8869df9d3ace3c7e9e6e8596541815830c77a", &(0x7f0000000400)="33f304d07e8a9ddacfdecdd4872e15b8f3f502273e59e021590416154ebf317ee42eccb50c29c148cebd63e85c822f22dbea0b41286d474e65d4d2a98382ba810ec2537dd4e852671828b9fdff0e4aecd050b1acc72d34421b3ffec50f26872c1460438b5e74e6bda301668bd884683e2d573c6d151bad841784bcb39fb97ba57a77f13c9872ed5c5d75d99a7da01b95f7ab9dad6478319f0cfa0b95afca336c8817d4f4f3ba6a8a0a2bf09baa09815b387e1a1f0255a70806e76689fd539bb96d8e0fc39b508e49f6205f8a62fa54c173b6481c30b1f51e102767d0"}, 0x20) 21:03:35 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 21:03:35 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00050000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:35 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 21:03:35 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:35 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x90000, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000340)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='aio\x00', 0x2000400, &(0x7f00000002c0)='mime_type\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x10, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, 0x0) 21:03:35 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00380000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80180) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000180)) r3 = fcntl$dupfd(r1, 0x406, r0) bind$ax25(r0, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)='vmnet0user]K&!#\x00'}, 0x30) capset(&(0x7f0000000080)={0x19980330, r4}, &(0x7f00000000c0)={0x2, 0x8, 0x9, 0x80000000, 0x7, 0xff}) 21:03:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ftruncate(r0, 0x5) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:35 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) 21:03:35 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00400000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) ioctl(r0, 0xfff, &(0x7f0000000000)="230c9fcba4d17067b548cfc67edaf62774cfa341afe2266dbd40a36d66708da518c36a580a747f1acb3145535fca0c8504052af27f4906de6bd20477f417bf6b9e106d16634c456148dd7fc86388c42b489b34160cb0ca9cc4d867b7a0af33508324c3364829b282ec92b69f9e802dfdcfc13ba8323031c9f1a96757ad0532a52ca9b865ba78bb7ba72ba61688ea7d1f3e40279399b68b8e1683c6cd9f6e4438f77b62e41837d2d5834d619394df90f1b7a7a92da000") sendto(r0, &(0x7f0000000240)="4c79f4fa2b01317e6726ce1b0ef607d792d834bfd7b48cd11282a70721cc3a5726100034b0719392fdf06b47bcafa66ad1a108fc3f28d72aa5501caecc441b895a3ce87dccc2de59de1774c5fc39eb362d1ce4c386cf721229a2c8b0a5382d7139b250bd3fdc5d2c23b15f9655c5470fe335a10ca7519e0e7d983f06b621f9ad6d228bd29114a6b75774d40b23d751d176ae9d16f03435a0c437eded5a9377b72fe54788783e79fb50a67de6ff6812f7ec63ab7bd2af0da9a3e595f5027721829c2d405ba538d2b427887e2ec13b032efada57", 0xd3, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:35 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x894c, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:35 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00030000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3370.844969][ T7560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=299 sclass=netlink_route_socket pig=7560 comm=syz-executor.3 21:03:35 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) [ 3370.906036][ T7713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=299 sclass=netlink_route_socket pig=7713 comm=syz-executor.3 21:03:35 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) write$cgroup_type(r0, &(0x7f00000001c0)='threaded\x00', 0x9) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8080, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000140)={0x4, r2}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="84010000", @ANYRES16=r2, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:35 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00050000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000340)=""/250) close(r1) 21:03:35 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) 21:03:35 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 21:03:36 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00380000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:36 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r1 = geteuid() getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x400, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000170000,user_id=', @ANYRESDEC=r1, @ANYBLOB='\x00'/10, @ANYRESDEC=r2, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x00000000000003ff,default_permissions,max_read=0x000000000000003f,allow_other,max_read=0x000000000000003f,default_permissions,euid=', @ANYRESDEC=r3, @ANYBLOB=',euid=', @ANYRESDEC=r4, @ANYBLOB=',dont_measure,subj_role=ecryptfs\x00,fsname=\'{,\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000680)={0x40000, 0x0, [0x8, 0x1, 0x6, 0x2, 0x419, 0x0, 0x6, 0xfffffffffffffffe]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0xfffffffffffffffd, 0x0) 21:03:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0xc0004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xfed7) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={r3, 0xe4, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x3b, @remote, 0x41d2}, @in6={0xa, 0x4e22, 0x4, @loopback, 0xffff}, @in6={0xa, 0x4e22, 0x831a, @empty, 0x3}, @in6={0xa, 0x4e21, 0x4, @ipv4={[], [], @remote}, 0x8001}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, @in6={0xa, 0x4e22, 0xfffffffffffffffa, @mcast1, 0x8000}, @in6={0xa, 0x4e22, 0xffffffffffffff52, @remote, 0x2}, @in6={0xa, 0x4e20, 0x5, @mcast1, 0x100000000}]}, &(0x7f0000000240)=0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) prctl$PR_GET_TIMERSLACK(0x1e) 21:03:36 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:03:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'bridge0\x00', 0x1}, 0x18) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:36 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020200036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:36 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8971, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:36 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:03:36 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020300036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:36 executing program 3: r0 = socket(0x10, 0x6, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) syncfs(r0) 21:03:36 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwrite64(r0, &(0x7f0000000080)="cc2a19714874f331aa9dafcdd9abe0dead93c2ed42c39cd26f7e2c91a2bd7adbdd7a8334817ed3141a38104662a916784b22f9de6471e03af1495df414d262c737a404ebd4a31be56edd1022a32574d9adec750df21ca96dff35adc425d270004026622935afaaa169a8d06bf6d7df6770a240f6dbdaa3102d30ebf15b0098c58401f356c304c7e82deb1735c68f558319a704683cc8eaef3a8e6e0611a362d5f38030c28858bc8346100842504907e8ffdcc2d06792a0dce1baaa4d0ac8a84f90b403c2285d322d711a72c9d29b1699b11ff025f4f47164d6350f", 0xdb, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xfffffffffffffda0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3371.748857][ T8435] Error parsing options; rc = [-22] 21:03:36 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:03:36 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020400036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:36 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8980, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000040)='numa_maps\x00') r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) 21:03:36 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x3fffffffffffffd, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x8b4, 0x80000001, 0x1}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:36 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d060000000000000020", 0x12}], 0x1}, 0x0) 21:03:36 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020500036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:36 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d060000000000000020", 0x12}], 0x1}, 0x0) 21:03:36 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8981, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:36 executing program 3: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x10000, 0x2, 0x3, 0x3}, 0x6) write(0xffffffffffffffff, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) signalfd(0xffffffffffffffff, &(0x7f0000000040)={0x8001}, 0x8) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000240)={&(0x7f00000000c0), 0x0, 0xffffffffffffffc1, 0xfff, 0xfffffffffffffffb, 0x6, 0x0, {0x7fffffff, 0x80000001, 0x101, 0xaa, 0x0, 0x8, 0x4, 0xfffffffffffffffc, 0x8, 0x5, 0x1ff, 0xfffffffffffffff9, 0x4, 0x8, "239006111a42fe32ac373c3f3cac6438c2bf3973b4f5dd216f5248e5edcf441e"}}) 21:03:37 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020600036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:37 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0xff, 0x204480) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r1}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) fcntl$getflags(r2, 0x3) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=@random={'system.', '\x00'}, &(0x7f0000000300)=""/80, 0x50) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 21:03:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0xdceb751ed934f044, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3372.379549][ T9027] Error parsing options; rc = [-22] 21:03:37 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020700036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:37 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d060000000000000020", 0x12}], 0x1}, 0x0) 21:03:37 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x81, 0x40002) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0_to_bridge\x00', &(0x7f0000000040)=@ethtool_gfeatures={0x3a, 0x8, [{0x0, 0x81, 0x35d, 0x7fffffff}, {0x3, 0x3, 0xffffffffffffffeb, 0x1000}, {0x1f, 0x1f, 0x0, 0x9}, {0x5, 0x1, 0xfffffffffffff1d0, 0xaf5}, {0x2, 0x31, 0x7c, 0x8}, {0x3, 0x8, 0x5, 0x2ea}, {0x1, 0x9, 0x81, 0x800}, {0x3, 0x4f5, 0x2, 0xb03a}]}}) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:37 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:37 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8982, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:37 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85", 0x1b}], 0x1}, 0x0) 21:03:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x7ffffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000000c0)={{0x84, @broadcast, 0x4e21, 0x0, 'dh\x00', 0x1, 0x80, 0x22}, {@rand_addr=0x3, 0x4e22, 0x12000, 0x54, 0xa1c, 0x1}}, 0x44) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000180)={0x0, 0x10000, 0x7f, &(0x7f0000000140)=0x4}) write$FUSE_OPEN(r1, &(0x7f0000000080)={0x20, 0x0, 0x7, {0x0, 0x3}}, 0x20) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:37 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020800036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3372.621777][ T9346] Error parsing options; rc = [-22] [ 3372.663282][ T9346] Error parsing options; rc = [-22] 21:03:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:37 executing program 0: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) mknod$loop(&(0x7f0000000200)='./file0\x00', 0xd104, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x6b8, 0x400000) getpeername$ax25(r1, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @remote, @default, @remote, @rose, @default, @bcast, @default]}, &(0x7f00000001c0)=0x48) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:37 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:37 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85", 0x1b}], 0x1}, 0x0) 21:03:37 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020900036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfffffffffffffc1c) 21:03:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, r0, 0xfffffffffffffffc) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)="34dfa8e5a7c583edc05557325515b529abd0097dfd234db220d8744f899174189a490ed3eb3978a3ea4769e7387399ba1a7542c66c6e98db29d74e14effe51b58b07fc3a516dbef5fce49aae432bc0181962ab4973c8e7dd5181f301637235f23740a0e7fd49fcc8e7e07e96b5e92e97d651927e8af623d543b50f6d6f68f3414d1558a3", 0x84}, {&(0x7f00000001c0)="fcb815f5cbfb0e351488a146e4730bea3426aab21f31cf6d4050c2fa5bfa7ea6bd6cb56e9b08e83cb6dc341b748f081304b9e8c9517b4d6f96d62d9576b8e84d1fa4b239749357c29581cf14ac9a2821036037942e436c01e440e2d335654d60d5dea5f4825187fcd443bfdb119e058c92ce6262ccadad98f5d81f06a3949111386dec77ce17d18bfa8293792980c54ce5b988fb38ce33091f8d66fb03b3d0fdeba50c1be758d9c55dc70a748a86f88d9b33f957660b480e223e9970a40cb302ad510517cc5fa99857d9", 0xca}, {&(0x7f00000002c0)="f11414a104ba457eb9d026c347eb7ff0e99126d310dd6eb206fde0ed5f4cb1fe8226b00faf4f46dd1436f45d77f3a788cc43261cbee5c4d3cedb960629b504fe2a1a58c2c2c33d3b1c3517751caba0351f64e75e340b64b755ee59eabb654f43189b025e0653bfb75ff7ee225283dfaa26c10bd2394cb421178db09293795e32bcb3ad0c516be55e7dbcc72e15d6ed9b7d274a6379b77e7560f64dbdcdf87a7de8a28953bc21f15877f75aee9f6e47fb25c7fca3f38c3dd35a89da7980862f9f60ff320149844da12093e0903c9218089a64355e84f35b03647c640d991c4312313aa75f0a07", 0xe6}, {&(0x7f00000003c0)="3b205e0b8ab9ffc15b029e00ae99077dbf8f9d0387619510230844c29c22f966062dcc3781c71dac7401d4f65bec9b936ef9d19451697c13364447ac842df8437a167a376d1f9c37fbca9a5619367e51adf00fd3b9ba14f6651e50f40cf9b3d21f90220d25ef556ce80f55a75d718166dc4d30d7c8f413fd064139df270cc8298b", 0x81}], 0x4}, 0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:37 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020a00036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:37 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85", 0x1b}], 0x1}, 0x0) 21:03:37 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x165800, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x9, 0xca3, 0x2000000000000000, 0x6, 0x2981}) 21:03:37 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8988, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:38 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) connect$netrom(r0, &(0x7f0000000540)={{0x3, @default, 0x6}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x4000010, r1, 0xfffffffffffffffe) clone(0x1000801, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:38 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020b00036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:38 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a2", 0x20}], 0x1}, 0x0) [ 3373.340559][ T9797] Error parsing options; rc = [-22] 21:03:38 executing program 3: r0 = socket(0x11, 0x808, 0xffffffffffffffff) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x80) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) write(r0, &(0x7f0000000480)="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", 0xfffffffffffffdce) 21:03:38 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a2", 0x20}], 0x1}, 0x0) 21:03:38 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:38 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020f00036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:38 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8080, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0xf4, 0x2, [0xffffffff, 0x80000001]}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x7, 0xfffffffffea548e0, 0x81}, &(0x7f00000001c0)=0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 21:03:38 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a2", 0x20}], 0x1}, 0x0) 21:03:38 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00021000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x4) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000200)='bond_slave_1\x00', 0x3ff, 0x3, 0x1}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000180)={0xd1, &(0x7f0000000080)="00627a47b515b567bd092bf526215b75313a6b3acaf101b060b1ab47e3f859ba5df294bbce9d8d873890541c4c1121ea53c76c86d109d8de85acf8a695c497fd94ae7f42c65fd02ea8435ec6c7f9126f560bd9595c6a776904830ce06a808a140fecdb2a518da0951b56b8dda524da52164eda13c60a7940dcdc59cf733c2413398562fdac95eb06b81b6dcdadc76655354c1c88ff2011f8b3aceb4841ec497328608253168428edfb7092dac58ec68f7c73e32c9e9eb8f203d00a6c10feee6549c8e21cf02fd600ba02650998100b0503"}) 21:03:38 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x8000000001, 0x400) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x9, 0x9}, 0xa) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0xd, "c6"}, 0x3, 0x3) 21:03:38 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400", 0x22}], 0x1}, 0x0) 21:03:38 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00021100036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:38 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3373.805414][T10235] Error parsing options; rc = [-22] 21:03:38 executing program 3: r0 = socket(0x10, 0x802, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000080)=0x1) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x0, 0x0, 0x1, {0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}}, 0x3a) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, r1, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4004}, 0x4) 21:03:38 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400", 0x22}], 0x1}, 0x0) 21:03:38 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00021200036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:38 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2000000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140002003b000000120001081506000040d819a90600150000ff", 0x2e}], 0x1}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vsock\x00', 0x1, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000900)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x7, &(0x7f0000000580)=[{&(0x7f0000000140)="44d65adf81e05d8f86bb357ff756c0d5b578a06fdb6684c1047591cdbca0c8400f84fa353f9e49fef3c94279441beb5210e9d58176980153f9c16dacbacda80b08ca9f97c488e92dd3661ab46019f988c7e1ca536b06583b", 0x58, 0x8000}, {&(0x7f00000001c0)="5efd8dbc4e511d50b026dd7e8e3f83b27ca9d9de66c2b2229c776be54d365f1f367dc57d17", 0x25, 0xb8a4}, {&(0x7f0000000200)="b2ed72c0fb1dfc538d061dab10807197e8e598072ede248c9ad30b79a046de7036a4ed8f4297c539b038d5b2f6313929c8c778569b10db91330c26e5ad48d86341969239701e2cc7d13f43db84a9efe23464aac76dfc49cccbea0511f665f84822b1ea425139e25fe159c75593ae9267e50e93653918558b65392c69bcc284f2715384c253dc5700f3acc3b97f19d61afeafac905288c62aee3692e5efe8a1117ef6b293a66894b80f90a38bca3975807440a973f9f5abfcb3bb41cdd2a37d3999ebb69b04c3fb8d44a992178b0a2eb0cd7d3ce3978c26db", 0xd8, 0xffffffffffffffff}, {&(0x7f0000000300)="ae9c2fa18c0a1d0f34299ab914516afda5ed1e212911940286280b538e84eaf3e988764b0440ca4c875a32d578423f5823cf1b68a7b17210f9434ea870da0020b3f84a265f2738b7545f31c0ec345b0b454e9e7321e919f58043b8c6128d4b484f7e88982cf4d82ce5458d4a45304d53ef834c0c72", 0x75, 0xc3}, {&(0x7f0000000380)="462e7d787e253961eda7b67a662786d893137240ae88727336d92b2cfdee0265a539a3394d23e6a65a3217f1419661092e394f3926724d79468d49f10bb651023235a8633dc3c93c522401547346f9e9e364c6203a5e19aa17543d0882fb7e175bfbc290fde950da57a82aff30629d2be85494786d97f99349b6c3c3a1e8d760c0a6513c59a26759909c6d", 0x8b, 0x80}, {&(0x7f0000000440)="dcceea8afde752ae6eb5a5666254d22663b6227c0b567032e2d8fb998db593814cfe35311431673bba4cce00092023763a21c1e289bc7d805363a07bff5f1e41b498787c77e9de31ddc00070e6d8b51f2d0535d30bb56ceb2806fc72ad82c614fc9f2bf862f1dd9576f95f94090041624447296fa6d4dd69ae5ef1a7222e141580ac045eed877ac2f4076d6449c9b860d0f01f38ace61101dff4203c8f6e011b8fe834c2388e3f3ed6eedf396d6fcfe27396907a4117cd8ccc906040e46799532aaac013081d0e066669acf1320616b1628c97fb0af9ae045d16a9117e400a56f53701a6", 0xe4, 0x7}, {&(0x7f0000000540)="221e5aa7183bc07351943d63867c2001ae7abe56fdcdac2b2e837fd3ffb65a3d48f32eeb22", 0x25}], 0x8, &(0x7f0000000800)={[{@background_gc_off='background_gc=off'}, {@resuid={'resuid', 0x3d, r2}}, {@inline_xattr='inline_xattr'}, {@whint_mode_off='whint_mode=off'}, {@heap='heap'}, {@inline_xattr='inline_xattr'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'md5sum{#'}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}) 21:03:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:38 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400", 0x22}], 0x1}, 0x0) [ 3374.129975][T10516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=10516 comm=syz-executor.3 21:03:38 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:39 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00021300036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3374.231957][T10575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=10575 comm=syz-executor.3 21:03:39 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff", 0x23}], 0x1}, 0x0) 21:03:39 executing program 3: r0 = socket(0x10, 0x400000822, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) socket(0xa, 0xf, 0x3ff) 21:03:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380100001000130700000000000000000000000000000000000000000000000000000000000000000000ffffac14ffaa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480001006d64350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c005007641c027bd1ac69fbff9e0f079b7d774c3e82a9f09b618b3baff2a17728c36ab1b1188e3848818574119acacf8a21ff5bc967919cc058fb272f39c0ffbe7480d9cf546779494c08989ce4d820d5f900e0a32eefafbe582a1431c6"], 0x119}, 0x1, 0x0, 0x0, 0x90}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x8, 0x44182) unlink(&(0x7f00000003c0)='./file0\x00') ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000000c0)=0x4) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000040)={0x0, [0xfffffffffffffffc, 0xfffffffffffffffd, 0xffffffffffffff01, 0x3, 0x5, 0x1, 0x8b24f50000000000, 0xf4, 0x4, 0x80, 0x6fb, 0x8, 0x5, 0x7fff, 0x7, 0x0, 0x1116, 0x6, 0x2, 0x6, 0x8, 0x14e, 0xb0, 0x4, 0x8, 0x8, 0x32c15327, 0x5, 0x8, 0x9, 0x85a, 0x9, 0xfff00000000000, 0x80, 0x3, 0x10000, 0xfffffffffffffffd, 0x8, 0x1de, 0x80, 0x400, 0xfffffffffffffc00, 0x80000000, 0x3, 0x8001, 0x2, 0x1, 0x2], 0x9}) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x3, 0x10001, 0x0, 0x8, 0x0, 0x9, 0x401, 0x8, 0x4, 0x15ec, 0x3be, 0x6, 0x80000000, 0x1, 0x7, 0x6062, 0x9, 0x100000000, 0x40, 0xfff, 0x9, 0x3, 0x5, 0xfd, 0x8, 0x4, 0x4, 0x1, 0x5, 0x9, 0xffffffff00000001, 0xfffffffffffffff7, 0x5, 0x2, 0x0, 0xffffffff, 0x0, 0x2, 0x0, @perf_config_ext={0x6, 0x80000001}, 0x0, 0xfffffffffffff801, 0x5, 0xd, 0x8, 0x4, 0x100}, r2, 0x2, r1, 0x9) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000005c0), &(0x7f0000000600)=0x6) r3 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x5, 0x408281) write$P9_RREADDIR(r1, &(0x7f0000000440)={0xe4, 0x29, 0x2, {0x4, [{{0x4, 0x2}, 0x10001, 0x5, 0x7, './file0'}, {{0x6d, 0x1, 0x5}, 0xffffffff, 0x0, 0x7, './file0'}, {{0x0, 0x4, 0x3}, 0xffffffffffffffd5, 0x3, 0xffffffffffffff5f, './file0'}, {{0x10, 0x4, 0x3}, 0x7, 0x1ff, 0x7, './file0'}, {{0x40, 0x4, 0x7}, 0x8000, 0x100000001, 0x7, './file0'}, {{0x2, 0x2, 0x6}, 0x53e3, 0xffffffff7fffffff, 0x7, './file0'}, {{}, 0x3, 0x9, 0x7, './file0'}]}}, 0xe4) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) uselib(&(0x7f0000000000)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f0000000400)=@random={'osx.', '\x00'}) 21:03:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x9, 0x80803, 0x3df9) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000180)=0x5) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)="a1b8556b54816ffc876f984b5e34e685d3cc14e96b86d644461d8ddc84b1aefc7990cb3ed77b2d7003b3ab9da5bec0732f6432cb175a622fffefa790421f1ea20257305141f0d19ae1e92f64b4ffb6ef8390e106c7a6b7893b0db8802ee34d4f1d978174e82dea323d84aa7ff449e5bb6c06522f5f944ebc65680114cf04a0472cdc3f4c9adcb77a794e296f0fe19cf4ac932335ec2e0c24c4d351cb5ba4f5f0dfe7caaadfedf763ee99b586368e6ab43be8fceab97d9d3cf6579ef03f354cebd530391330d526f360d46e", 0xcb) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000001c0)={0x6, 0x114a1c2f, 0xffff}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:39 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00021400036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:39 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:39 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff", 0x23}], 0x1}, 0x0) 21:03:39 executing program 3: r0 = socket(0x10, 0x804, 0x7) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00e3ffff0f6c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f628e64b4bdef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f22eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/239, 0xef) 21:03:39 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) 21:03:39 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00021c00036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:39 executing program 0: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000200)=""/4096) r0 = semget(0x0, 0x3, 0x12) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000002500), 0x10) semtimedop(r0, &(0x7f0000000000)=[{0x2, 0x3, 0x1800}, {0x0, 0x3, 0x1000}, {0x0, 0x20, 0x800}], 0x3, &(0x7f0000000040)={0x0, 0x989680}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000002540)) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000080)=""/49) sendmsg$nfc_llcp(r2, &(0x7f00000024c0)={&(0x7f0000000140)={0x27, 0x1, 0x0, 0x0, 0x2, 0x3, "cbb6c367dc86385896606686854df1ecbcef53444369d28055d37420084b3585aeb0643383205e3befe7dbe8d0f728ab159ae3635e60c70c90d1295f88c960", 0x18}, 0x60, &(0x7f0000002400)=[{&(0x7f0000001200)="ed3f84375a6bbb5bc6c04bfc47a6e1efddad7d4e2ed6d501aac2237decfe65076f77a84725dd4adc9552b6e9f6bab71b9907a217d6596b596af2f79ca82a341e04e515e86497c6c522dc6d759bf0befdb7d4091a3164cbbfefe7c4215fc2e8dc5d3d10a728aa7d6ac9407bff62e536f04b329ebbd7761244e717d7e6ccf4385289d4bc398d80fc7e1c3144f8130a271a6a59d91f603bced070bdd26f2b08838efdd79fd9d5d19b19802af18dfa03148b1915fbb646", 0xb5}, {&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000001c0)}, {&(0x7f00000022c0)="254cf05ac7b3ed8e386ac873730be7f75b6dc479c15f", 0x16}, {&(0x7f0000002300)="4290e78ec78d4fd386adde6adde77dfd36cc87bbce6c3a5091846616c67d4439e8e67e8ad0cbd23a671b65a1c10b8b2942771c8452d567b18f1b27c69ff7b18e70ea65275d205b5a01f0d38d9566c51708510e527031a29a3dcb2316c824e460a7c9590a9579469b2aa6555105b90d48ec4859ba751f08d97ea9961aed7fb8f622f9dc365c22f77959de03ae4eb5c1094f91841c8bb662d89f6b64a3d6eccc032c849892266ef5468128c0c516d26ae267aa2dbc939441518398da068065d07c8b696a284c46d0ceadc1e43f4c690b1765f25d19", 0xd4}], 0x5, &(0x7f0000002480)={0x28, 0x117, 0x6, "9f594b1479d2560ff853d73971ba1ca62a"}, 0x28, 0x850}, 0x40040) 21:03:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x78) 21:03:39 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff", 0x23}], 0x1}, 0x0) 21:03:39 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:39 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00026000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:39 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x28000, 0x0) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r3}) 21:03:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) read(r2, &(0x7f0000367fe4)=""/91, 0x275) 21:03:39 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3375.049768][T11358] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 21:03:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8000, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f00000001c0)={0xffffffffffff0000, 0x247, 0x2, 0x1ff, 0x80000000, 0x7, 0x5, 0x0, 0x7fff, 0x40, 0x0, 0x5, 0x2, 0x947, &(0x7f0000000140)=""/81, 0x36, 0x8, 0x100}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x440000, 0x0) getsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xf230cb91) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:39 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002e100036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:39 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000040)={0x0, 0x1c, [0x2, 0xff, 0x7, 0x0, 0xc6, 0x830e, 0x9]}) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:40 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89a0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3375.249064][T11587] FAULT_INJECTION: forcing a failure. [ 3375.249064][T11587] name failslab, interval 1, probability 0, space 0, times 0 [ 3375.333150][T11587] CPU: 0 PID: 11587 Comm: syz-executor.1 Not tainted 5.3.0-rc2+ #86 [ 3375.341180][T11587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3375.351345][T11587] Call Trace: [ 3375.354664][T11587] dump_stack+0x172/0x1f0 [ 3375.359023][T11587] should_fail.cold+0xa/0x15 [ 3375.363626][T11587] ? release_sock+0x156/0x1c0 [ 3375.368330][T11587] ? fault_create_debugfs_attr+0x180/0x180 [ 3375.374151][T11587] ? page_to_nid.part.0+0x20/0x20 [ 3375.379207][T11587] ? ___might_sleep+0x163/0x280 [ 3375.384088][T11587] __should_failslab+0x121/0x190 [ 3375.389039][T11587] should_failslab+0x9/0x14 [ 3375.393546][T11587] kmem_cache_alloc_node+0x268/0x740 [ 3375.398849][T11587] __alloc_skb+0xd5/0x5e0 [ 3375.403183][T11587] ? netdev_alloc_frag+0x1b0/0x1b0 [ 3375.408300][T11587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.414558][T11587] ? netlink_autobind.isra.0+0x228/0x310 [ 3375.420206][T11587] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 3375.426456][T11587] netlink_sendmsg+0x972/0xd60 [ 3375.431228][T11587] ? netlink_unicast+0x710/0x710 [ 3375.436177][T11587] ? tomoyo_socket_sendmsg+0x26/0x30 [ 3375.441474][T11587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.447725][T11587] ? security_socket_sendmsg+0x8d/0xc0 [ 3375.453194][T11587] ? netlink_unicast+0x710/0x710 [ 3375.458140][T11587] sock_sendmsg+0xd7/0x130 [ 3375.462672][T11587] ___sys_sendmsg+0x803/0x920 [ 3375.467401][T11587] ? copy_msghdr_from_user+0x440/0x440 [ 3375.472878][T11587] ? __fget+0xa3/0x560 [ 3375.476959][T11587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.483224][T11587] ? __fget+0x384/0x560 [ 3375.487408][T11587] ? ksys_dup3+0x3e0/0x3e0 [ 3375.491832][T11587] ? __fget_light+0x1a9/0x230 [ 3375.496544][T11587] ? __fdget+0x1b/0x20 [ 3375.500620][T11587] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3375.506875][T11587] __sys_sendmsg+0x105/0x1d0 [ 3375.511467][T11587] ? __sys_sendmsg_sock+0xd0/0xd0 [ 3375.516512][T11587] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3375.522584][T11587] __x64_sys_sendmsg+0x78/0xb0 [ 3375.527445][T11587] do_syscall_64+0xfd/0x6a0 [ 3375.531953][T11587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3375.537849][T11587] RIP: 0033:0x459829 [ 3375.541744][T11587] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3375.561362][T11587] RSP: 002b:00007f940a07ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 21:03:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002f000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:40 executing program 3: r0 = socket(0xe, 0x802, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0xfffffffffffffff7, 0x0, 0x2, 0x9, 0x822, 0x8, 0x80, 0x4, r1}, 0x20) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r2}) 21:03:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000001240)=0xe8) sendmsg$inet(r0, &(0x7f0000001280)={&(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x80000001}, 0x10, &(0x7f0000001200)=[{&(0x7f0000000080)="7165f484736e076aff947f36452d7b3e046521f4fb028652ec2282c7740480306eedfd34226a847d9c87d78027e9afc8b5b4f8cfc8a030fb45faa1ecaca9866df458b2e93feeeb03807ab29e7d0f19dcbe9d088ed36a69fdef89b74e761168c1fa144e62c5a232318c098f4924480a60a3a7b8fae79adfa9b420114f8358da8c23c89c1a47e66c7be8e690cee61145e3d9d72c3cd54d651c5d7fd404e056293ce1122041", 0xa4}, {&(0x7f0000000140)="af2adf9be270073937eacfaa21b592b600db86bf53462095b6bce6e513e7c4e05becf5cb332b25b3e2c0c00a7a905d1f23fdf3885113fad5bfaf78", 0x3b}, {&(0x7f0000000180)="f2ddfd09e49fed0bae9297de65cee5fa5af25e2a5fbed56cacfcd51004589c3f7924e33351f8ff44b16770e4bdffd13bede856936ea460d239da0f613951500120c759a3b87d26bc65e467fb19ccea2b85591e3322bd66eadc2598c49f6d766c04968899363ad738977eb7a708888810334fc0717787942dff3903de", 0x7c}, {&(0x7f0000000200)="85a2c1cf5c886151e36c356bd9628fc38e4166bb9d5d5e14162adebc6792111bf50d0f4abc6bdecd2c6458d91c680d0c2abe993bac4920272e7d24c99488fddeb0da04bb2884526bc91cf9491917e7e09073ed53d78f9aa54016a9488d4d0b164a6245811457530d55645a8d140121537a234c3db40cf012d655a81fba7b255b573d225299cded59a783c8fe746bd1c8840e8fdf143aa6aaadb2cd236b84edf098478adc79bfe56b3abe3617a3c989ed7daabe896c475e7aafcf40d6396d7dc30e75bb782ae5cbafb101084c314bfebaf1f2712bcbac76dc9abdc2d44db429f59f060539e7bfa9aef6ba9afa90cc902a35e837d3b194daa412cd3cf01c9b8dfcf6189d4e54f0adcdc1a93d3d68ffc747f80cf4adf1de4fd556649da459d796b12d12be034375dd86fdc5f393706061d9bb260955445d578b76b3d24d31ce524dfb16c11ab65fe89d36485ae3679d17d0481ad7f445dfd2c87d32def35e6879ac82c3a47a5c66d9beed4a774df04548f2b02a0bfaa125a6d6662ff17e55b01c683ae69e352345dbd6241c3982f7e6b8fba8bc5980d26ed1ceafd1bfaa1094ac01ecc0beb9beb01d16b2e6eab7f315a5a3834e48666338132c8cd075f2fd89dd71b25e06ab7e387a899f62b2009643e70e202d98b86bb237dfaa86c0b7c51bdc7aadcfef7b0f6a99818a2c54a0391c9a245092652f98a695155af390abfee969cfa359cc6b24a9931e55793e21ae1c6cc8eadf6e31bcf8507f079bb89f77ba4fc967c06697666f050c3a3acb98bd26c1c2378730f12600dbc763235db833ded6cede52aea38b7e348f23f46a7955ba5662814ad633913df3159c704c38b6b2939c7309e9337da631b635b39eb855ed2b07ede97e42d7ba7aefe9cb06dee002603d00c074c76580f2d33bbe080de663bd4727d4224a7e436c095349e5cd0bf4c469d5ad78820424d99beaa91bd9c1f8743d75d913954958565d2d5b2f7705fe2cf005c9cf5cbdb6466891e65d89f41edc5894ff9bbab76f4a51df48826d7cbc9e3f4c43803285590bde627284342297e460893daf04b5b51547345750bf25270c326bdb6fdeef7e11d0d4900a337588d6e67a61e338b2822343ee9550778e2bdf7b3ea557981688a702800fe8e9ea757541bbd9eb3144dc4b9fc9fc0f194de61b61c83cc018b1cfafd281fd1dee85c3090cb6152660376522465d5fe58615e2b64d7a1e992a233e0ab4bedaadb5377df98ca967b7db12cd7b871ad257f78fec9e591aacecc1b8b44178b5dc5f773e41dc1c630a15b825bc0b69860d0b3adb39b0b85de9eed8aa66e1a352ae2c4d6a22c40d84ada1be61d6ec57cdc89c79413ba4f7001a546ffc231743a7a4a91fbd4df1dd1a11c37182638cad978264b23a1087173f3234be0092456f6d18ca795334b847fca6c352a15727bbb0211c95c9cf99d02147f66db4d2ccc72d1e0f43d5cacb9080b441d21702aa9da0498308bc53fa8844800c62712c0cc3a6a096e6bb763a00a8d75dc34b4d68518941c7ad05c6f02211ab54fb9cde5dd6cc1e9d4935e70a6cf42d6c58bf46e50ac611a91cd7ee93ac6683804a09cb8477c09b8093a382aba12ce94f562374be1150777925708747614c0fff1d4a17d9b6c2e66b141d50aed5e04b9e12c2947ca49c139492561510ba6f12ada1375a4c2f5ef18761f4319b3203341c7f159d7b7e139fe6e3fffebf37166ee11e65928d210a6b80f2666d4292e17e5c2b2a7712000fad828a211e8af19d8ed928f27537c76ba0904b15f758aeeb617db2026d9c99b853e6d56e189e8ef47428c7767af21164cbfbde8d3e0c0eaa34dd40c60a30f9235d96144202bbd0595011fe895e6a3c84fdd2772699ab8e88e03bc4d1bb7deb0b280d12a35ab687432809e31c562ccbc40e76ea45e927795fc0af0ab0b125912d1ddec27142197647630c5cd7d016b99ad1451fa5aed40d0e49bb33cd2d0e720d11120fbf83fde946838266dfcb763f203960649ae5c8023a374043f996b7a3b2d1ffb8fb38b27612a0644fe27266fda2ba021a565f22c7d09572e5065aa0a98f43789c44ab7e16509d5f40be1f523a58c1541e61f98a689fce49f4ece11aa7f461620fde05c65d3fce4014df6bf0c8dd6e25c1ccfd3beefbb347ffe4fedfbed577db6b84c6b0b598da392718e410ef47e4a051f83325223b95338a9e63d2c0da01443c1932360c28fea3da63de4ed79dcd7c546133dfd5e21cc19462150b02bee9b00d88adb0eac1bc9f3b56162aea04d5a261465ba1b22d067baa3a4412dcede1a33fb9deba48c1562e64dc7c7853b03d60b48d3cd29a2b8836235e826eb6021ed902729f37198e1bab2d5fd9f0b513a3f7cd86f983a5c0a447cdb4471dff80e8e6662b8a08d9ad8e32dc22576c84c2501b359f06a4a6a47ff92396c87c2d0f4bd6d908ea0c884a50e07cb08bd2614410d61b1eef4cab00a0f382b47c31a2b1d2e6c5a5a85ad6789eeb930bc697dc8e5f767f608cdaa7a8dde103a95b0f8cdb72017bd7dcb8aa01a9547f59312d3daf5cd9cf9d20f8b4eab55a4ec59463248e2ec89f4fb76b3c901db4981d2b85dc2b5af3aba95cc5178b852acd5176df5e8520579e72ec257d64bb45b30a99dd77a34f34c605e05c9c4c3f6ea2a8f3b0e33eeaab107ae5e9952755cdf2252d5576a8e8c0317dc6ec657d9e96f56f0d769cb04752a2b7480c2cea3c86bf82c9bef3b4d595009b1e2ebffac9df7ce8ddc5fbde21b59b273d81c7ceca876424e113e10df6d22c505203689a5d98e38e48e89aa1a1128c77b97cec09b0dbd1f4ac8117fe556a7c88ddf71ad10684ada9bffedf72571f969f1cd9932f8207d24d2bbc52dc123680aa6eab940eb8e2e52ac2694aae8d1771b81203ed480d2dc4750f59b246dd8c58dbf9a38840738e5bd9fadabc8027f91d7a1c37495149f5196e17cebce5e34c2998d9200a0ad911a07937d3793d8e6ad2b070b904e6cb9a0939413ebdcdaae1239caddb2131acba2ab1e958b2ef7ebbb98cb596f57785678786b9e2f7c8de3ca443a007252b5ae06c55f7ed2f77ed25d964b3d315642078fad3bde413692d9bb3d6961eef49acd1e9d58dcb7ddc64e21dad4c09f07b9905369313c8cad18083fcf6c9efaecd4a75c2a836be00c3b1368c0a0a9bc5bec8c17560079b99d702569fc84a54a8743fd3395363638435d857dd1cbff686367d33e387997411836a25a68f22c19a377650bc1a6b2a3d3ac278610bb24859224195053c96472c9ac9c2b7775db8a76c4130c38cf13d69fd1db79442e782edd920ef3ee6ac5b1fcc5743180dc7c737ea44ccaa969fba808ecca8f2d1f2b098a9f56d1c66101461d9b40eca5e8b1762e1c7cf436549ce1a2fce25b9ff5458dcca852b135bde26070ec84d58d9856a80aad1d42d1be9dd7026907d8b5cafdc9842dff3fd97dbd4198a6b98ce3529cb5f9a8eeeca70b31c6933c1cb0da0fb1482aa8e5fdb82b2056fcc112ae7fe0ae95530ea3bad2a43f606b57d91fee1e05e16049b3c9beffeac66e883e3b353f770186355bd3182d6a34ce029a40de8d5763fe4faff550211561759cad8f3fc4b7ef14f15fa1cc14d95523338054de310e99065bfda749d2d4d38330ceec9b40f1ae2b6bb25234d2530e8ceac563a71f449c2574713246f0d083bbe689a3f713a0254f35dce99fee48cce77ecede234e65af6baf2171ad552f29693c44c52607c87bf508cdb98dfd05bc2eff125c7dd6278606f0e8b4453bffb15f8bc2701b2a3dd984f58e1050e369aa72f08e5c87510cfbbca9feb4344eaa5c25472b916657cb9e77253806c356a5412a7f53d493fef2db12b3498280bae70e91415e467bb7c1c452f65b810c4db64f5ed87cab79d94ff60db9771c2660c3bbee4f122d59ee9058a71e4079293dc2e24530d5d4867260cd439dc4f91ef67ea0c797bdd7ba406c4bfebb5e3d4e3ce8e337c3ce8863f053bfa8a544c8d2f8a1767d3b735fc16d3bfb7dada8182aa5b2e10ea6a98f9d34fd4d9aa7830852ae9be08ea244c1e84c69cbe022b806688d3923e141646b6fe68c038d12741563372f60f399d927d05f681926c0aae3285008f2c590c265805a9d6a901e691172e26fdf58cb2a99d259509e4a2a0d217369028f933af506ae83491b6b93f97c8b16a5667fe7320f2903c48b900964981e3ff6b348efc648a09161463dcdf70e77d49cc2dc6b6bf9cd457520f79fa77fd71dac89fb73acee4bc1358e6cb5b7914efebe273bd3be0a33c0715a932afc48dac447d614f627d7e847a81476a65e19f6d67f6b88fecdc93713285a66228a7c0440bd01dcd45897e76b8896f4e4a916686e93d5a44a624e690295b6ce5c60276d12691cde565b516dc75eac3521775708157c11794ce1debf04468382f68a9b35bcd359e328f3134f3fb0581b801818377deeaec08ec0942027d59104ecb4303a3c8c52a473eea768eef87e651477e4b5fd238c33848d5da671f8b8c642609df3c5f0ecba2e2ec1a916e58602cb5c542253fcce762cdefc2a4ea88841487d895ad3d38cd53eb5655d9ea3202ab18b01fd3d595fef9db4fc50790d665efb8774fb7d80cbb1fec7d9dfe4db7c11e043ecbbd6cefc15cdf3b818799aca83fac60874a8a92127ca30455b40cc3df491df309775206d1d40879e3fa3e61f39bead2160ac1799dadcc351c839fe4b0dbfa51b26eb4f4e533b2ac44fa93fdb8d4075b5642ebde2ae20e5ec27b908a3604578869820ce576be073b53ffe1ff5ca75aa9094daf7c1525f2168512fc18a2157ff9981a46daae1a100ad53bb8bbf0379cd6655105116728f17249483e78e4649a59738dbb3099e17d3b01494da662c1d2ca29a68de3232dd141a92a3cf9360595ab34c8fb68f9f0ee0171e02e2d5a8cad1b4d15b87de0fea884ee2b65235aab56dd0b08a34d716ae6695b4b5a7c9f0c5a4a351f6201ef0b1f34546edd39d74c81cfa676b5ce996dc889a23307325962f01c755be6662270ac4923b6185065e7d77412f1a0f190869d969491fdc5c475939ed608e38695cd399282f90fa13ed30bd1505fd6ef40546d690a74d5ae5daa53f8c28d3754ac1f029669585279c9134d1b4a41255f9c65c2b29bca9039bce6c9e434ad006e34d83b85bfce802969c188f9167043670b02018588b898a37acbbc3f3da3eb63a8f3a48e818ec427093ac8035d4e8e60560e4dd70372a3aa5eaa67112a991e8815fe979317773310f97937434b8168a478f24bbd32ed9374289eaf480702fd9a9a882123f46ce6afe55c0d30922c00a486cd08eb866c85767126ef5981d4cece95b0555df74ad341cee68ba5a90858263a38e0f99c74f96a9efd55600c068580707b5ae21a118b685e0f273242b427cec8ef606fee0e3f9d65edc06c21502a6e457cdcf26f7fc4ff71dc25b272ab9ee17f711cfe9a12cf7491f74b5b89286c920e2cd20a67582c97cc62e91eb52f7cf9b08b5a841e0305fbb97574d565d5d337db3f6a1867a78d6f83dadad25c86b3d1433d521e80fe3074c454939f03d8eae115d8371e09279c497f751c6faef297d0975ba0e889148c7dfb11961e45492db943646c0f5293fddaaeb532d094377f94471d39ea93f9778fb853224091fafd7ec96a08d0d02f06368aa79747634dddacb4aa93f75fad27d6e682327381983e67cc773f5133c4e46adb0c7f62e63d0467b012ec57a645f13502a1b1b44c37eb7b530c7a8a24d86d306f34a98a28086e7e705f7dcbc3483ee6f40c2a7548fa3108cc70744e9b54319949", 0x1000}], 0x4, &(0x7f0000001440)=[@ip_retopts={{0x60, 0x0, 0x7, {[@generic={0x7, 0xb, "640bcb265bd1d5ad8e"}, @rr={0x7, 0x2b, 0x7ff, [@local, @broadcast, @multicast2, @broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @remote, @remote, @dev={0xac, 0x14, 0x14, 0xe}, @multicast2, @rand_addr=0x6]}, @generic={0x88, 0x12, "87c606c764bd78d5fea9646d51e51679"}, @lsrr={0x83, 0x7, 0x4, [@dev={0xac, 0x14, 0x14, 0x23}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @rand_addr=0x1f, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_ttl={{0x14, 0x0, 0x2, 0xc}}], 0x110}, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:40 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3375.579695][T11587] RAX: ffffffffffffffda RBX: 00007f940a07ac90 RCX: 0000000000459829 [ 3375.579705][T11587] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3375.579712][T11587] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3375.579718][T11587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f940a07b6d4 [ 3375.579725][T11587] R13: 00000000004c7074 R14: 00000000004dc630 R15: 0000000000000004 21:03:40 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020003036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:40 executing program 0: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000001}) 21:03:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x27ce, 0x100) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x8001003, 0x3, 0x2}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:40 executing program 3: r0 = socket(0xe, 0x1, 0x0) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'ipddp0\x00', 0xa0}) [ 3375.754326][T11907] FAULT_INJECTION: forcing a failure. [ 3375.754326][T11907] name failslab, interval 1, probability 0, space 0, times 0 [ 3375.818905][T11907] CPU: 1 PID: 11907 Comm: syz-executor.1 Not tainted 5.3.0-rc2+ #86 [ 3375.828939][T11907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3375.839193][T11907] Call Trace: [ 3375.842504][T11907] dump_stack+0x172/0x1f0 [ 3375.846948][T11907] should_fail.cold+0xa/0x15 [ 3375.851562][T11907] ? __kasan_check_read+0x11/0x20 [ 3375.856611][T11907] ? fault_create_debugfs_attr+0x180/0x180 [ 3375.862431][T11907] ? page_to_nid.part.0+0x20/0x20 [ 3375.867464][T11907] ? ___might_sleep+0x163/0x280 [ 3375.872329][T11907] __should_failslab+0x121/0x190 [ 3375.877306][T11907] should_failslab+0x9/0x14 [ 3375.881827][T11907] kmem_cache_alloc_node_trace+0x274/0x750 [ 3375.887642][T11907] ? kasan_unpoison_shadow+0x35/0x50 [ 3375.894439][T11907] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3375.900283][T11907] __kmalloc_node_track_caller+0x3d/0x70 [ 3375.905926][T11907] __kmalloc_reserve.isra.0+0x40/0xf0 [ 3375.911307][T11907] __alloc_skb+0x10b/0x5e0 21:03:40 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = io_uring_setup(0xda0, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x1, 0x305}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)={0x90000019}) r2 = socket(0x10, 0x802, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write(r2, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x85) fanotify_init(0x29, 0x40000) [ 3375.915754][T11907] ? netdev_alloc_frag+0x1b0/0x1b0 [ 3375.921076][T11907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.927356][T11907] ? netlink_autobind.isra.0+0x228/0x310 [ 3375.933000][T11907] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 3375.939450][T11907] netlink_sendmsg+0x972/0xd60 [ 3375.944224][T11907] ? netlink_unicast+0x710/0x710 [ 3375.949178][T11907] ? tomoyo_socket_sendmsg+0x26/0x30 [ 3375.954471][T11907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.960748][T11907] ? security_socket_sendmsg+0x8d/0xc0 [ 3375.966302][T11907] ? netlink_unicast+0x710/0x710 [ 3375.971250][T11907] sock_sendmsg+0xd7/0x130 [ 3375.975678][T11907] ___sys_sendmsg+0x803/0x920 [ 3375.980392][T11907] ? copy_msghdr_from_user+0x440/0x440 [ 3375.985865][T11907] ? __fget+0xa3/0x560 [ 3375.989974][T11907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3375.996249][T11907] ? __fget+0x384/0x560 [ 3376.000415][T11907] ? ksys_dup3+0x3e0/0x3e0 [ 3376.004838][T11907] ? __fget_light+0x1a9/0x230 [ 3376.009519][T11907] ? __fdget+0x1b/0x20 [ 3376.013595][T11907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 21:03:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020005036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3376.019940][T11907] __sys_sendmsg+0x105/0x1d0 [ 3376.024551][T11907] ? __sys_sendmsg_sock+0xd0/0xd0 [ 3376.029621][T11907] ? switch_fpu_return+0x1fa/0x4f0 [ 3376.034767][T11907] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3376.040849][T11907] __x64_sys_sendmsg+0x78/0xb0 [ 3376.045638][T11907] do_syscall_64+0xfd/0x6a0 [ 3376.050157][T11907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3376.056057][T11907] RIP: 0033:0x459829 21:03:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010502000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x7fffffff, 0x0, {0x0, 0x2, 0x9f7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0daa4cfa30f7f314bf3a472f8610116aaec59a0a85b49a4c96b4d634ca1e2b32"}}) pipe(0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x0, @remote, 0x2}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x8, @mcast1}, @in6={0xa, 0x4e21, 0x1, @remote, 0xffff}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e24, 0x4, @local, 0x6}, @in={0x2, 0x0, @empty}, @in6={0xa, 0x4e20, 0x0, @empty}], 0xbc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='yeah\x00', 0x2f9) sendto$inet(r3, &(0x7f00000012c0)=' ', 0x1, 0x0, 0x0, 0x0) [ 3376.059952][T11907] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3376.059960][T11907] RSP: 002b:00007f940a07ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3376.059974][T11907] RAX: ffffffffffffffda RBX: 00007f940a07ac90 RCX: 0000000000459829 [ 3376.059981][T11907] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3376.059997][T11907] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3376.112053][T11907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f940a07b6d4 [ 3376.120029][T11907] R13: 00000000004c7074 R14: 00000000004dc630 R15: 0000000000000004 21:03:40 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020006036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:40 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:41 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x2000) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x1, 0x1}) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:41 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000180)={0x17, 0xfc, &(0x7f0000000080)="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"}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x30) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000200)=0xb9, 0x8) 21:03:41 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020007036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3376.386175][T12321] FAULT_INJECTION: forcing a failure. [ 3376.386175][T12321] name failslab, interval 1, probability 0, space 0, times 0 21:03:41 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002000003886c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0730babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xffffffffffffff68) [ 3376.499622][T12321] CPU: 0 PID: 12321 Comm: syz-executor.1 Not tainted 5.3.0-rc2+ #86 [ 3376.507666][T12321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3376.517725][T12321] Call Trace: [ 3376.521047][T12321] dump_stack+0x172/0x1f0 [ 3376.525422][T12321] should_fail.cold+0xa/0x15 [ 3376.530025][T12321] ? fault_create_debugfs_attr+0x180/0x180 [ 3376.535951][T12321] ? page_to_nid.part.0+0x20/0x20 [ 3376.541009][T12321] ? ___might_sleep+0x163/0x280 [ 3376.545872][T12321] __should_failslab+0x121/0x190 [ 3376.551282][T12321] should_failslab+0x9/0x14 [ 3376.555818][T12321] kmem_cache_alloc+0x2aa/0x710 [ 3376.560761][T12321] audit_log_start+0x2dd/0x7c0 [ 3376.560777][T12321] ? audit_log_task_context+0x170/0x170 [ 3376.560798][T12321] ? from_kuid+0x85/0xc0 [ 3376.560810][T12321] ? map_id_up+0x320/0x320 [ 3376.560835][T12321] ? audit_compare_dname_path+0x120/0x120 [ 3376.585521][T12321] audit_log_common_recv_msg+0x14b/0x230 [ 3376.591375][T12321] audit_receive_msg+0x1bf7/0x2640 [ 3376.596531][T12321] ? audit_log_feature_change.part.0+0x150/0x150 [ 3376.602872][T12321] ? mutex_lock_io_nested+0x1260/0x1260 [ 3376.608452][T12321] ? lock_downgrade+0x920/0x920 [ 3376.613318][T12321] ? netlink_deliver_tap+0x146/0xbf0 [ 3376.618643][T12321] ? lock_downgrade+0x920/0x920 [ 3376.623522][T12321] audit_receive+0x114/0x230 [ 3376.628121][T12321] netlink_unicast+0x531/0x710 [ 3376.632895][T12321] ? netlink_attachskb+0x7c0/0x7c0 [ 3376.638012][T12321] ? _copy_from_iter_full+0x25d/0x8a0 [ 3376.643391][T12321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.649678][T12321] netlink_sendmsg+0x8a5/0xd60 [ 3376.654451][T12321] ? netlink_unicast+0x710/0x710 [ 3376.659403][T12321] ? tomoyo_socket_sendmsg+0x26/0x30 [ 3376.664728][T12321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.670976][T12321] ? security_socket_sendmsg+0x8d/0xc0 [ 3376.676469][T12321] ? netlink_unicast+0x710/0x710 [ 3376.681419][T12321] sock_sendmsg+0xd7/0x130 [ 3376.685865][T12321] ___sys_sendmsg+0x803/0x920 [ 3376.690557][T12321] ? copy_msghdr_from_user+0x440/0x440 [ 3376.696029][T12321] ? __fget+0xa3/0x560 21:03:41 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:41 executing program 3: r0 = socket(0xd, 0x802, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x24000) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3376.700107][T12321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3376.706359][T12321] ? __fget+0x384/0x560 [ 3376.710527][T12321] ? ksys_dup3+0x3e0/0x3e0 [ 3376.714962][T12321] ? __fget_light+0x1a9/0x230 [ 3376.719659][T12321] ? __fdget+0x1b/0x20 [ 3376.723742][T12321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3376.729997][T12321] __sys_sendmsg+0x105/0x1d0 [ 3376.734594][T12321] ? __sys_sendmsg_sock+0xd0/0xd0 [ 3376.739663][T12321] ? switch_fpu_return+0x1fa/0x4f0 [ 3376.744789][T12321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 21:03:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = getpgrp(0x0) fcntl$setown(r0, 0x8, r1) arch_prctl$ARCH_SET_GS(0x1001, 0xf1) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfffffffffffffee5) [ 3376.750972][T12321] __x64_sys_sendmsg+0x78/0xb0 [ 3376.755749][T12321] do_syscall_64+0xfd/0x6a0 [ 3376.760781][T12321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3376.766681][T12321] RIP: 0033:0x459829 [ 3376.770585][T12321] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3376.790463][T12321] RSP: 002b:00007f940a07ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3376.798911][T12321] RAX: ffffffffffffffda RBX: 00007f940a07ac90 RCX: 0000000000459829 [ 3376.806893][T12321] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3376.806901][T12321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3376.806908][T12321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f940a07b6d4 [ 3376.806914][T12321] R13: 00000000004c7074 R14: 00000000004dc630 R15: 0000000000000004 [ 3376.828879][T12321] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 3376.939852][T12321] audit: out of memory in audit_log_start 21:03:41 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020007036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:41 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4000, 0x0) write(r1, &(0x7f00000001c0)="bad7b48de5997d9860fddf87c7e21cb938670e4c2636fa7a0465c194bab19858d0b65bc8de2bd9c6edfa23fb7dd88d1ea62463feb27c0ec70fe3d34b839eb66732196e892e3782b9e84210e90284a37b739593ae8f45862f0790da99eb4d2027bb4e8a0b2a4c593cb371bf07f803aefef01e253a522fb1f072b0edae0f06f38f928e2e0637ce4f7325857d57ea672de29fe7cce8960150c0118bea3d550a785ef5494ff98173e4b313eebeedd07567e86570", 0xb2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x100000000, 0x2, 0x3]}, &(0x7f0000000140)=0xa) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000080)={0x6, 0x5, 0x9}) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x6, 0x0, 0x5, 0x6, 0xffffffff}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:41 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020009036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:41 executing program 3: write(0xffffffffffffffff, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x2b) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x8, 0x4) 21:03:41 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89d4, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3377.080386][T12782] FAULT_INJECTION: forcing a failure. [ 3377.080386][T12782] name failslab, interval 1, probability 0, space 0, times 0 [ 3377.110386][T12782] CPU: 1 PID: 12782 Comm: syz-executor.1 Not tainted 5.3.0-rc2+ #86 [ 3377.118447][T12782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3377.128518][T12782] Call Trace: [ 3377.131968][T12782] dump_stack+0x172/0x1f0 [ 3377.136328][T12782] should_fail.cold+0xa/0x15 [ 3377.140941][T12782] ? __lockdep_free_key_range+0x120/0x120 [ 3377.146681][T12782] ? fault_create_debugfs_attr+0x180/0x180 [ 3377.152505][T12782] ? page_to_nid.part.0+0x20/0x20 [ 3377.157653][T12782] ? ___might_sleep+0x163/0x280 [ 3377.162547][T12782] __should_failslab+0x121/0x190 [ 3377.167533][T12782] should_failslab+0x9/0x14 [ 3377.172072][T12782] kmem_cache_alloc_node+0x268/0x740 [ 3377.177370][T12782] ? page_to_nid.part.0+0x20/0x20 [ 3377.182413][T12782] __alloc_skb+0xd5/0x5e0 [ 3377.186782][T12782] ? netdev_alloc_frag+0x1b0/0x1b0 [ 3377.191895][T12782] ? kmem_cache_alloc+0x314/0x710 [ 3377.197491][T12782] audit_log_start+0x302/0x7c0 [ 3377.202266][T12782] ? audit_log_task_context+0x170/0x170 [ 3377.207837][T12782] ? from_kuid+0x85/0xc0 [ 3377.212119][T12782] ? map_id_up+0x320/0x320 [ 3377.216558][T12782] ? audit_compare_dname_path+0x120/0x120 [ 3377.222321][T12782] audit_log_common_recv_msg+0x14b/0x230 [ 3377.227992][T12782] audit_receive_msg+0x1bf7/0x2640 [ 3377.233113][T12782] ? audit_log_feature_change.part.0+0x150/0x150 [ 3377.239458][T12782] ? mutex_lock_io_nested+0x1260/0x1260 [ 3377.245022][T12782] ? lock_downgrade+0x920/0x920 [ 3377.249896][T12782] ? netlink_deliver_tap+0x146/0xbf0 [ 3377.255196][T12782] ? lock_downgrade+0x920/0x920 [ 3377.260086][T12782] audit_receive+0x114/0x230 [ 3377.264690][T12782] netlink_unicast+0x531/0x710 [ 3377.269469][T12782] ? netlink_attachskb+0x7c0/0x7c0 [ 3377.274619][T12782] ? _copy_from_iter_full+0x25d/0x8a0 [ 3377.280002][T12782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.286275][T12782] netlink_sendmsg+0x8a5/0xd60 [ 3377.291048][T12782] ? netlink_unicast+0x710/0x710 [ 3377.295988][T12782] ? tomoyo_socket_sendmsg+0x26/0x30 [ 3377.301284][T12782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.307804][T12782] ? security_socket_sendmsg+0x8d/0xc0 [ 3377.313361][T12782] ? netlink_unicast+0x710/0x710 [ 3377.318428][T12782] sock_sendmsg+0xd7/0x130 [ 3377.322855][T12782] ___sys_sendmsg+0x803/0x920 [ 3377.327552][T12782] ? copy_msghdr_from_user+0x440/0x440 [ 3377.333021][T12782] ? __fget+0xa3/0x560 [ 3377.337099][T12782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3377.343352][T12782] ? __fget+0x384/0x560 [ 3377.347522][T12782] ? ksys_dup3+0x3e0/0x3e0 [ 3377.351955][T12782] ? __fget_light+0x1a9/0x230 [ 3377.356740][T12782] ? __fdget+0x1b/0x20 [ 3377.360826][T12782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3377.367180][T12782] __sys_sendmsg+0x105/0x1d0 [ 3377.371787][T12782] ? __sys_sendmsg_sock+0xd0/0xd0 [ 3377.376881][T12782] ? switch_fpu_return+0x1fa/0x4f0 [ 3377.382006][T12782] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3377.388098][T12782] __x64_sys_sendmsg+0x78/0xb0 [ 3377.392885][T12782] do_syscall_64+0xfd/0x6a0 [ 3377.397407][T12782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3377.403390][T12782] RIP: 0033:0x459829 [ 3377.407330][T12782] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3377.426954][T12782] RSP: 002b:00007f940a07ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3377.435409][T12782] RAX: ffffffffffffffda RBX: 00007f940a07ac90 RCX: 0000000000459829 [ 3377.443391][T12782] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3377.451380][T12782] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3377.459398][T12782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f940a07b6d4 [ 3377.467413][T12782] R13: 00000000004c7074 R14: 00000000004dc630 R15: 0000000000000004 21:03:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xa) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:03:41 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002000a036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:42 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002000b036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:42 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002000f036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:42 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020011036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000080)=0xf325, 0x4) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x4, 0x5}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) getsockopt$inet_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000d12ffc)) 21:03:42 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89e1, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3377.487305][T12782] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 21:03:42 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='eth0procem1\x00', 0xc, 0x3) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000240)="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", 0xfdbf) fallocate(r1, 0x25, 0x2, 0x4) 21:03:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x40000) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x1, 0x4c, 0x40, 0x6a7, 0x0, 0x3f, 0xc00, 0x2, 0x5, 0x1, 0x5, 0x1bd, 0x3, 0x83, 0x5, 0xeba, 0x607, 0x653c2b5d, 0x7f, 0x8, 0x5, 0xfffffffffffffffc, 0x40, 0x3, 0x7, 0x401, 0x1, 0xfff, 0x7, 0x81, 0x40, 0x3706, 0x1, 0x8, 0x6, 0xee92, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x1000, 0x200, 0x401, 0x9, 0x0, 0x2d, 0x7fffffff}, r1, 0xd, r1, 0x8) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) fcntl$notify(r0, 0x402, 0x8) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:42 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020012036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3377.575221][T12782] audit: out of memory in audit_log_start 21:03:42 executing program 1 (fault-call:1 fault-nth:4): r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:42 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x7, 0x4) 21:03:42 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020013036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:42 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89e2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000000)=r3, 0x1) [ 3377.817210][T13362] FAULT_INJECTION: forcing a failure. [ 3377.817210][T13362] name failslab, interval 1, probability 0, space 0, times 0 [ 3377.914240][T13362] CPU: 0 PID: 13362 Comm: syz-executor.1 Not tainted 5.3.0-rc2+ #86 [ 3377.922754][T13362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3377.932906][T13362] Call Trace: [ 3377.936229][T13362] dump_stack+0x172/0x1f0 [ 3377.940568][T13362] should_fail.cold+0xa/0x15 [ 3377.945153][T13362] ? netlink_sendmsg+0x8a5/0xd60 [ 3377.950110][T13362] ? fault_create_debugfs_attr+0x180/0x180 [ 3377.955919][T13362] ? page_to_nid.part.0+0x20/0x20 [ 3377.960956][T13362] ? ___might_sleep+0x163/0x280 [ 3377.965808][T13362] __should_failslab+0x121/0x190 [ 3377.970745][T13362] should_failslab+0x9/0x14 [ 3377.975244][T13362] kmem_cache_alloc_node_trace+0x274/0x750 [ 3377.981043][T13362] ? kasan_unpoison_shadow+0x35/0x50 [ 3377.986343][T13362] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3377.992151][T13362] __kmalloc_node_track_caller+0x3d/0x70 [ 3377.997785][T13362] __kmalloc_reserve.isra.0+0x40/0xf0 [ 3378.003153][T13362] __alloc_skb+0x10b/0x5e0 [ 3378.007565][T13362] ? netdev_alloc_frag+0x1b0/0x1b0 [ 3378.012671][T13362] ? kmem_cache_alloc+0x314/0x710 [ 3378.017694][T13362] audit_log_start+0x302/0x7c0 [ 3378.022479][T13362] ? audit_log_task_context+0x170/0x170 [ 3378.028031][T13362] ? from_kuid+0x85/0xc0 [ 3378.032278][T13362] ? map_id_up+0x320/0x320 [ 3378.036707][T13362] ? audit_compare_dname_path+0x120/0x120 [ 3378.042421][T13362] audit_log_common_recv_msg+0x14b/0x230 [ 3378.048054][T13362] audit_receive_msg+0x1bf7/0x2640 [ 3378.053168][T13362] ? audit_log_feature_change.part.0+0x150/0x150 [ 3378.059500][T13362] ? mutex_lock_io_nested+0x1260/0x1260 [ 3378.065053][T13362] ? lock_downgrade+0x920/0x920 [ 3378.069927][T13362] ? netlink_deliver_tap+0x146/0xbf0 [ 3378.075210][T13362] ? lock_downgrade+0x920/0x920 [ 3378.080078][T13362] audit_receive+0x114/0x230 [ 3378.084703][T13362] netlink_unicast+0x531/0x710 [ 3378.089463][T13362] ? netlink_attachskb+0x7c0/0x7c0 [ 3378.094571][T13362] ? _copy_from_iter_full+0x25d/0x8a0 [ 3378.099940][T13362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.106193][T13362] netlink_sendmsg+0x8a5/0xd60 [ 3378.110966][T13362] ? netlink_unicast+0x710/0x710 [ 3378.115918][T13362] ? tomoyo_socket_sendmsg+0x26/0x30 [ 3378.121210][T13362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.127474][T13362] ? security_socket_sendmsg+0x8d/0xc0 [ 3378.132940][T13362] ? netlink_unicast+0x710/0x710 [ 3378.137879][T13362] sock_sendmsg+0xd7/0x130 [ 3378.142302][T13362] ___sys_sendmsg+0x803/0x920 [ 3378.146975][T13362] ? copy_msghdr_from_user+0x440/0x440 [ 3378.152524][T13362] ? __fget+0xa3/0x560 [ 3378.156625][T13362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.162896][T13362] ? __fget+0x384/0x560 [ 3378.167050][T13362] ? ksys_dup3+0x3e0/0x3e0 [ 3378.171469][T13362] ? __fget_light+0x1a9/0x230 [ 3378.176155][T13362] ? __fdget+0x1b/0x20 [ 3378.180238][T13362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3378.186480][T13362] __sys_sendmsg+0x105/0x1d0 [ 3378.191070][T13362] ? __sys_sendmsg_sock+0xd0/0xd0 [ 3378.196102][T13362] ? switch_fpu_return+0x1fa/0x4f0 [ 3378.201232][T13362] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3378.207305][T13362] __x64_sys_sendmsg+0x78/0xb0 [ 3378.212076][T13362] do_syscall_64+0xfd/0x6a0 [ 3378.217027][T13362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3378.222913][T13362] RIP: 0033:0x459829 [ 3378.226806][T13362] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3378.246534][T13362] RSP: 002b:00007f940a07ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3378.254962][T13362] RAX: ffffffffffffffda RBX: 00007f940a07ac90 RCX: 0000000000459829 21:03:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x0, [], [{0x100, 0x5, 0x2, 0x6e, 0x0, 0x200000000}, {0x3, 0x4, 0x2, 0x100000001, 0xfffffffffffffff8, 0x3}], [[], [], []]}) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000080)=0x44) 21:03:43 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020014036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3378.262942][T13362] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3378.270906][T13362] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3378.278980][T13362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f940a07b6d4 [ 3378.287124][T13362] R13: 00000000004c7074 R14: 00000000004dc630 R15: 0000000000000004 [ 3378.346406][T13362] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 3378.383473][T13362] audit: out of memory in audit_log_start 21:03:43 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89e8, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x4, {0x2, 0x4e23, @empty}, 'veth1_to_hsr\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x2, 0x0) r2 = syz_open_dev$media(&(0x7f0000000680)='/dev/media#\x00', 0x400, 0x200800) renameat(r1, &(0x7f0000000580)='./file0/file0\x00', r2, &(0x7f0000000600)='./file0/file0\x00') setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e24, @multicast1}}, 0x0, 0x2, 0x0, "f8092f673efef0d308a6bb849d2e6e66fe1f80eb5defa61127cf8dfe43c9374d1b0f62af6b8e3541ed854106d660927d546b133abff741109d16127614fa790f12eb6c97f440c4903602bc8349d92e0b"}, 0xd8) ioctl$sock_ifreq(r0, 0x89f9, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000380)="622907a9d5fca855fbe4168f3419c15944b81b166b02c6852bebc35c95d3cda2"}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @loopback}}, [0x6, 0xff, 0x0, 0x5, 0x7fffffff, 0x7, 0x1000, 0x1, 0xffffffffffffffe2, 0x6, 0x7f, 0x3, 0x8, 0x75e, 0x80]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x500, 0x8000, 0x8001, 0x4, r3}, 0x10) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x101) 21:03:43 executing program 1 (fault-call:1 fault-nth:5): r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:43 executing program 3: r0 = socket(0x10, 0x802, 0x101) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x501706, 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x1, 0x2) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000400)) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000240)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x9, 0x4) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000002c0)=0x1) r2 = getpgid(0x0) move_pages(r2, 0x7, &(0x7f0000000040)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil], &(0x7f0000000080)=[0x80], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) socket(0xffffffffffffffff, 0x40000006, 0x2f) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 21:03:43 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002001c036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(r0, 0x89e4, &(0x7f0000000700)="f75f19100ad36ffb3b7f3a") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000680)=0xe8) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) r2 = dup(r0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000740)=0xffffffff, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000080)={{0x4, 0x7, 0x9, 0x5, '\x00', 0xa9}, 0x0, [0x3, 0x0, 0x2, 0x7fff, 0x0, 0x200, 0x72, 0x616, 0x9, 0x1ff, 0x3, 0x2, 0x7, 0x5, 0x234d8, 0x9309, 0x1, 0x5, 0x6, 0x0, 0x100000000, 0x3, 0x80, 0x5, 0x3, 0xfff, 0x7, 0x8, 0x52, 0x0, 0x3, 0x7, 0x4, 0x8, 0x0, 0x7, 0xfffffffffffffffa, 0x80000001, 0x401, 0x81, 0x8, 0x6, 0x9, 0x400, 0x80, 0x9, 0x5, 0x7, 0x2, 0x20, 0x4, 0x7, 0x7ff, 0x6, 0x5, 0x20000000000000, 0x3, 0xfff, 0xdf, 0xa1a, 0x8, 0x8000, 0x9, 0xb9f, 0xb0b, 0x7, 0xfffffffffffffffa, 0x0, 0x6, 0x6, 0x5, 0x1, 0x1ff, 0x8, 0x0, 0x7, 0xd4, 0x8000, 0x9, 0x2, 0x1, 0x3341, 0x62c, 0xcc54, 0x2, 0x4, 0x20, 0x771, 0xca52, 0x5, 0x6, 0x7, 0x5, 0x2ed9, 0x2, 0x2, 0x100, 0x7fffffff, 0x0, 0x3, 0x4, 0x9, 0x0, 0xe68e, 0x0, 0x3f, 0x0, 0x800, 0x200, 0x9, 0x100000000, 0x1ff, 0x4, 0x8, 0x6, 0x0, 0x4, 0x7, 0x100000001, 0x21db, 0x3ff, 0x6, 0x100000000, 0x11c4, 0x400, 0x6, 0x5a9, 0x1800000000000000]}) [ 3378.661241][T13741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=13741 comm=syz-executor.0 21:03:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x20, 0x4) 21:03:43 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002441f036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:43 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:43 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89ed, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) fcntl$setownex(r1, 0xf, &(0x7f00000000c0)={0x0, r2}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000040)=0x101003) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2002, &(0x7f0000000000/0x2000)=nil}) [ 3378.890159][ T26] audit: type=1107 audit(1564779823.655:268): pid=13972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:43 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:43 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020020036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:43 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:43 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB='norgrplvb,noacl,nosuiddir,statfs_quantum=0x0000000080000001']) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)=r1) [ 3379.141132][ T26] audit: type=1107 audit(1564779823.905:269): pid=14223 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:43 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:43 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfff, 0x20001) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0)=0x9, 0x4) 21:03:44 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002003f036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:44 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) sendmsg$tipc(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000000)="607324f3978bb30e12ae0e0ca22f1cc1215b86ebc4317db9edd2", 0x1a}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000040)="575f9bab817f3c5b11a478ae1ac27ce85ad90a21bece9dbe4da485ca6e54bb8e96934469f05796e0d778f933cb932148d00e8be0699a9aec1acede7fb0c79eb6156dcc9c71", 0x45}, {&(0x7f00000000c0)="5cdcdf08d05b8ecc88b9584ea5a86a1388db0b65975f33b831075fd4b578700879c3749905a83230edc9bb682f319013989684b0a12b8aefedff34eea60899c0a1252662dc81", 0x46}, {&(0x7f0000001240)="2db9a66994cea8a96794e88af0cf30a913905bc112a33da75a66f923720a193db0c58df1615f57dc42c79fb3c936ef168de77413478c5cf4eb904393a3ef9dbb0fc94a756174a889b0ae79c76e205f13e8a21d9e003962aae80aedb5f3c42c148f2302816a022e8a61e05b08", 0x6c}, {&(0x7f00000012c0)="3bb7cf3612b65c1fc3373bcdd3f4142eedc9008e8c41ef02005ccdbf40efec8c087c6f35848abfb7adc4ab4cc37b2e3ab72f39719c4125e2998a8ff4802b076c90e07a6496a15bf3b0298281155c1e0c538f1ed7a6410cffaf2514ed7ddf707d25a54b761d08b70465d2adc82d5fb28fc796c3cc15eefaa773cbd12d902bc3f9017da8fd60310efb23ffadbed39a63ac2f0badf40548b9448103a1ac2b08e2cf6be1025f54", 0xa5}], 0x6, &(0x7f0000001400)="a89ce913c2164a", 0x7, 0x10}, 0x20000014) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x800, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000014c0)=r1, 0x4) [ 3379.257094][ T26] audit: type=1107 audit(1564779824.025:270): pid=14297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:44 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:44 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f000016e000/0x1000)=nil) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x3, 0xfffffffffffffffd, 0x4, 0x7, 0x9, 0x0, 0x6, 0x74, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r1, 0x10001}, &(0x7f0000000200)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x20, &(0x7f00000004c0)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) [ 3379.416856][T14408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35735 sclass=netlink_route_socket pig=14408 comm=syz-executor.3 [ 3379.435906][T14322] device bond_slave_1 entered promiscuous mode 21:03:44 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020040036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3379.459867][ T26] audit: type=1107 audit(1564779824.215:271): pid=14410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3379.470514][T14322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:03:44 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3379.515644][T14417] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35735 sclass=netlink_route_socket pig=14417 comm=syz-executor.3 21:03:44 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:44 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00021f44036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:44 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:44 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\xe9\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x9a4\xdf\x00'}, &(0x7f0000000000)=0xfffffffffffffe28) 21:03:44 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020060036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:44 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:44 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) listen(r0, 0x4) poll(&(0x7f0000000140)=[{r0, 0xf07fbbe3d4a26683}, {r0, 0x80}, {r0, 0x80}], 0x3, 0x5) connect$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x2, @empty}}, 0x1e) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f0000000100)=0x78) [ 3379.901690][T14762] bond0: (slave bond_slave_1): Releasing backup interface [ 3379.974836][T14762] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 9a:38:28:5c:1a:94 - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 21:03:44 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc000200e1036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:44 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x56, "60e56055455a90640e74d5033ee57d894ff9dffd7b08848916187e540b651da3418fdc0545b5be53bafbe4c96a2463bffd6be43e568e7a4c93bf48e151e7de082c74ec8e9f5a5e09a842eea54629ebc77566a2717bfe"}, &(0x7f0000000180)=0x5e) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r3, 0x9}, &(0x7f0000000200)=0x8) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xfd0f11ed7e714ed6) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3380.030816][T14762] device bond_slave_1 left promiscuous mode 21:03:44 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0xfffffffffffffffc, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="cdfce9bbff35ceb921028ae05fe6bd4a60b35596160f4b86f51ce9d5151a334bc41764feb193d2f26cc94fbfc59056b99c6dca430efa6258ad02e4d05f4f06cd013e5d7558dcc5617627954e6038f6486adc7e56331618b55c6f253bea4690688817c8"], 0x1a000) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)) [ 3380.231863][T15104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15104 comm=syz-executor.3 [ 3380.270011][T15104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15104 comm=syz-executor.3 21:03:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/exec\x00') ioctl$TIOCCBRK(r1, 0x5428) bind$ax25(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@default, @default, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}, 0x3e5) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x7ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r2, 0x4, 0xfff, 0xac, 0x0, 0x2}, &(0x7f0000000240)=0x14) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xffffffffffffffe0, 0x18800) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f00000002c0)) 21:03:45 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:45 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:45 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc000200f0036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x3, 0x81}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3380.430300][T15243] QAT: Invalid ioctl 21:03:45 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:45 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020002036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:45 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) signalfd(r0, &(0x7f00000000c0)={0x1ff}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_FREEZE(0x4, &(0x7f0000000240)=r1, 0x4) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40000, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) 21:03:45 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:45 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mISDNtimer\x00', 0x60800, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) kcmp(r0, r1, 0x3, r2, r3) r4 = socket(0x1900000000f, 0x80002, 0x6) readv(r3, &(0x7f0000003bc0)=[{&(0x7f0000000740)=""/130, 0x82}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/206, 0xce}, {&(0x7f0000001900)=""/131, 0x83}, {&(0x7f00000019c0)=""/165, 0xa5}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/78, 0x4e}, {&(0x7f0000002b00)=""/125, 0x7d}, {&(0x7f0000002b80)=""/53, 0x35}, {&(0x7f0000002bc0)=""/4096, 0x1000}], 0xa) write(r4, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000003c80)) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) ioctl$KVM_GET_XSAVE(r5, 0x9000aea4, &(0x7f0000000340)) ioctl$SIOCRSGL2CALL(r5, 0x89e5, &(0x7f0000000080)=@null) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000300)={0x7, r5, 0x1}) write$P9_RVERSION(r5, &(0x7f0000003d00)=ANY=[@ANYBLOB="1400000065ffff0800000007003950323030302e4c94f2740f581cd0010c24139bc71050432061aafa736de8ed175009a4dd00db04a0a08edd6b80f2ad09002a41ad5513b76b4b79efe72326bffa7b43c1d8a98a144d942023805d64bb5e93a8f4be73777c584101ddf00a6aee691c4e0f72c93b875f7cb1ea85486669f4bd3e9cee51624116839ee2df48240e94fbd14e29e7c92b11faae4c4416afd5e17e6e9f99cb1b4fa15e26d9ba5d194045aaa473e814006278ec4c653fd6a7c79b7e"], 0x17) fcntl$lock(r3, 0x25, &(0x7f0000003cc0)={0x2, 0x3, 0x8000, 0x4, r0}) 21:03:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x4, [0x5, 0xfff, 0x1ba7, 0x5]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x35, 0x44d7, 0x9}, &(0x7f0000000140)=0x10) 21:03:45 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:45 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020003036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:45 executing program 0: clone(0xfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x145, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r2 = dup2(r0, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001740)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000001800)={{0xa, 0x7, 0xffffffff, 0x0, '\x00', 0x4}, 0x3, 0x0, 0x3, r3, 0xa, 0x9, 'syz0\x00', &(0x7f0000001780)=['{\x00', '~{@\x00', '@\x00', '\'\x00', '\x00', '\x00', '{.[trustedsecurity{ppp1system&K%%+eth1security,vboxnet1\x00', '\\-)\x00', 'vboxnet0\x00', 'vmnet1\x00'], 0x58, [], [0x0, 0x4, 0x6, 0x100000000]}) r4 = getpgid(0x0) process_vm_writev(r4, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/202, 0xca}, {&(0x7f00000011c0)=""/163, 0xa3}, {&(0x7f0000000100)=""/21, 0x15}, {&(0x7f0000001280)=""/76, 0x4c}, {&(0x7f0000001300)=""/240, 0xf0}], 0x6, &(0x7f00000016c0)=[{&(0x7f0000001480)=""/21, 0x15}, {&(0x7f00000014c0)=""/116, 0x74}, {&(0x7f0000001540)=""/63, 0x3f}, {&(0x7f0000001580)=""/159, 0x9f}, {&(0x7f0000001640)=""/118, 0x76}], 0x5, 0x0) 21:03:45 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:45 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020004036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:45 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @remote, 'syzkaller1\x00'}}, 0x1e) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:45 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89fc, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000080)={0xf726, 0x1, 0x8000}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x7) 21:03:45 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:45 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020005036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:45 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="ffe000000000ffffffffffff810000008100450088a8ffff002100e841db2f2342a40000009078ac14ffbbe0000001000063f5f3a9dffa"], 0x0) 21:03:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89fd, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x10000, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r1, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffffffffffd}]}, 0x40}, 0x1, 0x0, 0x0, 0x200080d5}, 0x800) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)={0x0, 0x401}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x44900, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f00000002c0)={0x7b, 0x0, [], [0xc1]}) 21:03:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_crypto(0x10, 0x3, 0x15) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x321040, 0x1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000080)={{0x1, 0x10001}, {0x8, 0x7}, 0x8, 0x6, 0x557e9aad}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:46 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:46 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020006036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x431) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x7b) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x0) [ 3381.390855][T16150] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 21:03:46 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020007036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:46 executing program 3: r0 = socket(0x8, 0x802, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x40000) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000040)={[{0x2, 0x1, 0xa78, 0x9, 0x5, 0x4, 0x3, 0xffffffff, 0x80000001, 0xfffffffffffffffe, 0xddaa, 0xed5, 0x7fffffff}, {0x7, 0x5, 0x294d, 0x7d, 0x5, 0x400, 0x6, 0x2, 0x1, 0xdc, 0x11d4, 0x5, 0x5}, {0x1, 0xffff, 0x9, 0x6, 0x100000000, 0xbb3, 0x8000, 0x7, 0x400, 0x1, 0xffff, 0xfffffffffffffffc, 0x3667}], 0x1}) personality(0x5000004) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x9201, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:46 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x1) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0x3d, 0x3}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000100), &(0x7f00000002c0)=0x60) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x24000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0x1, 0x4000003c, &(0x7f0000000080)=0x1, 0x688) sendto(r1, &(0x7f0000000280)="b1", 0x1, 0x4040840, 0x0, 0x0) sendmmsg(r1, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, 0x0}}, {{0x0, 0x33f, &(0x7f0000001980), 0x6e}, 0x7fffffff}], 0x2, 0x4000014) 21:03:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="799eb83101504d81f05b092819bc38b2d48e6e6d4b5491274d2819a1f406e48b366f6c82ac402621f80d14d271f374c9ba4448254494361d71db12aa2395e6e4ee0c3681779b41742d19fb776fc734e8c9b06d5f57c3fcf5b499", 0x5a) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:46 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020008036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e23, @local}}) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:46 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xae01, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3381.876128][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 3381.876140][ T26] audit: type=1107 audit(1564779826.635:283): pid=16561 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:46 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x17f, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:46 executing program 3: r0 = socket(0x19, 0x802, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x82b1356dc2b8f02, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r2, 0x7ff, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x118) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020009036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:46 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x2, 0x4) 21:03:46 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xaead, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xffffffffffffff32) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:46 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:46 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002000a036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:47 executing program 0: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f00000000c0)={0x2000000000002, 0x0, 0x0, 0x0, 0x1000020000000, 0x7ff0bdbe}) 21:03:47 executing program 3: r0 = semget(0x2, 0x2, 0xa) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000280)=""/254) r1 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xb1, "af2505c1753865efb67b36251fc6983f2b6339b5d98ce3d18051de5faa3bc4150068ff56055c50d020eb7b3effecbd4db55a8bea7b6addce9cbd2e3b645e33fd46aa9daaa130ba96625b24a31c2805a8be06a02b16445f576255773fe6504c374f9d061d7a1486f7b8d23e19c64ef449eca9ae12c53a1abf03fc38cddbeb7a6c9db0d2148283c13963cf66bc75c20bd9ad54d16521f62ccc4bd4b339e68cee334e9dcc0ff8670ab1fcf1afb63c92046308"}, &(0x7f00000000c0)=0xb9) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x81, 0x7, 0xfffffffffffffffd, 0x8, 0x100000001}, 0x14) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x400, 0x0) 21:03:47 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002000b036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:47 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xaf01, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3382.384169][ T26] audit: type=1107 audit(1564779827.145:284): pid=16994 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:47 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x480, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000400)=ANY=[@ANYBLOB="d5019eb397e8d87d2d276fd1b45370b6f96897eeb3d0a298288cd363292b7e28ae21891eb539af8403d6d542e02a863511c87bd4b81d7c3fb2d22d49bf7565a3b694ee88c62d6d88564a8ad9b513b0976873db1936626e016e34edbafad98eedda50eaa6019ce7ea203df14b1b9f11814ac124d74a26b656012dfcbf75aca6ae004aee644183eedf9887d28ad18cd49adffcbe4ae8404b2c63f39805a76496be708b86f4b0536632a5840c1ba4685baa80e18990107da52c", @ANYRESOCT=r0, @ANYRES32=0x0, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000380)=ANY=[]], @ANYRES64=r0, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES16=r0, @ANYRES16=r0, @ANYRESDEC=r0, @ANYRESHEX=r0], @ANYRESOCT=r0]]) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000000)=0x54) 21:03:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) write$capi20(r1, &(0x7f0000000040)={0x10, 0xcc, 0x0, 0x83, 0x55a4}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}}}, 0x90) 21:03:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000c07e98)=ANY=[@ANYBLOB="380100001000130700000000000000000000000000000000000000000000000000000000000000000000ffffac14ffaa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff7f00000000000000000000000000000000000033ff0000000000000000000000000000000000f9ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480001006d643500"/234], 0x138}}, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x4) 21:03:47 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002000f036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3382.580116][ T26] audit: type=1107 audit(1564779827.345:285): pid=17256 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:47 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:47 executing program 3: r0 = socket(0x10, 0x802, 0x6) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 21:03:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x20000001010007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3382.755733][T17471] __nla_validate_parse: 9 callbacks suppressed [ 3382.755756][T17471] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 21:03:47 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x400454ca, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:47 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020010036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3382.843721][ T26] audit: type=1107 audit(1564779827.605:286): pid=17477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3382.858571][T17481] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=72 sclass=netlink_xfrm_socket pig=17481 comm=syz-executor.3 21:03:47 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3382.943768][T17481] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=72 sclass=netlink_xfrm_socket pig=17481 comm=syz-executor.3 21:03:47 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x400454d4, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000580)=0x10) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000140)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf0000000051ae0f151b2d02f509"], 0x2e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000440)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) fstat(r3, &(0x7f0000000240)) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000380)) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 3383.026841][ T26] audit: type=1107 audit(1564779827.795:287): pid=17736 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:47 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x4000) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000180)=0x4) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000140)) write(0xffffffffffffffff, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x280482) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r3, 0x10, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x8, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x5}, 0x4080) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r2, 0x101, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x823}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:47 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:47 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020011036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3383.255435][ T26] audit: type=1107 audit(1564779828.015:288): pid=17854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:48 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:48 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x40045644, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xfffffffffffffffd, 0x10031, r0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/246, &(0x7f0000000180)=0xf6) 21:03:48 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5248, 0x20100) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffffffffffffff7f, 0x4) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000100)=0x101) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 21:03:48 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020012036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3383.439572][ T26] audit: type=1107 audit(1564779828.205:289): pid=18125 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:48 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x7, 0x7}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3383.787104][ T26] audit: type=1107 audit(1564779828.555:290): pid=18327 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x6c, @empty, 0x4e23, 0x1, 'lc\x00', 0x14, 0x6, 0x13}, 0x2c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x101000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000100)=[0xd632, 0x3f, 0x0, 0x20, 0x9, 0x7ff, 0x7, 0x1], 0x8, 0x7, 0x3, 0x0, 0x4, 0x9d, {0x3, 0x2, 0x67, 0xffff, 0x7, 0xc000000000000, 0x100000001, 0xda, 0xde4, 0x3, 0x9, 0x5, 0x6, 0x7, "c88137f6871f968569a346d6c88ec3d82f4eca07ce314b6575bb9e231e0c642d"}}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 21:03:48 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020013036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:48 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x40046207, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:48 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2960, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:48 executing program 3: r0 = socket(0x10, 0x80002, 0xfffffffffffffffd) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:48 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020014036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3383.959754][ T26] audit: type=1107 audit(1564779828.725:291): pid=18406 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:48 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:48 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x40046208, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xffffffffffffffe3) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r1, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) 21:03:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xfffffffffffffd1d) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) [ 3384.109202][ T26] audit: type=1107 audit(1564779828.875:292): pid=18565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:48 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc0002001c036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:49 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3384.201704][T18570] IPVS: set_ctl: invalid protocol: 108 0.0.0.0:20003 21:03:49 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={@multicast2, @local}, 0xc) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$inet6_int(r0, 0x28, 0x1, 0x0, &(0x7f0000000100)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2080, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) setxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:agp_device_t:s0\x00', 0x22, 0x1) r2 = getpid() r3 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000080)={r1, r0, 0x28c}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x82, @dev={[], 0x29}}) read(r1, &(0x7f0000000140)=""/163, 0xa3) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f00000000c0)) 21:03:49 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@bridge_getlink={0x28, 0x12, 0x20, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, r1, 0x20000, 0x4000}, [@IFLA_LINKMODE={0x8, 0x11, 0x7fff}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040004}, 0x20008855) r2 = socket(0x10, 0x802, 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000080)="d7cf21814ac1766d2f06a7cd49d89fafe82adbaf486e1fd35dd2d6629833ac10fdffffff01f70f3eae47b9cbebea918fc71f1b501bb527c79555cc65e10f5b726eaed76eb9c24bcbfa552a7e27a1f417b235bbdb", 0xfee7) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/400], 0x190) write(r2, &(0x7f0000000240)="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", 0x239) 21:03:49 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x40049409, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:49 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:49 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020060036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10) clone(0x80000001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:49 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc000200e1036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:49 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000240)=""/212, &(0x7f0000000100)=0xd4) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) setns(r0, 0xfffffffffffffff9) 21:03:49 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000386c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:49 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4004af61, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="ffff06007f0080000300adceb874f965939f40ea3f9257d90f5705000600"], &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x24}, 0xfffffffffffff24d}}, 0xc4ac, 0x6}, 0x90) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4) 21:03:49 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6029, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) 21:03:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x6, {{0x2, 0x4e23, @local}}}, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2800, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x3}, &(0x7f0000000140)=0x8) 21:03:49 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000406c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:49 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x40086602, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:49 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:49 executing program 3: r0 = socket(0x13, 0x805, 0xfffffffc) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000026c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:50 executing program 0: 21:03:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) 21:03:50 executing program 3: r0 = socket(0x1b, 0x802, 0x93b) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x40087602, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:50 executing program 0: 21:03:50 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:50 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000046c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x7ff, 0x0) r1 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, 0x6, {0x1, 0x6, 0x0, {0x2, 0x8, 0x100000000, 0x5, 0x8001, 0x8, 0x3f, 0x7ff, 0x5, 0xbec000000000, 0x1, r1, r2, 0x9, 0x9}}}, 0x78) r3 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0xbd) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x101) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) 21:03:50 executing program 0: 21:03:50 executing program 3: msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000386c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4008af03, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:50 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:50 executing program 0: 21:03:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x60102, 0x0) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000180)={0x1f, 0x0, [0x1fa4, 0x6, 0x1ff, 0x4b1f, 0x8], 0xffff}) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) clone(0x30007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000240)={0x0, 0x2d4c98c2, 0x5, 0x9, &(0x7f0000ffe000/0x2000)=nil, 0x8}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0xfff, 0xfff, 0x6, 0x102, r1, 0x9, [], r2, r1, 0x4}, 0x3c) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'raw\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000040)=0x54) recvmmsg(r1, &(0x7f0000000240), 0x0, 0x42, &(0x7f0000000280)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f00000002c0)) 21:03:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f00000000c0)=""/12) write(r0, &(0x7f0000000240)="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", 0x450) 21:03:50 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c486f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7f01, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:50 executing program 0: 21:03:50 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4008af04, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0x363) 21:03:50 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f38272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:50 executing program 0: 21:03:51 executing program 5: 21:03:51 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x8004, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:51 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4008af21, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:51 executing program 0: 21:03:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf194201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:51 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f48272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:51 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:51 executing program 5: 21:03:51 executing program 0: 21:03:51 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x401870c8, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:51 executing program 5: 21:03:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x55, "297c3531f1a3f6c2acae390d616836d30ecd402f4c8dced1ab28b1bd441be981ba9223eed7d6321e585e84d3fad0f89d8124e3c7ca99792a7d5df0842e3d3ed06785dfbf92399fb41f5ed07dca472e671e44781e3b"}, &(0x7f00000000c0)=0x5d) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000240)={r1, 0x200}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x7}, 0x8) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1, 0x4) 21:03:51 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xff03, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:51 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f48117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:51 executing program 0: 21:03:51 executing program 5: 21:03:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:03:51 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e387c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:51 executing program 0: 21:03:51 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x401c5820, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:51 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:51 executing program 5: 21:03:51 executing program 0: 21:03:51 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e487c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:51 executing program 3: r0 = socket(0x4, 0x800, 0xfa) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3387.048405][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 3387.048416][ T26] audit: type=1107 audit(1564779831.815:306): pid=20572 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:51 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:51 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4020940d, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:51 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c48ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:51 executing program 5: 21:03:52 executing program 3: r0 = socket(0x10, 0x800, 0x40000000000000) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0xfffffffffffff78d, 0x4) splice(r0, &(0x7f0000000000)=0x45, r0, &(0x7f0000000040), 0x6, 0x4) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:52 executing program 0: 21:03:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x5, 0x4, 0x400, 0x0, 0x1}, 0x3c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x4}, 0x4) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000100)={0xe, 0xa, 0x0, 0xbdd, 0xd3, "c62ccb7f3b904c0aeadefd449e0fb5073554679a2e7b16b1b1b44e3276d435f8bd7b897c285dbb3eb1aa8e3e787f6ad58f8072c57cdf0a0b0e5cbbdb58fb55286dfe8bd7ed9d83d89806d84e868af49e2268ce1d576f014ce51202190c70ef01b5912315f4919fa843ff30a88448ac3438f250e13bc877dd70939a07b142818319c4733c32e3f2c51775fb6516031a895158c8d5aa3755387ff669dcd33bc24dac450cf9ab159adcb50df0035e7a554b65d5be4d13bf786416b09591f60ded90c1a88e0cd1617a6d90b8d6219c39b3291b333f"}, 0xdf) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r3, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 21:03:52 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc208214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3387.342596][ T26] audit: type=1107 audit(1564779832.105:307): pid=20694 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:52 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:52 executing program 0: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000f78000/0x2000)=nil, 0x4000) mremap(&(0x7f0000f70000/0xd000)=nil, 0xd000, 0x1000, 0x3, &(0x7f0000ff1000/0x1000)=nil) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x100) mmap$perf(&(0x7f0000f71000/0x2000)=nil, 0x2000, 0x1, 0x4010, r2, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) shmdt(r1) 21:03:52 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4028af11, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:52 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) ftruncate(r1, 0x8) [ 3387.521916][ T26] audit: type=1107 audit(1564779832.285:308): pid=20812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:52 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc238214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:52 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:52 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4040ae70, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:52 executing program 3: r0 = socket(0x19, 0x0, 0x0) write(r0, &(0x7f0000000380)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad03fb20d7d5bbc91a3e2e4bdbfc7ddedf80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c8300085b0f144c7de4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd10200e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/258, 0x102) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) 21:03:52 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:52 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205034000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3387.778084][ T26] audit: type=1107 audit(1564779832.545:309): pid=20832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3388.018934][ T26] audit: type=1107 audit(1564779832.785:310): pid=21039 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3388.146372][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3388.146637][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3388.152186][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3388.158018][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3388.163791][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3388.175181][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:03:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x21) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_init_net_socket$netrom(0x6, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:03:53 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYRESDEC, @ANYBLOB]) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x5b, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f00000002c0)={0x2000, 0x2000, 0x10000, 0x7, 0x5}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000180)={0x2, 0x1, [0x1, 0x80000001, 0x800, 0x8000, 0x3ff, 0x1, 0x140, 0x9]}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000280)={0x7, 0x0, 0x4}) 21:03:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x117, {{0xa, 0x4e21, 0x2, @remote, 0x7}}}, 0x88) 21:03:53 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4040ae77, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:53 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205384000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:53 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:53 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205484000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3388.368072][ T26] audit: type=1107 audit(1564779833.135:311): pid=21156 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:53 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x280000) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x1, 0x800, 0x4, 0x6, 0x3f, 0x7}) [ 3388.477827][ T26] audit: type=1107 audit(1564779833.245:312): pid=21191 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:53 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:53 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x800454d2, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:53 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205e04000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae09, &(0x7f0000000000)={0x2, [0x0, 0x0]}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200000, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f00000000c0)={0x80fd, 0x2}) 21:03:53 executing program 3: r0 = socket(0x10, 0x802, 0xa) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x4, 0xa}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0xb18}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={r1, 0x90, &(0x7f0000000080)=[@in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0x7, @mcast2, 0xffffffffffffffbc}, @in6={0xa, 0x4e24, 0x1, @remote, 0xa30}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x16}, 0x8}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @local, 0x7}]}, &(0x7f0000000280)=0x10) [ 3388.687951][ T26] audit: type=1107 audit(1564779833.445:313): pid=21477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:53 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000003280)=[{{&(0x7f00000001c0)=@isdn, 0x80, &(0x7f0000001480)=[{&(0x7f0000000080)=""/7, 0x7}, {&(0x7f0000000240)=""/23, 0x17}, {&(0x7f0000000280)=""/101, 0x65}, {&(0x7f0000000300)=""/151, 0x97}, {&(0x7f00000003c0)=""/120, 0x78}, {&(0x7f0000000440)=""/19, 0x13}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x7, &(0x7f0000001500)=""/129, 0x81}}, {{&(0x7f0000001640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000029c0)=[{&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/194, 0xc2}, {&(0x7f00000015c0)=""/61, 0x3d}, {&(0x7f00000027c0)=""/34, 0x22}, {&(0x7f0000002800)=""/248, 0xf8}, {&(0x7f0000002900)=""/129, 0x81}], 0x6, &(0x7f0000002a40)=""/96, 0x60}}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002ac0)}, {&(0x7f0000002b00)=""/220, 0xdc}, {&(0x7f0000003380)=""/158, 0x9e}, {&(0x7f0000002cc0)=""/236, 0xec}, {&(0x7f0000002dc0)=""/190, 0xbe}, {&(0x7f0000002e80)=""/84, 0xffffffffffffff95}, {&(0x7f0000002f00)=""/34, 0x22}], 0x7, &(0x7f0000002fc0)=""/98, 0x62}}, {{&(0x7f0000003040)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000003240), 0x2}}], 0x4, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000030c0)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003440)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000001600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000048c0)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f00000049c0)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f000000bb80)={@local, @broadcast, 0x0}, &(0x7f000000bbc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f000000bc40)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f000000bd40)=0xe8) accept(r0, &(0x7f000000bd80)=@ll={0x11, 0x0, 0x0}, &(0x7f000000be00)=0x80) accept$packet(r1, &(0x7f000000be40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000be80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f000000bec0)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f000000bfc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000c000)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f000000c100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000010140)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000010340)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000010440)=0xe8) recvmmsg(r1, &(0x7f0000017300)=[{{&(0x7f0000010840)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000010b80)=[{&(0x7f00000108c0)=""/209, 0xd1}, {&(0x7f00000109c0)=""/37, 0x25}, {&(0x7f0000010a00)=""/224, 0xe0}, {&(0x7f0000010b00)=""/50, 0x32}, {&(0x7f0000010b40)=""/6, 0x6}], 0x5, &(0x7f0000010c00)=""/129, 0x81}}, {{&(0x7f0000010cc0)=@can, 0x80, &(0x7f0000010e40)=[{&(0x7f0000010d40)=""/152, 0x98}, {&(0x7f0000010e00)=""/24, 0x18}], 0x2, &(0x7f0000010e80)=""/4096, 0x1000}, 0x8}, {{0x0, 0x0, &(0x7f0000012f00)=[{&(0x7f0000011e80)=""/117, 0x75}, {&(0x7f0000011f00)=""/4096, 0x1000}], 0x2, &(0x7f0000012f40)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000014400)=[{&(0x7f0000013f40)=""/164, 0xa4}, {&(0x7f0000014000)=""/236, 0xec}, {&(0x7f0000014100)=""/186, 0xba}, {&(0x7f00000141c0)=""/236, 0xec}, {&(0x7f00000142c0)=""/41, 0x29}, {&(0x7f0000014300)=""/219, 0xdb}], 0x6, &(0x7f0000014480)=""/117, 0x75}, 0x1000}, {{0x0, 0x0, &(0x7f0000016980)=[{&(0x7f0000014500)=""/148, 0x94}, {&(0x7f00000145c0)=""/166, 0xa6}, {&(0x7f0000014680)=""/160, 0xa0}, {&(0x7f0000014740)=""/4096, 0x1000}, {&(0x7f0000015740)=""/240, 0xf0}, {&(0x7f0000015840)=""/189, 0xbd}, {&(0x7f0000015900)=""/4096, 0x1000}, {&(0x7f0000016900)=""/108, 0x6c}], 0x8, &(0x7f0000016a00)=""/143, 0x8f}, 0xfffffffffffff58c}, {{0x0, 0x0, &(0x7f0000016c80)=[{&(0x7f0000016ac0)=""/113, 0x71}, {&(0x7f0000016b40)=""/36, 0x24}, {&(0x7f0000016b80)=""/19, 0x13}, {&(0x7f0000016bc0)=""/180, 0xb4}], 0x4, &(0x7f0000016cc0)=""/234, 0xea}, 0x5}, {{&(0x7f0000016dc0)=@isdn, 0x80, &(0x7f0000016f40)=[{&(0x7f0000016e40)=""/224, 0xe0}], 0x1, &(0x7f0000016f80)=""/78, 0x4e}, 0x3}, {{0x0, 0x0, &(0x7f00000171c0)=[{&(0x7f0000017000)=""/178, 0xb2}, {&(0x7f00000170c0)=""/164, 0xa4}, {&(0x7f0000017180)=""/14, 0xe}], 0x3, &(0x7f0000017200)=""/215, 0xd7}, 0xfe00000000000000}], 0x8, 0x100, &(0x7f0000017500)={0x0, 0x989680}) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000017540)={@empty, 0x0}, &(0x7f0000017580)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000175c0)={@dev, 0x0}, &(0x7f0000017600)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000017640)={0x0, @loopback, @loopback}, &(0x7f0000017680)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000017c40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000017c00)={&(0x7f0000003540)=ANY=[@ANYBLOB="18050000", @ANYRES16=r2, @ANYBLOB="000027bd7000fddbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="f00102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004001a0b000008000600", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="080007000000000008000100", @ANYRES32=r7, @ANYBLOB="84000200400001159873685f746f5f706f72745f6d617074696e6700003c91e7ebce6b5aac0300000008000400"/56, @ANYRES32=r8, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff7f000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000300000008000100", @ANYRES32=r11, @ANYBLOB="280102003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400110000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="080007110000000008000100ee156f3e3bb560b0c028372716428559afe66596bdcc60cadaabd0b490a9e0c67e532ba905ed7e923e5a5606f576", @ANYRES32=r14, @ANYBLOB="7c00020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400a500000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400bf00000008000600", @ANYRES32=r15, @ANYBLOB="08000100", @ANYRES32=r16, @ANYBLOB="800002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x518}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 21:03:53 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210200000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3388.841683][ T26] audit: type=1400 audit(1564779833.605:314): avc: denied { ioctl } for pid=21526 comm="syz-executor.3" path="socket:[503975]" dev="sockfs" ino=503975 ioctlcmd=0x5879 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 21:03:53 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:53 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x80047437, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3388.980243][ T26] audit: type=1400 audit(1564779833.605:315): avc: denied { getopt } for pid=21526 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 21:03:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x800, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0x4, 0x3, 0x1f, 0x9, 0x7, 0x266e, 0x4, 0xb20]}) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000080)={0x0, 0xffffffffffffff0a, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/52, 0xc6}], 0x1, 0x0, 0xffffffffffffffbf}, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) 21:03:53 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x80004, 0x3) getsockopt$bt_BT_DEFER_SETUP(r0, 0x12, 0x7, 0x0, &(0x7f0000000100)) 21:03:53 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000400)='team_slave_1\x00'}) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:53 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:53 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210300000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:54 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:54 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x80086301, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10000802}) io_setup(0x804, &(0x7f0000000280)=0x0) io_submit(r2, 0x2d2, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r1, 0x0, 0x1c}]) io_destroy(r2) dup3(r0, r1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_names='syz_tun\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 21:03:54 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210400000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000000)='%\x00'}, 0x30) wait4(r1, &(0x7f00000002c0), 0x1000000, &(0x7f0000000300)) r2 = syz_open_dev$audion(&(0x7f0000011000)='/dev/audio#\x00', 0xfffffffffffffff8, 0x80000) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000140)={0x0, r3}) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000011040)={0xfff, 0x2, 0x8001, 0x8}, 0x10) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRES32=r4, @ANYBLOB="03000000ffff20fb2f6144843f67dfa003c77fc6a5d36b3d17e3ea576efecf97afcd0614c6f53dcc513a08d9d6edf252d8a1b944154a670d489c00824cbab2749daac14827bf4197c0b40f443843c190b49ad410638fd838a6f972c3c036230ff7d65e2fe59119b22442badbce5eb2ad18fd01909fd533b7"]) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setregs(0xd, r5, 0x1, &(0x7f0000000080)="6420395e417a005d220586d1310ec637800e58cd8ffc0cf6e3446f21e6722a1410888ae8ef49192dd4fc9b7aea151813b35fb91e23d94c1ea6b6d8376093c0185d090ae999314edf24a91d") 21:03:54 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x4f, 0x4, 0x5, "a4bbf597a43657c01014fe15da2dbaa3", "b2e85f68c6cc6efb5e39450b83dc047de5ed17b6945f1d96be4c1063e061631ba162596a24d74bd545060c8b5c53ed364f5a463cc3f59f655e2b"}, 0x4f, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000300)=ANY=[@ANYBLOB="0300000000000000080000800800000006000000ff000001ff0f002006000000e5000000000000000000000000008006000000060000007d36f452010000000100000005000000000000000000001000000000070000c0ffffffff05fffbffff9bf2001000100000000000000000000000000000000000000000000000000000926acfcb7ef8f28692fc2b17ceec453c21c22bd4db42"]) prctl$PR_SET_FPEXC(0xc, 0x100000) 21:03:54 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210500000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xcc) 21:03:54 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x80086601, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:54 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:54 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r3 = getpid() r4 = getpgrp(r3) setpriority(0x0, r4, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000005c0)={0x2f, 0x0}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x1, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='proc\x00', &(0x7f0000000740)='!\x00']) 21:03:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xb) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0xfffffffffffffffa) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000fc00000000000000000200000000000000000000000000000040000000000000000200000000000000000000000700380000000000000000000100000000000000000000000000000000000000000000000500"/120], 0x78) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x79, 0x29, 0x0, 0x5b29, 0x3, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={r2, 0x7, "d221541aca46c6"}, &(0x7f0000000200)=0xf) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{0x307}, "9257b0f60f0c84f7", "c426fdbfc90e17ca307db156b310f32a", "c794966e", "f1943869bcef5ec9"}, 0x28) 21:03:54 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210600000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:54 executing program 3: r0 = socket(0x1000010, 0xa, 0x3ff) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:54 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:54 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x80087601, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:54 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz2\x00'}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40000000000}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020dfff9100000000000000000000000080012000000010000000000000000e405000000000000080000000014a6c020ecb957980000000000000000000000000001000020000000000020000000000003000600080008000200106cf8bfb391f00000000000000003000500000000000200423b5d632b91c520000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x2e565d7c36d98a1, 0x0) 21:03:54 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210700000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000500)=""/175, 0x5d) exit(0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast1, @multicast2}, 0x8) getdents64(r0, &(0x7f0000000240)=""/143, 0x8f) socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:55 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8008af00, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:55 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:55 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210800000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:55 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff010000000000000000000000000001000000000000000000cb0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000048343e0000000000000000000000000000000000000000000000000000000100000000000000affcb940dbeb4239354f93018fbf2d115d9f1f0c663bea9c58ae61cfa5dcf29f6a3bfdc310b9a22677d2af7922d410974652ae664b1907f956ef6ded8a594d131d8d1e818f17a7b06f30ac9a8da7bfd3ab8fc5f39fd0d753d532223d755a7d61ec6f74d8076f65e3a610081ee35a8a2b874433e6e95fa496cf2063f288a52c8e068e1e5c91d3e9fa87ec2ef5b202592ee2eca24d0de39fee77fac7abcbef3c02c560c09d399c8b58f1401407e4352b14ae42e7c6b61c7a8ec8c369a271b6435d56ee6937ce841cf71161e54d214ac16bdd8ffd00cb6b56"], 0x90) r1 = shmget(0x3, 0x3000, 0x78000014, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) 21:03:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x5, 0x1}, 0x3c) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='projid_map\x00') ioctl$PIO_UNIMAP(r0, 0x4b67, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x200000000000009}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r1}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x100000000, @dev={0xfe, 0x80, [], 0x13}, 0x7}}, [0x1000, 0x85f, 0xbd3c, 0x0, 0x7, 0x3, 0x1f2, 0xb153, 0x4ac6, 0x1000, 0xffffffff, 0xe, 0x6, 0x5, 0x80000001]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000001c0)={r4, 0x40}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r2, &(0x7f0000eed000), &(0x7f0000b88000)="03"}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:03:55 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x60290000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:55 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210900000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:55 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x80108906, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:55 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) prctl$PR_GET_SECUREBITS(0x1b) 21:03:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc00000000cfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000d2c000/0x4000)=nil, 0xe07000, 0x2000002, 0x20012, r1, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0xa0400, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000001c0)={0x1, 0x1ff, 0x80d, 0xc06, 0x401}, 0x14) 21:03:55 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210a00000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3390.720056][T23142] binder: binder_mmap: 23141 20d2c000-2112c000 bad vm_flags failed -1 21:03:55 executing program 3: r0 = socket(0x10, 0x807, 0x8000000000) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:55 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:55 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210b00000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x7, @remote, 0x5}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000100100000100000077000000f8ff0000143a8baebcd9d9826a1fd23cf579e79a1e5f2d1442486ec9c7cd1d3199e92ab14ad87556fea080718a70f63ca06c3cf6ec5cb7ec117b7275cc0615e4623c59dbadb64fa1ad8c393fbab87cd5d6a51fa49ac3e2d54aecda047dac2b90753fb5ff803b3f493f5715f3750bd6580bf124844b18a8634ffded1532f0d46e661e322a05ffa75ad0d6e8732b96a12d68971c7342c3f141042f65bbe619bf73a34b7ac46f5f26fe4ed269118f2c4d7786bcd2d986b3d600e0601139ebb096cf3b22ae9b4ccc95767abd6d507d0f333fd501164bb68ae89006612e"], 0x18}}], 0x1, 0x0) dup3(r0, r0, 0x80000) socketpair(0xb, 0x800, 0x2, &(0x7f0000000000)) dup3(r0, r1, 0x0) 21:03:55 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x80108907, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x35, 0x0, 0x0, 0xd0600900}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x10000000000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x70) 21:03:55 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000080)=""/177, 0x2000, 0x1000}, 0x18) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") socket$inet_udp(0x2, 0x2, 0x0) write(r0, &(0x7f0000000140)="1f0000001000ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) 21:03:55 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210c00000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:56 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x80184540, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfff, 0x2c4000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) 21:03:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x49e7473c) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) getsockname$unix(r0, &(0x7f0000000100), &(0x7f0000000180)=0x6e) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000005c0)={[0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:03:56 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3391.397670][T23671] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 21:03:56 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210d00000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000080)={0x1}) 21:03:56 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8018457f, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:56 executing program 0: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x20, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0x10}, 0x70) 21:03:56 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0x14}]]}}}]}, 0x3c}}, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:03:56 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210e00000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x20000) ioctl$TIOCSCTTY(r1, 0x540e, 0x99c00) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x2) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) 21:03:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000004a40)={@dev, @multicast1, 0x0}, &(0x7f0000004a80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006a40)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006d80)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000006e80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006f00)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007400)={'ifb0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000074c0)=[{{&(0x7f0000000440)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000002600)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="4beead65110b8e20d9e0bf3d3093942f606ccfd543b3e1eee709a492965277b439f82aadaa31e5a66400ccccb7d26b8f7486d2b6d714fe6a036e48092bcbc0da4c1057c0cae3bddb6a8244f83fab6e3ff23a2d", 0x53}, {&(0x7f0000001500)="d8238c55a4bef1bb835e9a113dbecb4600e9a154d25c22a520cb05e5be15fdca3da4121c28f3f3233009fd280d88403d5bece22bbcbee77aab58ece7d140deb64a0dd1af3170667b7021f367bc036e4c6246f6bf386a507c8664dedd9809311cab8524422c8f2a250115f0da986a6c0a975d16", 0x73}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000002580)="d210612e7204a865f97f22b64230ff0c6cdba57bbd90b80316cb05c7def0ba46f5cd4a19bb073454bbbd19c631d588cbc9377e96114f90bcd4329ba271d57c38f96408e844dfd13b46b70723ca1de47176ff8137eb6587fc", 0x58}], 0x5, &(0x7f0000002680)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0x18}}, {{&(0x7f00000026c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002880)=[{&(0x7f0000002700)="49f04825a9648dc5a02ea1ab2cf02533defcc6fdf948d1a57ba159a8aa402a1d1962ae46f9f4acc9cba942971db43c6c25c982d616a45e229ca3d806018f3c55347c9b59e17fa32b2a9ffa22a33897d33fd01bc3b511a76ccad0d38b42ce49d33a927fc6242fdbb9f5d3", 0x6a}, {&(0x7f0000002780)="8ff67c2ddaf329948f59fdb3bb14d91f544e9be8255ad89c3b5d10a591703031a199ae50c34b1fa7c06c816555365e49a309a3754555bd1506c63e2f81e34d8627a96ddbccff1d9f8ffdd9d7ebc5012fb89a81ccf5519f4f4354d8f04f4a70ee9b390b3eee58ab94a4008736a853f19e5c9512cf5b0072c745e9d096aa6c5c895614194287dbf903fbc88d21b50a52fee542a148e645f61e48", 0x99}, {&(0x7f0000002840)}], 0x3, &(0x7f00000028c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0x18}}, {{&(0x7f0000002900)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002fc0)=[{&(0x7f0000002940)="9357759b14bcf312b0ba2569149df64cbb011eb07888fd6e13ec6a98b2eeab1e04931e2a35dfc2735eb1da0ffe2ef33763ff990565e41a51b80b0802228c0427adc0dbbafd7ac8d650f36ea43519479753c7c27d66923cd0c9c748c29ac9eb618172024220139cea84786a391cfd66e1f8736b9bf79a25eba90ac53c3fb161746cfa1c4178a3faf3745a0f24843955951738221e10af93ab2830ecf9322e6c68fa7fae1be109359b3c2668e8b2777c2cbd463265d204e19e62096be28ac58456141e62485b92c7cb63af328b6af53c9ceee4dfbc2ee5ccee4ec915cc239eb95521861d2d56b794b4cca4ecbad130ee9f889616305eb125", 0xf7}, {&(0x7f0000002a40)="7be71ba54615062a2b7e69612fcde57b72f11fbefbbc2f8cbb7d83589cc54ef7712c8ddfbadbbd32019fe763ed846bb70f9a73b47e843d0b579d0f5aa9959feef662f2c0e95e815348beafc972dff1e7adb42f13b23806aa86d9b3454c6e51f14d164e754465b1b67508765a3e059c7209e0e04e0558864af5d858c472be862751713bac3abc16740fc57d773d50164904e7e0784934b33d15e0f68a4a67bd452e9a67528228d0aab8e843408b4da0fb41bc92c224e895d472d8af7163324ff73a410706c51815", 0xc7}, {&(0x7f0000002b40)="010d61f244f4799c132c5e", 0xb}, {&(0x7f0000002b80)="6982ef1cff4831b8e591d40efee01234399dd235ab0b1dcfad62524a482731ee863bcce6b46d8bb76aeeea89cb706c7ee8b580a106fd6d3d11ebd6b6df5253f483d7120d62b6038dcf638f7c540d8b8a8c2d45c9416c5bf863cdb6e4f3d41e450dfba3e32c7ba520c1629858f61fcc24514dbb58f4b5536e436bd37ffb4a518026989fecf2191f4764fad96f0a458f7b459a96a758fd28775b61b445c10067cf67ee9174c952f2060bbcce8b6d0aeba5752bb81a38d17061374f9f2ee49dbbaf7a75aa97c8f65c1e4c2774e59ff7f48ff7135bbf619b5a", 0xd7}, {&(0x7f0000002c80)="b4aeead6f093271e7b7f105414e9bedc867e23a65b971692ec4b5ce7abb931563f6de8be8c817f98a626f90afc0930b94e74a0cb2dc319e226ea0f74a240dd69ca29a4161834534a4c66e1d43b0ac9df91bfb242a6e00967440282f093f4a01c6567b6", 0x63}, {&(0x7f0000002d00)="e3bab962406807d9209bb15a0df370b63ddf69d9d9c66636193a59cc1943f16b47bb1312b8903671c5866c6f3a155a3c7264b23797f81f92da929387f87fb6e255afffe1d5e37cce555f101a9402757dfe8ffaceb9d795913984b9d52c39d24af8c8f2326da7f49aa4e8406e207f32686f4f517ef8340901a17e704d10aa154342848661b0d7bf66c4290f888c65f1046e2a3f1c77bade09d27b3a261da6a1", 0x9f}, {&(0x7f0000002dc0)="59a72db38ca84238d9f9139b8d659c9e78b985adc61dc99e2b8bd6aaf051706f575e0ae20ffc2a6c037a2afe339b46fc0fe4770f5400f1103198a9540842a40f6d7151cdb9d1db44bc4d5274c0d01d968ad7b382d07dc65ba1b6a8481719b8b8d9a735d2e8ce35a8222b7fcc6c58abe5c81b54845c817533c80f8db4cbda382cfb69210a7f4bc7ee4857ac2b772b0819f1bf1dd560e3d317d0b4966b03e0773f4b66a523b08a81c51c5ef8", 0xab}, {&(0x7f0000002e80)="98d65105df42218dba2b15f06ce8f7f954119d5d85bd6565f5c8000ee2b7c35e783d92349ec89f58685acd34433ec4406312327efa9e54cb643ad6666cdcce6790fedd7a17034503d198a90bd3dee5189d0e16313696024304aceb446cad22e715fe52b1a5562be709f67d9af97a6af4532d12410c77b4d2da982a9896c24f667c29898f2f7b44464cc99be717e6aeae11f094d8dad32ea02765f5d1909e", 0x9e}, {&(0x7f0000002f40)="ffcfce0cacf8a33490f2a6234207e8ee98159b2cc76b8e594ddac55c03e02eaca404358fe18b1a2574150bea0b4debf0510cc225508d8d3ac4a868dabb78e4bd5e160bddc44b5cb49118ec6dc560ca75547fd29359", 0x55}], 0x9, &(0x7f0000003080)=[@ip_retopts={{0x64, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x53, 0x1, 0x7fe5, [{[], 0x100}]}, @end, @cipso={0x86, 0x2c, 0x4, [{0x0, 0x12, "f37e9f4e951a51d4220a1a8b4f4ac4d4"}, {0x1, 0xc, "499e7a36a5154aca771a"}, {0x5, 0x8, "e523be23168f"}]}, @end, @lsrr={0x83, 0xf, 0x7ff, [@loopback, @multicast1, @broadcast]}, @rr={0x7, 0xb, 0xffffffffffffffff, [@multicast2, @multicast2]}, @noop, @end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100000001}}], 0x80}}, {{&(0x7f0000003100)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000003600)=[{&(0x7f0000003140)="e3d944a5ac0a75167956504ae53a43ac0592eb028b3a67eee208705c52274c09ea1dd8500d0b93b9dd011b62", 0x2c}, {&(0x7f0000003180)="31194babaea7fc8198543adb0e890641b1a8a38767529a48f2e5352d84d9b16f4d55519d04030f189eddb58728ee40091ea793e7003683d27a517f9e6b5d51bce3fd1cf42acf68d8969626a070df6a612e967d61ff2c325464d6a785641b7fcc0e5604c5226377a040074cf9c913ac9f5308b0c6226d8c", 0x77}, {&(0x7f0000003200)="9274f27b14d7afb8d760d4270c81a337bb6ce8a54245c9ff2b240b4b6d1f25b80d7caf8961734c7ef175f07cf0ed28a4b1f57b56ba33e3c157fa6895bff57e228dc777d31f260442b0f645f5628c6e311d04c8cc64ce419d7159413dcf88f9f2582a9e7ea8dcde", 0x67}, {&(0x7f0000003280)="7624a6a8cae1dd9027b1521612139691c87da23eacf1b4a1196725063221882bee8243a295fce1ae07a7f9c199182f4afe604c53ad805d3159a88281aca5fcd099a85e11fdc5bfcd571d6f73bfb3d17a2793328b5ce4297f220f0626b8ccb8837cd81157001a79e5943cedf0a0e4531bc4f9db14d139cbb6931702ac68178515769a58fac0f330f45f2a7782ad3c02a9ca57f2582b5a2dc10fd4fdb8ec3ef901d2e493dda357a1561d5a56cf5094763577df04d1ccffeb4d84d41308a594747fa3dddfc6004e7b735333809fbf58c7adb7bfd42a05794a99214e3d6a38c41ba932fa02a611c04cf84d9bb7fd", 0xec}, {&(0x7f0000003380)="6ee0bc194e80edd06b99e21e39f14cb7fda88c02a4c25ed12df5", 0x1a}, {&(0x7f00000033c0)="5714115d37419bc0d9fa40d552f69775d5352a26717ada37104854975457756e6217c91f08be8b10cad1c39f301e2538bab4c8377bbeb9e7447d51a796f7c2ae6586e9a27ca4", 0x46}, {&(0x7f0000003440)="53150ab292601b79529ed30561fb216d655485d24a5c1010d6a40991876cca340236dc72a7b31f09ec9001c3c17a74680c15d93f9a59b4550c9eec6811e34bdff520b5cd119ac4d7fed907acda6f9036e1e255b04fde1b5f8026f93856b60d2f23f60db36f173acd6c89a005dfb89a67f3a05c2cef35429e23f573acd632439da7d4e08ed3ff8ff6c41ee9", 0x8b}, {&(0x7f0000003500)="1431527214accdee9172e88a3d16bf10cd0da3343e74627367b69b9aee95ed3ebc853b59b810dc27e8381c70c24816ac275cd0db81b7571914c5498a02d9272fc3658befbb2b0d2a7a372d3092bb307059599d0fcc6a747d7ab0120d0f156b", 0x5f}, {&(0x7f0000003580)="e7d58b6c95ed67d52b0e0a754b46b2da9ca7ef263fd4a01bac7260c6234de95768e33dbb05a8722e10e46650a89fa71321076eedf7508f319801938bd52a01c615", 0x41}], 0x9, &(0x7f00000036c0)=[@ip_retopts={{0x54, 0x0, 0x7, {[@cipso={0x86, 0x41, 0x52, [{0x6, 0x5, "c21c05"}, {0x7, 0xa, "d23c855a78a97901"}, {0x7, 0xe, "d249adb728a9088a49a05fb8"}, {0x2, 0x7, "f48ad432aa"}, {0x0, 0x12, "6c0d05d0f236cd9b340a0656accbf96d"}, {0x7, 0x5, "6bea5d"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x451b}}], 0x70}}, {{&(0x7f0000003740)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000004a00)=[{&(0x7f0000003780)="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", 0x1000}, {&(0x7f0000004780)="9267231bbbc5d7cb52b3798afdc7a88e93fc781064708c49150f2e6d4424568169128df4ee1b9f4a582de84caa3280519669a94ea6d1d43223a33ab290058b2d8e6e8720e09ef5bb31399c3c68c2dcd1e1d5a7df7d4bc4430961317297cb968618a8c378dcc28df1181ac0646cb3d11dd705d4865dd105734faf1da8002700b786b81c6bf4ed80467bb7591203d2d06185943a8f5a7962322acaf65272f6a3322c", 0xa1}, {&(0x7f0000004840)="d4de6a743f17e9125d21c7c94cbc59a876a6422c2ac8253c08b640384d92bda62fd803bb35d7ecbfb31c1b1a4acf1853d8ab97afc4c31f443976f443583aa32c88dd7a3f2655364cee6dd31dea6979d718512415a8c2d1c169e70bbde0dcd73d480fd79b176bf91fd0239fc7f6015934d38f0ad41c4f68a59a903c26fa4e04dc3fc7a1b6d9830b98bee8de4cf572a03a7ecb8c9bab84b91a7ff52a9205ad1f7d345e24aabc8d0530054436bb68e3e3d4ba224ea2492020b48e731ae12623b6a5e87312a64725e79efc1d32a90ea46c627393912e5c6d6d08235252eecb", 0xdd}, {&(0x7f0000004940)="75dc02d45813a9331a079cb8bd5ab677498946edc912fa83967f0f00211b0fc9044e148c8fcd1d8591f63bd493ce2514bf5075423922258d96bd988f4c8755e2229a1308bc14718f62e8cf3c4e9cf32285f1388e1d5ef7c46117704b101ec92dc5164a608c7289316a44e04c32478382166f2120086cc158e5110f9d085e3479badbb7b106a4", 0x86}], 0x4, &(0x7f0000006a80)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @empty, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x11}, @remote}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@cipso={0x86, 0x6, 0x6}, @ra={0x94, 0x6, 0x6}, @ssrr={0x89, 0x7, 0xfff, [@remote]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x98}}, {{&(0x7f0000006b40)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000006d40)=[{&(0x7f0000006b80)="2749742b83c5fb280e770df09225586081e46038f27e1e7aaddb5b596107ab20fd07e27a2be0f183d56353b4db0239dd2c718ae5f23ffce7c23b02f88a29973486cdf931c54fa98beba8ebfb0afc120b4ef9bea03af2d0e0536c3b8b19499d600e97d82562dc754047c77d210a6fe7f5f1f1a62f4319095e4f0bdcca7cbfd22ea4660bf0be6845aeb85cfcfce17c73e1b72b95abc10e5214a1a0940e5cd616250aae8a6f165f39", 0xa7}, {&(0x7f0000006c40)="a99776f2c1627df5ccb37dc3cb7e6e619d0d0a1934ba64e18e99471adcd65f5577148c6ee200276ed844d55f3dd282d18bf7e8b9b995", 0x36}, {&(0x7f0000006c80)="fbca02a9e59356a6b0f2a6838fb6fc6676600dd779521b5eb0abe2517155f401c63ffa0779a5329a11f014b272bcb3d842480856f263e20bdb15a7e4a9d6c31d825e7f15db133c27e2ae4429453405c4f6ebbb43da5212b1f0a7fd882a15ba8fe8dcb6a113570d4b20c1b8eead7ee75a6cbbf7baee6b38da337f8d13822c6e022a6293d8e1eff07499c092047817bf9e7d0e2f71a04669e5d92b0e989d", 0x9d}], 0x3, &(0x7f0000006f40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}], 0x70}}, {{0x0, 0x0, &(0x7f0000007340)=[{&(0x7f0000006fc0)="413fc6ecb8730f643784280ca9b3c6a806365144659613d80d321748a68557bd4f244ed8012291701e8e26904337cc7453d9e2b5e23e4c897dae1b3df6ffcd9fdb73f93c9a467dae7c42a22b42f890b6cd1b6714a2407bca9608630c7d297b03daa19983fd587e6fb65e6221177d32ea63211708f1c07db784d047f061f8505297bc9fb45d71a67aa8061cf98f0d8e61c9000759d74dd38c4cee96cee55f15f7f313dd31b71fc86579286d58d8ee94668da6f4a9800d85bc4b49d6a16bb30180fa3ac95effb247039a1ec1dc64ebc50ed4e4ea6774f58166197008db1f3935bd5d44d1650a5e4b532d75cfc9981a9e2738", 0xf1}, {&(0x7f00000070c0)="5d14e00d9f4f58512fcbcd302e94a182efb0e20a28cd734b1d52fd09987182dff617c31b400100e8ded7572cb3f6", 0x2e}, {&(0x7f0000007100)="134f6fd40a1493bc883c8352fbe65c2a15c331052ceafda769427afec2ef41efefa3823314240efe587cc36b8ff1bc0718b5de4b8a4cbc60fd5d7145676281f178a0d042ab94d2ef7e51eadc1f76f9c0cfdb50faae471bdbace6ae885feb19b1d654d35d34c3ee74f0ae4cb90e1cac8bd6c4c2d958b1fe4a006283628f40026050f305275ddeaa81581b", 0x8a}, {&(0x7f00000071c0)="5be588a982ab70543e143d81c458840f0574bf5c20c2e42ef81bcab0e70645f12584a1da055ab58ac5bf648e01809ebcc1a108884c8f", 0x36}, {&(0x7f0000007200)="c0c9cdb81c18c9ffc81ff9ca832e61f55cdd1b470c2a6305fd073f04d082390feb55a8e38dceaca2d0f48ff64cef02f881e4", 0x32}, {&(0x7f0000007240)="02bfea909e202e3c99f28a0597ce3b6a38ca57c7193555ca33a19023e3ea023fb28e891aeacb7a87700cbf56bc40bfb1baa33c5fdd329a4feb0e4a811a1649be02317baa30177cec627496f66f26a563a896abc8180450ad0259f43b57463ba10e2bf7781b5140fade213e8a53a82039886a15cd57fe60d1817971b9ed42908ac0b24ab7f2088441047b83f4f7dbb7309ec9a4e242dc1b8a0e8a6a5cd4fc5bf66a69b9593e06183909d37656926f6b27799c18f6343c13a4932b1e59131b037fc2e4a583f64855ad60d18455ccf3f0ca80a51598eedb15987d48081820dec5ac30f5fbb7e7e75f43ac9cb9cd4a7182d4b31e0d860a8dfc501a59da7b", 0xfc}], 0x6, &(0x7f0000007440)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xdb}}], 0x50}}], 0x7, 0x10) r6 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x9, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000340)={0xb0, 0xfffffffffffffffe, 0x8, [{{0x5, 0x0, 0x6, 0x9, 0x8, 0x8001, {0x0, 0x100000001, 0x2, 0x34d0, 0x57301472, 0x3, 0xb50, 0x93, 0x0, 0x2, 0xcf8, r7, r8, 0x7f5f6f1a, 0xffffffff}}, {0x4, 0xff, 0x8, 0x7f, 'em0\\/&+('}}]}, 0xb0) write$P9_RWSTAT(r6, &(0x7f0000000400)={0x7, 0x7f, 0x1}, 0x7) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) getsockopt$IP6T_SO_GET_REVISION_MATCH(r6, 0x29, 0x44, &(0x7f0000002840)={'IDLETIMER\x00'}, &(0x7f0000004ac0)=0x1e) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000080)="c5", 0x1, 0x4000051, 0x0, 0x0) 21:03:56 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7f010000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:56 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205210f00000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:56 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x801c581f, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x80000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0)=r2, 0x4) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000180)=@ccm_128={{0x304}, "15bc76dc6a4c9f4d", "4c2c6e083a3a1ed712a3b5b2b2a57e52", "a87ac561", "541e3d46c6a6ec2e"}, 0xfffffffffffffd7f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB='8'], 0x0, 0x1}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000140)) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000640)=""/4096) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:03:56 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm-control\x00', 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0xae78, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = getpgid(r3) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$IMGETVERSION(r5, 0x80044942, &(0x7f00000005c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r5, 0xc1105518, &(0x7f0000000480)={{0x3, 0x6, 0x9, 0x0, 'syz0\x00', 0xffffffffffffff7a}, 0x3, 0x68, 0x5, r4, 0xa, 0x7fff, 'syz1\x00', &(0x7f0000000400)=['syz1\x00', 'vmnet0vboxnet1\x00', '|md5sum{posix_acl_access\x00', '/dev/kvm\x00', 'md5sumselflosystem\x00', 'o),@ppp1user])\x00', '#]\\(\x00', '\x00', 'ppp0\x00', 'syz1\x00'], 0x68, [], [0xffffffffffff0000, 0x8, 0x1]}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000080)={{0x9, 0x0, 0x7, 0x800, 'syz1\x00', 0x80000000}, 0x3, 0x40, 0xff, r4, 0x3, 0x2, 'syz1\x00', &(0x7f0000000040)=['eth0\x00', 'o),@ppp1user])\x00', ''], 0x14, [], [0x0, 0x48, 0x3, 0x80000001]}) socket(0x6, 0x802, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0xffffffffffffff38, 0x0}}, {0x2, 0x4e23, @rand_addr=0x7}, 0x21, 0x0, 0x0, 0x0, 0xffffffffffffff01, &(0x7f0000000200)='ip6gre0\x00', 0x7fffffff, 0x3, 0x10001}) write(r1, &(0x7f0000000240)="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", 0x46d) 21:03:56 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x80040000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:56 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205211000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000000400)='j', 0x1, r0) r1 = socket$kcm(0x10, 0x802, 0x10) sendmsg$kcm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)="2e00000039000508005a80bcf7e9570a017ef90010000200000535820900068004001700d1bd00000000b5a8e438", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 21:03:57 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0044306, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3392.311355][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 3392.311367][ T26] audit: type=1107 audit(1564779837.075:331): pid=24586 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:57 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:57 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205211100000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:57 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8b, 0x20000) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000040)=')posix_acl_access\x00', 0x12) r1 = add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="a22d7476b117013e6e977ac32ab02e93c3dd47420ed5efee7576b0d96ccde981428d931fc7b2e6c661fcf3a2a4689192106f563d1c398b4a00b4652668944b600a0ab12f10cfa485aa62befd2354a6b22ed02a379279c617b48cfd288663fed390881813ec8ed2a5f09b898ddbb2d97ae73e86f3c3ec2a36584680cf9d", 0x7d, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000200)={r1, 0xc5, 0x1000}, &(0x7f0000000240)={'enc=', 'raw', ' hash=', {'vmac(anubis)\x00'}}, &(0x7f00000002c0)="4dc999a2c65357578387005f6f167e7c1980c0c89c877963ff2955f993468fb7ca92dd486d621081f7974aee3e9a098b16b2287735ca1ad54e69dec5c96729835cb30bc000ff98d93f353dae89cc80c8135600aa2338627f59563cdff2a489a2bc3f9518d4006101cc5b88fc77bccedfb414f2afb0b2bfcd6e01467e732acc290ab3b3aa073625847a58875a2c9f31813b3fc8ff80f6d6eab595f9b0b945ed810def661f53a53d1c4d42942f2b8bd1208d1703cb8634b1c6711cc84887a2a124626c08f61c", &(0x7f00000003c0)=""/4096) socket(0x1c, 0x80000, 0x8001) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 3392.367091][T24637] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 3392.384094][T24637] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 21:03:57 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x4df1ea60c8c05204, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x592e, 0x7, "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", 0x2, 0x81, 0x2, 0x80000000, 0xfffffffffffff42e, 0x3, 0x7, 0x1}, r1}}, 0x128) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xe45a, 0x1000, 0x800, 0x3, 0xffffffff]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x40000) uselib(&(0x7f0000000000)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semop(0x0, &(0x7f0000000300)=[{}], 0x11d) socket$pppoe(0x18, 0x1, 0x0) 21:03:57 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205211200000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3392.499881][ T26] audit: type=1107 audit(1564779837.265:332): pid=24687 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:57 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0045878, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:57 executing program 0: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x40000) r1 = syz_open_dev$amidi(0x0, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x1d000080, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) recvmmsg(0xffffffffffffffff, &(0x7f000000a9c0), 0x0, 0x0, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x2}, 0x4) 21:03:57 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:57 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205211300000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3392.722656][ T26] audit: type=1107 audit(1564779837.485:333): pid=24891 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:57 executing program 3: r0 = socket(0x4000000000000013, 0x5, 0x104) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/156}) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000400)={0x1, &(0x7f00000003c0)=[{0xfffffffffffffffb, 0x7, 0x2, 0xffff}]}) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) sendto$rxrpc(r1, &(0x7f0000000000)="8711ece2c8ec465010d7d8e2f250df42a62b335fc52cb97bb4a2643525006259831bb70b16b57dc03d1c82c4b70139de389468a00880f695085f50796d9a6df65f846f84158ddc7f510d164c6035f3669a653dec62ad6cd9dfac8a4a641fb8914ad0d886a499ff65206f700012cfeadfe5ed4c29a91f259cba7c1e457fd56b459b8001807fd826199e8ca9034014d354fc0efc25f890794a5e533e11d1c76be03a8a3c37d6b0", 0xa6, 0x0, &(0x7f0000000440)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local, 0x8}}, 0x24) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x9}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x40000, 0x0) 21:03:57 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfeffffff, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:57 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x200000) write$P9_RREAD(r0, &(0x7f0000000300)={0xa6, 0x75, 0x2, {0x9b, "097e5ea05d6837e72628193b5c40be243233a7aa22e2f2392de339bc8631ff4f248d6530fbc4816bc480aaf0b8498b1a8dc6cb5fce0589b423ff8a616ab0f2b59a363a524f2383cba0924b75ee2e21ad49a41fdedc4b81d6ea99f37acba14ad514be63bacf27d3de45ad813d9e3bc95d8a17155033262707caf0d09c8bb8159953f095ef31a23ec51e13e9d80b347f3ab6f8af2a1e422e51245c82"}}, 0xa6) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x101}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x13c, r1, 0x701, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x204}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff5a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5037}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x36}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x8084}, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x781000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syz_tun\x00', 0x20000005002}) 21:03:57 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205211400000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:57 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0045878, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:57 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xff030000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:57 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy]\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 21:03:57 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r3, 0x1000}, &(0x7f00000001c0)=0x8) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x16) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x5}, 0xfffffffffffffc2b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 21:03:57 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) pipe(&(0x7f0000000040)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) socket$isdn_base(0x22, 0x3, 0x0) 21:03:57 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205211500000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3393.179301][ T26] audit: type=1107 audit(1564779837.945:334): pid=25339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:58 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0189436, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:58 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x0, 0x9, 0x8000, 0x0, 0x8}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={r1, 0xf5, "ba730917ceb3317db744bb3cf45a10abc079740bf46168b1a28f29d510158f6e8cd92d1abc356959bb5f753b925a087497bf09c9f854c109a3e9e6e1051d961263d210f1635b0f9e9219050ea93c249e155c04e9e43a91ed219172010e562c9edd099a75b4405d2face1433cf30f6b1328322f2645d5a1618c06af85f8314a8bcfe72bb3534a77ecd3ec2fbd46019eb32830facdf8ee6125ec5318cc04967db716907e334f53f882fe7cb0110cbe27080c4c81a77a175181574629b7be97dca5626381cc7089588b9fa3fc671cf6feead8167aa6f4bd55d938d79e6a09b4d6ffe31445ae903304f0ed1cca268167ec2cfc475d8bc0"}, &(0x7f0000000100)=0xfd) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060000000000000001369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000380)=0x8) 21:03:58 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205212200000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3393.402452][ T26] audit: type=1107 audit(1564779838.165:335): pid=25412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:58 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:58 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0205648, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:58 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy]\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 3393.643326][ T26] audit: type=1107 audit(1564779838.405:336): pid=25617 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:58 executing program 3: syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x2a0180) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000005c0)="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", 0x1b8) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000080)={@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x3, 0x0, 0x2, {0xa, 0x4e20, 0x1, @empty, 0x4}}}, {&(0x7f0000000000)=""/52, 0x34}, &(0x7f0000000040), 0x8}, 0xa0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) getpriority(0x1, r1) 21:03:58 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214002000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@empty, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, {{@in=@local}, 0x0, @in=@multicast2}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c00008048", 0xffffff87, 0x2000000000}], 0x5d, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$vnet(r1, &(0x7f0000000100)={0x1, {&(0x7f0000000200)=""/4096, 0x1000, &(0x7f0000001200)=""/249, 0x1, 0x2}}, 0x68) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x35) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f00000001c0)={&(0x7f0000000040)=""/126, 0x454}) writev(r3, &(0x7f0000001600)=[{&(0x7f0000001300)="90841ebb88eff8fab2a05911ee0e4b807557684d08894efd71a4f24f656657455bed507360d6af2eea83b8ef9fd6e5867010cb28ae578bf59a1d2144ec4613b02425271695cb2c3c56480d3ee3a4f70781ab17b76aa6aa1fd535e84f6e715dabe35989563f46f3f91ade65f0e052d9a767c057a1a9a595abbf65aeaa2bcbfbabb202c18dd804313335fff683d4035a21ac482dd3edaa53de295ec4fcac6fe9e27e60f169377d1d81b9cfac1771cd18a7838d6d48feb142b975d7faa3e71e555b36104223f1e63195152d08fcfa22773d8f2b742def2e7942cd8815da845af665"}, {&(0x7f0000001400)="ba09d53da284c16071521a930454a24719f762cc3b3d290d58705408ee5906ae94de6272846407f516a5ba77be63d1fd49215307940431fef96e564632a79d70a4aa49477230a44c9d72485990723e260cfa91d5ff5278e9e9ea6457504bf0bbbce1f7e3a58360e98012f1d0c7d323b0888145bee1d68d825f8d0628c3a713f68da598c857687a55c62cbaf234957c4c0321e091c80ed94120c00725b8ed15419540e56ef336d77affde51f30376a2d25e19901acb862594e6b476422040bf3106df212a8d95210e"}, {&(0x7f0000001500)="9e3a06dae209b300c469daaae5cb190f1029d423702335bb4e924e607f241a211aa92003a63e0b051c83f28bd5718f40ce195bb7bd00aeda50ba57ec40cb2df98d56e2f4374d21bbb65bf4b4d1f8419fa9d97b184b0107e8584ac761bcf9c73f4345f5d732536b731bdb1608a777ed2fb391eddaec6b28653ff76a3c770bb66d4b0ba84bb0c9f726608349a0631d0e6d7a88122749bf66f42e64e8340439e8f88e6d48e53003975104dcfe2b7728db3fd2604cf2df3878794070822f9e706ed8879d1b1061fe16f39639fc5bc9bb2d83ff4d21e5efaddad10e7b4cc6c8e1f6a58e96c8b83df0edcbdb0910571b6745"}, {&(0x7f0000000180)="299db9672a45cd71139463778bac7dc3cc58779bad8940"}], 0x10000000000000ea) 21:03:58 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:58 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc020660b, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:58 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214003000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000002980)='/dev/dsp\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000029c0)) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0xfc) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000640)={0x53, 0xffffffffffffffff, 0x31, 0x8, @scatter={0xa, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000080)=""/112, 0x70}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/126, 0x7e}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000000240)=""/73, 0x49}, {&(0x7f00000002c0)=""/3, 0x3}, {&(0x7f0000000300)=""/22, 0x16}, {&(0x7f0000000440)=""/193, 0xc1}, {&(0x7f0000000540)=""/205, 0xcd}, {&(0x7f0000002700)=""/181, 0xb5}]}, &(0x7f0000000380)="69d687b3621a96b5cb5f72de1072bbbc858070c0fef826e8895bf40b188f7edbb957f5b1982253b09fcc093c119ceb3aed", &(0x7f0000002880)=""/209, 0x0, 0x16, 0xffffffffffffffff, &(0x7f00000003c0)}) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000002a40)={0x2, &(0x7f0000002a00)=[{0x1, 0x5, 0x4, 0x401}, {0x0, 0x3, 0xffff, 0x100000000}]}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000000000de) ioctl$LOOP_CLR_FD(r0, 0x4c01) sync_file_range(r0, 0x0, 0x0, 0x3) 21:03:58 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy]\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 21:03:58 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214004000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3394.121978][ T26] audit: type=1107 audit(1564779838.885:337): pid=25946 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:59 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:59 executing program 3: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000040)=0x400) read(r0, &(0x7f0000000080)=""/11, 0xb) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:default_t:s0\x00', 0x1f, 0x1) 21:03:59 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc028660f, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:59 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy]\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 21:03:59 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214005000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3394.369416][ T26] audit: type=1107 audit(1564779839.135:338): pid=26198 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3394.442281][ T26] audit: type=1400 audit(1564779839.205:339): avc: denied { associate } for pid=26239 comm="syz-executor.3" name="dsp1" dev="devtmpfs" ino=18675 scontext=system_u:object_r:default_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 21:03:59 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffe, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:59 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = accept(r0, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x80) r2 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) getpid() fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) write$cgroup_pid(r2, &(0x7f0000000180)=r3, 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x9, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r5, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:03:59 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0306201, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:59 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214006000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:59 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x2, 0x3, 0x2) [ 3394.692109][ T26] audit: type=1107 audit(1564779839.455:340): pid=26377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:03:59 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x40030000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:59 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214007000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:59 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:03:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, &(0x7f0000000080)={0x20, 0x1, 0x7fff, 0x5, 0x1}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="e0", 0x1) 21:03:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000480)="65c06c00cc3e0f23e90f00de0f0052e1660f670866b90200004066b83717000066ba000000000f300f01c466b9800000c00f326635002000000f30baf80c66b80c482f8066efbafc0c66edba6100b000ee", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) flistxattr(r3, &(0x7f0000000000)=""/121, 0x79) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000140)={0x0, 0x2, 0xfffffffffffffffc, 0x1000, &(0x7f0000016000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x7}, 0x28, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:03:59 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214008000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:59 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0845658, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:03:59 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffffffffff, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:03:59 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214009000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:03:59 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) 21:04:00 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'%ond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3395.182554][T26595] encrypted_key: insufficient parameters specified 21:04:00 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3395.232167][T26595] encrypted_key: keyword 'new' not allowed when called from .update method 21:04:00 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) syz_emit_ethernet(0xf2, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)={0x1, 0x2, [0x22b, 0xc63, 0x90a, 0x3e7]}) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x359) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="035db86376868768fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7", 0x33}], 0x1}, 0x0) 21:04:00 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400a000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:00 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) 21:04:00 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x421c4a99}, &(0x7f0000000340)=0x8) write$P9_RAUTH(r2, &(0x7f00000001c0)={0x14, 0x67, 0x1, {0x0, 0x2, 0x3}}, 0x14) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r3, 0x9}, &(0x7f0000000540)=0x8) ptrace$getregs(0xffffffffffffffff, 0x0, 0x7, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r5) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/222, 0xde) r6 = socket$tipc(0x1e, 0x5, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000240)={'HL\x00'}, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'\x00', {0x2, 0x4e20, @remote}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'team_slave_0\x00'}, 0x18) dup3(r4, r6, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb79366256287fca97d6eb1c1a741ac056a5abdcac550c00caae8c601", 0x7f, r7) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) [ 3395.399654][T26730] Dead loop on virtual device ip6_vti0, fix it urgently! [ 3395.436119][T26767] Dead loop on virtual device ip6_vti0, fix it urgently! 21:04:00 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x30, 0x100) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f000002002808000800030004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:04:00 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'b%nd0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:00 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400b000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:00 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x300000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3395.710629][T26889] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 21:04:00 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521400f000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)={0x10000004}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000840)='TIPC\x00') r5 = syz_open_dev$swradio(&(0x7f0000000940)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x2c, r4, 0x300, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x20000084) r6 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_MARK_BUFS(r6, 0x40206417, &(0x7f0000000200)={0x8c, 0x9e, 0x1, 0x10000, 0x8, 0x7}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x523, 0x0) r7 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x204000) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000180)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x2, 0x4) recvmsg$kcm(r7, &(0x7f0000000780)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/179, 0xb3}, {&(0x7f0000000380)=""/85, 0x55}, {&(0x7f0000000400)=""/168, 0xa8}, {&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f00000001c0)=""/6, 0x6}, {&(0x7f0000000540)=""/14, 0xe}, {&(0x7f0000000580)=""/214, 0xd6}], 0x7, &(0x7f0000000700)=""/109, 0x6d}, 0x2000) setsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f00000007c0)={@mcast2, r8}, 0x14) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x20000000200000) recvmmsg(r0, &(0x7f00000001c0), 0x0, 0x12021, 0x0) 21:04:00 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) 21:04:00 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:00 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214010000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:00 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:00 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x500000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:00 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214011000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x3, 0xff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8932, &(0x7f0000000080)={'bond0\x00\x00\x02\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc018620b, 0x0) 21:04:01 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:01 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214012000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:01 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000040)=""/186, 0x200000, 0x0, 0x5}, 0x18) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x1, @random="fe709d0f7bba", 'bridge_slave_0\x00'}}) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000001c0)={0x4, &(0x7f0000000180), 0x2, r0, 0x8}) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000200)=0xad8, 0x4) bind$x25(r0, &(0x7f0000000240)={0x9, @remote={[], 0x1}}, 0x12) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000002c0)={0x0, 0x2, 0xff, [], &(0x7f0000000280)}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000380)={r1, 0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000003c0)={0xfffffffffffffffb, 0x0, {0xffffffffffffffff, 0x3, 0x742, 0x1, 0xab6}}) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000440)={0xf33f, 0x9, [0x10000, 0xcc06, 0x80000000, 0x1, 0xb3], 0x8001}) r2 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) getpeername$netrom(r0, &(0x7f0000000480)={{}, [@default, @null, @bcast, @default, @null, @netrom, @netrom, @null]}, &(0x7f0000000500)=0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x80) r3 = semget$private(0x0, 0x3, 0x8) semctl$GETVAL(r3, 0x4, 0xc, &(0x7f0000000540)=""/14) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x6) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000580)={0xd1e, 0x1, 0x8}) exit(0xff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000005c0)={0x1, [0x7]}, &(0x7f0000000600)=0x6) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000640), &(0x7f0000000680)=0x4) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000740)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r4}) ioctl$FICLONE(r2, 0x40049409, r2) connect$vsock_dgram(r0, &(0x7f0000000780)={0x28, 0x0, 0x2710, @host}, 0x10) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f00000007c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x2, 0x44}) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x55, 0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 21:04:01 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'b\\nd0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:01 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:01 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x700000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:01 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214013000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:01 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) [ 3396.461393][T27398] binder: 27394:27398 ioctl c018620b 0 returned -14 21:04:01 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:01 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x8, 0x10, 0x20, 0x400}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0x4}, &(0x7f0000000140)=0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000340)={'veth0_to_bon\x00', 0x3001}) ioctl$TUNSETGROUP(r2, 0x400454ce, 0x0) close(r2) 21:04:01 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214014000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:01 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bo%d0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:01 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521401c000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:01 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:01 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f00000000c0)=0x81) fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000c00)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91vg\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb21\xb1=%\xf9\xcf\x8d\x047\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\xb2\xbb\x90@\x84\xca\x12`\xf9\xc0FTu\x8e\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\v\xb0\tIa\x18\xdf\x84E\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) timer_create(0x0, &(0x7f0000000240)={0x0, 0x3c, 0x0, @thr={&(0x7f0000000140)="fd0c95cff986ff1f93a15a22b38d9c0175aab73e311f3fabad8e77264538a6a6d90544035584486c3a", &(0x7f0000000180)="5551f2d45543bb86239bd928b767cc39dfe74b8e74096b0bcb0e2b198998677be98f04df7c6febb10eeaa8c178daa7e8701a4d81349d03a4d120e93d3f4ad38f01728ea38ac5526f8f438e344d2da96a73a610ad2e1d6177703e668072c62bac42a441de1c1b48edc315d3602db65ea271408c682edc6df39f46bd149087ef8a0abd7aeca06dccc4dbb3"}}, &(0x7f0000000280)=0x0) timer_gettime(r4, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 21:04:01 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:01 executing program 3: unshare(0x8000000) r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x34f, 0x6, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000280)=""/204, 0xc75878e756c248a4, 0xfffffffffffffffd, 0x0) socket$rxrpc(0x21, 0x2, 0x2) 21:04:01 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond#\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:01 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214060000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:01 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:02 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3f00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:02 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:02 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140e1000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:02 executing program 3: r0 = socket$kcm(0x2b, 0x2000000000005, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$reject(0x8, 0x0, 0xfffffffa, 0x0, 0x0) [ 3397.343360][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 3397.343372][ T26] audit: type=1107 audit(1564779842.105:352): pid=27753 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:02 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond%\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:02 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4000000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:02 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x100000000000010}) 21:04:02 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x1f8}, 0x28, 0x1) symlinkat(&(0x7f0000001140)='./file0\x00', r0, &(0x7f0000001180)='./file0\x00') r1 = fanotify_init(0x44, 0x0) fanotify_mark(r1, 0x10d, 0x10, r0, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$x25(r2, &(0x7f0000000140)=""/4096, 0x1000, 0x100, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) 21:04:02 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:02 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140f0000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3397.610027][ T26] audit: type=1107 audit(1564779842.375:353): pid=27977 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:02 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000030000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:02 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:02 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4800000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x5, 0x800) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@null=' \x00', 0x4, 'veth1\x00'}) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x7, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000240)={0xffffffff, 0x80000000}) r4 = socket$kcm(0x29, 0x5, 0x0) sendfile(r4, r3, 0x0, 0x10005) 21:04:02 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)="11") r0 = socket$inet(0x2b, 0x5, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x40000) dup2(r0, r0) dup(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x48600, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x6, 0x0) preadv(r2, 0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x26, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) syz_open_dev$audion(0x0, 0x1, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x3, 0x6d32f934, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000480)) 21:04:02 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:02 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond+\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:02 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000050000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3397.904614][ T26] audit: type=1107 audit(1564779842.665:354): pid=28101 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:02 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:02 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) open_by_handle_at(r0, &(0x7f00000001c0)={0xf7, 0x7e, "bdc15934fa1ecb5ee962698de01d79e4d70bf490de48588fb5d94b5b41a18344ac5159798bd39c17487a2a3a91fc7815fa8fd537aae72963a57e4014accf4bd8f0bb3d5debf5c9bbc000a5d82d62dfba60e74f23dbeed10fdae38cd08a76612f43f009ee365b1768c0a22e396599f4f966ef7a4115757ab8bd66bf366e855cff922f2bd15dc534490537dcba1b0e36282573b9e9a564e0cc82a150c9ac5630b93bdb6714ea4b823b20d066626e8148031153a27e313166719346227f30af896c5bada7f6950fdab15361e2b044d7a1690de4c57c69114b3b0fa2c2ce21e306d43e6bce3ef744b6eca34f34c7439672"}, 0x42000) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)) 21:04:02 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000060000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3398.080344][ T26] audit: type=1107 audit(1564779842.845:355): pid=28282 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:02 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2062) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:02 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6029000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:03 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000240)=""/44) 21:04:03 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000070000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:03 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond-\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3398.298688][ T26] audit: type=1107 audit(1564779843.065:356): pid=28509 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:03 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'osx.', '\x00'}, &(0x7f0000000040)='\x00', 0x1, 0x2) bind$ax25(r0, &(0x7f0000005e80)={{0x3, @null}, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null]}, 0x48) 21:04:03 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6800000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:03 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000090000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3398.556701][ T26] audit: type=1107 audit(1564779843.325:357): pid=28540 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:03 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:03 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:03 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond\x00 \xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:03 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000240)=""/44) [ 3398.724070][ T26] audit: type=1107 audit(1564779843.485:358): pid=28830 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:03 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7400000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:03 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000a0000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:03 executing program 5: sched_setaffinity(0x0, 0xffffffffffffff6b, &(0x7f0000000940)=0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x10) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socket(0x1f, 0x4eb6d2bea8355069, 0xe06) r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004e00), 0x27b, 0x0, 0x0) [ 3398.957278][ T26] audit: type=1107 audit(1564779843.725:359): pid=28916 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:03 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:03 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a00000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:03 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000b0000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:04 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x04\x00\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 3399.208826][ T26] audit: type=1107 audit(1564779843.975:360): pid=29085 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140000f0000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:04 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7f01000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:04 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:04 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000240)=""/44) [ 3399.466701][ T26] audit: type=1107 audit(1564779844.235:361): pid=29129 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:04 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x8004000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000110000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:04 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:04 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x480000, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000280)={0x9f0000, 0x5, 0x8, [], &(0x7f0000000240)={0x990bfd, 0x10001, [], @string=&(0x7f0000000200)=0x6}}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000002c0)) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, &(0x7f0000001500)=[{&(0x7f0000001380), 0x55911c}], 0x1}, {0x0, 0x1000000, 0x0, 0x0, 0x0, 0xffffffffffffff46}, {0x0, 0x0, 0x0}], 0x492492492492494, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmmsg$sock(r0, &(0x7f0000005580)=[{{&(0x7f0000000000)=@sco={0x1f, {0x8, 0xb0, 0x6, 0xc56, 0x0, 0x1}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000500)="8d4847b060effdeaf3f5fcd70e4f25b61bd1fd0504ba0943787e7ae94cb5ed4c99ad0ca9a1288350f1b254dcfb2b84916c7912c63b1bad77189473999576bc967f2c5b9b9f5601e1ad89ec22f45d0a90dad46ad01c5aa8a72cf09df56d8c355528ceb96fcbe7deb7dad2f01f3f2ba25f9f7fec3d993678d03a7ad5ccb0752ef892b378e494459c99fdab7008020839f248623ecdb4953ad46b00dffacea86ea955a44d1f6be7e008", 0xa8}, {&(0x7f00000005c0)="566e0b5cd72e94a3fed1f032722f5100b8948923dd6c9e579b7aaff6043ef5a130e20ddb510905eebf5aa5526dac465d0994e79307dbe8ef03f80edc24aaad7ec224126fa3734ab045e4fc159d80fb97a60a2ac0828c67a02b91ecae94a10c373587ed9e2889abc22c886be38ec93b4e8c8de89a80f7bd5541b1551382ce4b1b9231c6e027dd952521a431fdbbfbd9dcb881796b983e3bc4ebb7f6580a630e5e2f59961b94c3e10c16fb86a525bc9c5afbfcd8e9da1a503599130d6397de870706b50fba6fbbc1c3b2d6ba6120cd504da9dda5ead9cd24dcebcfc8614a2e00ae1ed1e852e913a1eaa0", 0xe9}, {&(0x7f00000006c0)="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", 0xff}, {&(0x7f00000007c0)="a19943958d7fd1166f3c89f60be9ac0f2c84809a953432d7096eaf51b036283f5cacf0a650f5389ed146b7380f7564312af57b878c13cc5cf41bb746d34fd2a2de0adc263beefd869928d40745f9721edd5843e57978180bb0bac058379adf9143eccbf11b8c71ff9992c6f9250687d4425383f7c6b51f083e5b94604301b7c23044aad34b7fd754d15b29f287fda43b9beb4dbb1c51d133e961ca883ed26821d13660fbea9f4059218d4abbb7c40da19db81df3d1857f8ef29bc129c146adda555bf7496543ec8e36a6a1dbeeaa3e54ad6e33d7011cc7549e381ad8e987", 0xde}, {&(0x7f00000023c0)="440151e6a286c20059078f689f202731eba31a9bcb38e942e91096d815062cafd9aec240f9759217cca20e5f88a3883cd0f2d9b02243b32286380f9b31a54969278158836f4f830ca382bdb44714af466261ff61c0b0fa62831d72992f42b57fd3d2217266e1f139dfeb7fa71d7dd251fddcc57824029e713932dc06cb39d4a91ae4e73d7b17b79ea7c25054865996145e076a01eba448eceac38583843f5d109d3d3824a3bdfd264eb514f86c0af6eee150a03f1ea01b9493048966fa6af37c782bd38bc6c3be40ad5f90fccf37591e1ae3431745eab2b533d1479eb51d0bb78921fbe4451fdb5161ab50b1327639f09f8399b51cbdac3d7a379b4134a4f9bf5baf339f2f1769c382238093c4fc67a07d9b98b556d31013ad34a8f25cbd161f124c8526df0d8ec66e95b9c4b7d3bb19ce7f6f216890efa2060cb9aba7fedd352633e61859fe4e458e8b3281344d5ebdd273a2e6881b67d945f79f0e905d6d209a1e055bb5dc7866c75e777eec0264e1c7a83458c9b9c2dd51e668bf22fb1e6b95926a44493a72dbfa2f3dc5b3da655929b4791b705321264ef973877cc5b5430405585f398a758fa423d3fae8b669538c24c94cf1ffb219dd948864cb0ee801cb078b8f3ca43a43689a4982d918484cbf5da44ba4d273780105972adc607a46ea0cfed0884584447c2df74d25895f5e3a81e8b1044e5d36e6c2ef5168f5a77d9a73ce198c718e08676cbe99e56f40e50c17cc85706301cb8e0a6152fbe6cd9e01798638f5b0f49d5e69ec6d00fd5bce3d051e0aa66dff29879756ff719128171018e5b20df6c69544e1fb64e9fbac4c68fd3502e0ad9d87606675b9bc09b7a3be2459446d4a1cc1e0d45f3e2eb78f58c3b4b9d0949f1f62765e378c8418b13d9089e82dcd5bd08f7f5f46f163aa38ef5e6f438c87fd5cf8130acb6e6bfc448cda8238e96bf35fc5a90badbb9b2c0c18a50466181034ecf9ac16bc023d9d353c25ad972f2ee33991055d3ca5e19d60e5dd9080b092db15737545a014bbadc16230a69b20635c701b3a515a1d847375d94d540ee974d0316e0801b07b8d839afc9b73a58b6f0274acecfaba5b5c5ee388ce3bb2ecbaa806220cf0d3b803d9ebb811e0a392482ea4ae2a1e0730895505e8814590cb22a865276fa507a28a0bb5e5f038ea632a82bf61d5d7488976ab82c89aaacd016fb93440ccdf222f08e3bb08fc9c9c641949711faae0fa3ab623a9353f57d9af187d5ecaf689c7bcfc44d7a1a548db98dd23658df72f22ef60403280bcffab50bebdfed79c380bedef41df5f2244879c8bd542eb84458b00bbcab916007d68c004d3cda4bc49193e19094da636aa601cf5889ab4572394a905a17ffde4590660e8f0c08a786e1c5ea10009f57748d4caea04b610a3b30b53ee2007eb17aac20c738583bf14aed8d7e339b679dea6b44774ea5fd592dbfc9932f6d7272165bf978b211c5140755f856a445faf905acaef91f4eb6fbc5573acd04c26ab16b52c4865bca6a5b4c149e391049beff580151810a6ede15467f32d2be96af066d8e9efb188b9a523c429b17e1e291c3c69c45a73fec29cad8b79089f49c8c81fc9210dc81a15ff2a0b33f52084c2abaec58fcf5f0d1bbc33e2f6c8ba581314a7c3538106dd4cec244e2f948088574298a2b1b947845342b9979df4e99c8e485c5746674a295ca352f9ff4709736d783a59c2d50b2194ae791c8848f5a861115bf07af4bb14ea10128fb019c2b6df0f87cd87d4bbb98040eabf5f8009daef6765bad55bc747fcca1a6e22765033ade26d4f932effd24a2ccac2697403ef525b7d44bfc57c60e30bec4fdd39366833fdd5b894ed7bc4b321ae7d1b4023ca2a3d40110a5ccba76761b45c6a2f5a91af5651b2d68fa5d5d7e1f70edfcd5606dde944036a8ae94215f5e205e381b0c6e506630c6358f12534a5a0de20851062a6f758ee567e027920ce8c80437ce18a02d9a8c35c6a3b6dc93f1e323cbc4a256c44f03e91b278c5348b623a8480d46f3d034c91277d03c63e22c46dd7a63f0351f2ed66a321737cc52022dcc7a5d8a4a48ae5f9bc60b1bc4907834c33b66bb3a8adcf1408db5369ec8a3741d8848dcd49065a3689581820a2e240357e105af4369c0f321e4691ba911c79f5ad4fc1e93912acec5761310a328110a66ede400a49ad60d6109801cd770775e400827d50968905dd61b44e16143b2f81f8e3dbb5651857db197dde3b4f2b8fcbdbbd412dc0a18614dbf56181b70a15bfb05950617dc60114be4a142894ec8fd0e5c2070d80bb8ff84bde744818a7d0df9e157888ee076b23a4ef7a0d77741aff648ac96f11375222dee873eee8dc24002d13c90735188fd40bc126e2127d016715cec1e51461c40557a25965a689f25668b0693e5fa4db3680d805bc6c62e6ed1e56c4681f8d5cb1c0171f351872ab9ce466efa06cc3540706857bc6bc7412b641543a2e5e56725fe468e86f261f6d2d0993dda0e1f0caadb78f35640dc63070c9ff99b237cf3ec0eb65cae4fd4ab316ea97eb4f31966af354a28a8ead847b10ee7851ae82840622ac1bb9957bf123fd2cf62adf61f17980d21cc9392627cae09bba99bbc5ece5deafd5375e7c39ebee4ce4973194265c5b70a23d5e4cd2793736008cfd43ea169442be1c5f545faef944e8b25968fd004ebec73f575404f6ae18d57dac85c3c000101fb32d2f26f136408855f3ad51485d7fa98fdb509d398f2f87a5785e87ca6564b097fec40a8be0346cd49ece58642e8f40e46e5b898fd6d718774e45c3b13f8f72fe3a620d4006722eb86b60777cb230c3914003a5f3ee18c6f1f17a1587b07142f24406daa64f738b79a6724e9504115c2d1dfa895af2addd021ba32e82f12bbb567486d13408170902eaa42535e2e15fe2900520277bbcc23b8fda17902753055ed49631d1aec6592bf95b52990ffeff85a620b232fc82bac374e6bc2702d8ea3d6b1b675c49f1f5afd058d41f0425418fc87af52f983e0ecdd1444012b4bca2ac70df5c79e816760ad6aba4c1272c448b9466ca43af7bc23948e26ddb61030cdd53928486ef91f48ae3c4dc9ed97def5b0258bef2cdf382b5169534662352e12b47e6655de9e87fe9223f5f9c89af79d82bea53da70a33b79545a5e51af0c0489fd162b682eeb50a06556b0e6552e098076ae7d0ca5913c9ecaa3b39a5a9aa4b1791c28a52102e2ce260a09e99371982405c10842bc1d34718e083654eca76ac1d4a7eddfc2a2161c62bf7f6503c93177c2d66dbe525fdb72227700d7f6f90194fa03b0bc0be1ab63a8532e1e97adcecc1b48a8e8120300888950ceb17d78e66eabc58ddf3b8f5f5ba565b069df920e4f4a324cd726488aa7e69f96950b6aef268c132e0c1a2f295eff67af336657473159f55a6c676067258d5bb2c76d42e6da068589c870a6a6a19b395bedad7ecc45047b5d6421aa2bb04fcfaabb4eaeb54dd73c43ad3eb28ab4493cf290d7c6903f771a5f9d93ea747d2d0d56f4de47ccd82d8b994d1f595595e1525bac10774b5bdd010dda810369fc252816b1f775e236af9ca0b34d2de6304c1cec101a042a7f011756b7d4a9a85a2caed46f4e430896e9104ce97629f2d340e76d65e42d8cd91d5d36c3b7db1a65612570bff575c86bdacf177431811847d29af3b307b98a4198a0f69fd5d1d29cddbedadf90daa013d3f5eff85c9e7da7fad8e5d3c3daa604693520808d19927bffd3e7a1949ae882d51b6655ef2f4b754c0bd579766a4c802bad3aa9c8dc6bb93816f8d6876cb51cc78bc60933c18c6181dff4c2c56dc88cfab8b8864a2b691b8757615dc698bc37616bd7a6551759fb0824efaee08f3d7ec8cd6cdceb4c805bf88a4ea64d7972001fd49348b30af54b28d1ce7d2023d3613ef7ce49c9e2939e774f2dbcaf1c549fee6187fc6c768d4cc002c7ef2fe6d0e58f6e8f6ea6d0e2fcc680830f63fb2f716566743f9f5492cb998c4a5e1fc71c34813deabd8db2a3472e9e391d72e8b689f048c664af077c7fbc120bc6eefff63e1a57dcbc056d20e2ea85344e4dac6a045ec04518a1b7a0f9a6e7a86d5029ffa5d4db37ac1591100baf312cd27a2e9c7aab5614e322a435f43a7e39ea6bc512aa5843d9b8b4caa16ded4ce2cb7378fe4783db69468b7340140c67358f845638d1657073d80c344916b15091723aacdc74528898f416aa860e8038c140f0d4e70669ad43fdefe0be409a9fb9fa18cfb5ca91f7d9860b15aa7fc3a7beb5fd94aaccf57941faa91b2f82a6db983cbf07fdd9e7c8bf3fef6f842fd8d33ddb3b7c62591a4bc5a9a79726dd1c6bbd159de434a822d31bcd2031842c38b9105ad6f33ba78bc504082a14d1c0d8f08029a6eb9f4abf1b8a0a17e3478599894b4994be43938afd2347681903a2a8d2c4033bd036a6dbba0a29eaeb9e6cffd6964f52782b6c1cb5781ac14912cca77b56f6b159c0e8b521c5aed5086450f31c9610000608b9d8e21accbf3d099719ab3e2e603330ec7a70b70a3acc127307e000ea84feba97e77a7b3e185d101dd2e747c66924690cc75468cf7689db43ee9723554de1b045a97308250da82585e267d956dbd856bd21cf03322c3a550a4b701830656550e077cca1a26377cee396bb7e4521b3b17157bb8374bc357cb0629b9e5ea98793f7929f4e0a6a588b0c8639310374f7b3c3c4f2f21bc000922e010b199da5db62fc768eb0071aa08d7cb7875f5dd348f35a7c1f0db7121f60fa92a76da14c794cdd428e6453edab81bfd4c746fb65e85e32f512fa8fbdf665c4a46fc2f3e90cb6c5146a29b1facce865ed82e6f94a82e991d391f4176e5414ac59f2da75bdce8d4125a0df5260794f92ef2c3909f9b68ff8029e46c9d33bbdc6aa25722c2d57724a44562cbc785aaffdf93c2f4d96ef0319572c921cf6b856b7057a5597ef68ca3ee8ff017e6086958a751b6a9d84e95c5b9cbd562bc9439d60041b52451bee83af00fb88b7fdcea743572e3b8ba864acd3bce1122c16a38bdb4bcc4b029b5a8516e1cb938fa8054b2e00f40ed90a85fbe6802b9365b5f0670b44487a21d85bfe1d7108efe1fb7e402dcdbb06326d5aa5f4f34f14bb1cc4205024753c5df27e15e8d3bd1ab7d241a207d62be32ca8495334a502cd53c371da599212a38177c841797ebbbba126e3d3822f61855fd81db4d89930384ae27ef9201efedcbcec852a7556d7991f2c3f15ed9cd91b80615c184d5cafabf735a7fee81b3a75cdc73d4a1af625e6afe2d7de65986e28adfd63fd4e054f8016a817c6aed4908b82c6c25b1fcecf4653660885fe335b7006f1af508060adadd786c5d788a70b2c6aa48da2343db68a1568d3dab70c424ab2794cdafd1fb806c3841042ae245719c08a63fb934d37202a8927c15dc29292b42705664c6b4a9b0a1984493ac6244a5bbabacaa5598951a10eda764a721e9e55fa2f1820ed743b1c1b51898c9de6eb6b98bd3b1dc094f27732eaa7b70ca2ba5e11a3ef6da35732d6ec4ff205a374898cb43b41e6d3f40c37ab4e7d6193c41517792b8b066b70d67ba2b912d58e49ff2a3b3b1a2a67493752eb70fbb0a77e5bb005dfdfa695648eab3f8d39a794097a68f9ae395bdcc10398a2b767d3b06135dbb6256f3f2cf1b5a4a5489c82d55a6112b9b32912b82f007ae3907cb430bb89d604b0532fb0c3e7b5a87bb4def00ed12dd57ff075203f000e50d558c6b4e11525213386a4d3847f5d51259985dd7e6e780aec971f534c747f1d330d3bea53a5", 0x1000}, {&(0x7f00000008c0)="7c53c0df5416e3e0dec6d7182a811df1444e4b6cc8fc91af0fbe5630c1ce4416166663afb51ae4ab3b7a66c564ba447dde191c762b39eac395e1bad97293cf4490f7fed3c1081abec6f38457a556b897bad13937e7dadc387df3f9b14d9312b021c2116759c2281359c2a90de6ed727748fd0f5b52d2fae2e7e090957c6c85e12f0e7a7b0553170cc01f25e4dc", 0x8d}, {&(0x7f00000000c0)="c8b363af1c61ede1940fd2783622b14de2df5da914c60a7d11f9e5", 0x1b}, {&(0x7f0000000980)="a3f89eedfae893dc8879cbcbe45bba39306e8cc343f079e3f8ddb19bb20d77755b2f26aa0649e214f4bd6850b80c8e328aeecc4d25cc3736b64ebe73002aaedc636b4d7dcaba3362352f8b32f3062c6bdc073a9d6ed3631d97e4e1e1cb76d56b720cac4b230733ba1e68df1221481f1b306e71a4fcf9434ec16937b6ca839b665be74b541dedc51eeebf6347bcb077dd061e7afed12239af492c72b939d49afcf7cbd8dd2f1efe4b2fdb1b89", 0xac}, {&(0x7f00000033c0)="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", 0x1000}], 0x9, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}}, {{&(0x7f0000000440)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0xfffffffffffff800, 0x6, "b938308b355c7e7cffd3f927bf5558d5fe5f71ffcb9f1fca838828407ef82b5b83228c87b5ac980258772fbff76d75c7e60ccb8bcf22bd8d5eb1c20bb136db", 0x2b}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000c40)="38de3aa460e41debfe8743fda4d58397ad304df851949aff532edb29c36233a208e95bca54e7cd96874d90f167dc17d0a862b780da51becf14c40f5b981e86a6d7f277e80e3b610bb434f7462f11f4bdc4a06bbcdcb15a19dacd1f806abeedb4efe8e9b3870e5eb0d04107bb7922f211795c9265de8cd50ac751dd6d8984f1ac4559f45a5a84e84fc65457a921985df5490018b052d2ea4d3397de847d695e7d52a7d1acbf7e38d61b3128eb5c0a342cad50d45f4b88f9daa3f59d5d07b44316b9df5e94718454d66e274065be6869ef785b3ed016e9fb46c63382a3bbf0e6a86480f0ed1b43e9260fbf6346cf7d01e624fad06d", 0xf4}, {&(0x7f0000000b40)="953ddb9c1192c5b55a07f0fe016784e7d64144eaf9ac10a12f77c5d875d986786a96bfc5bf1b55d41d79d04e8a615f7e0d05a6045a786813322b967da40b3d276b1d899fa640a3f32c33da693f69c1fac2dca67b65d1c63dcfbb1c89", 0x5c}, {&(0x7f0000000d40)="6bfbf38fcfee3fe9ab90fdc0f1c635e82a1e9caf0abc0fa3c91ca06faffef963000017c7929fb4c5bf129a1d4bd74ac40710eecc49640d45c274676c8e055dfcd625555e6e2a167b3fff55e71eeeba878b", 0x51}, {&(0x7f00000043c0)="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", 0x1000}, {&(0x7f0000000dc0)="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", 0xfe}, {&(0x7f0000000bc0)="b7778bb88d6cb3e8407bf26856a60feafe03fa71a7aaad84856c11baec2ae00bc1250d067dff1ec11f863c3eb5362b10", 0x30}, {&(0x7f0000000ec0)="4d83800b66cb1e33c62da47c6aca6b91ee5c557e3a4c914b831c7ef0ad627c4dd8a6193c1485565b18b0a326579c661e6ad6232674ea9a3c70c3080d9b9eda15f0d424689504d36ed5ce66613f10f9527c220c77ae15db164e62657f8f07907c66f6cd2daca35ecbc8c678c6a1348f6dcc41749332020a0bcbc55648909ca1fe321eb02bda57fa537020a7b60f444dbcdd111af98ec64e53fa1fc02b0ca7d465d87b735c12973c30a20ccf81abb28a6f9edc402efc910f29ac228399ca1cdba61c0e557cac560146fdb0a610f5b8871d39eae29b97", 0xd5}, {&(0x7f0000000fc0)="5a9f7c6f7a15d6f8cdb6fe31878eaed56edd8bc4ed26c6563d34f14a068f2b289ef5d574070029418ee7d071f4528aae924001f20f6dac23ce7a5b1a2f2209b8ab55c96f9ef85d44a915b5b7eca3a255846a1b58c19386802457fcc26ffbae7d3dbf1f6cfa9cf1ec66029b88eb63a2d369e2fb1487b6c421f8927a1db9fdddb4", 0x80}, {&(0x7f0000001040)="e2e6c385c217fc3a983986413c9d9aa35c97a54b2b72ca0333bea0cd19c7fab4a287712dcdfa354ecd8e68f91c6d599f55e264a80c13060436df3108ca6c1a52f990108af936967d37af22c29a68331e67381d17b9824c89217756163750fc1e860b1d10691f160e34574f11cb47fc2e6853c44f0bde1c6bbf8f818b0e3a3809b83733909405f9c2bfe1304beb6846b8e8d493b9020015ad", 0x98}], 0x9, &(0x7f00000011c0)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0x200}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}], 0xd8}}, {{&(0x7f00000012c0)=@nl=@kern={0x10, 0x0, 0x0, 0x200000}, 0x80, &(0x7f0000001340)=[{&(0x7f00000053c0)="67960bab2b7a0557c58ef728ce058148db0c686968a02a2d1faaf76a65205da872a0e188a00e0ba37a8c11a5789de1e9d730a4e110bc03ad5155731f6c7a74e4cad1c4581b8a51bf13f224d18c0718b814fbe6ca6a210b3fed8f97a41d5bc3b829a569df75673af3bc7a99e1386f993bb39fde99d27b910a8963071c420e2b4d8a3810fdceb3ad6fc8997eb04f7935c5d621defec9c2c0ba9b8addab94aa4037625bdd919e44bf05f5c2822a8f48461789d5fc2fe1ef18fd84f06da620f250862f83460b2972c490a8f8917e7472bf703ad22846d1ee37b0e4d954a10459e85c66bb7b62713dd8f7a74e55a009299190ade6936377be789b", 0xf8}, {&(0x7f00000054c0)="761d6c718df983b32c9b0f6210fd0d51ccd147502ca63d04e936f0682c1d1bcb2c1a190b107404ab5d3fdda82b576038df3ad615af322132228a921e784f9e5a8c0193cc04f28fdcf9ab7f5a", 0x4c}], 0x2, &(0x7f0000005540)=[@mark={{0x14, 0x1, 0x24, 0x9}}], 0x18}}], 0x3, 0x8084) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r4, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) 21:04:04 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x02\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:04 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9effffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000120000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:04 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:04 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000240)=""/44) 21:04:04 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000130000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:04 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:04 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:05 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfeffffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000140000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:05 executing program 5: r0 = socket(0x1e, 0x5, 0x0) listen(r0, 0x0) listen(r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x184, r1, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xeb}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffff8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xee}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x76}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffc7b}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffff0001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x685}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xb60}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff81}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x48000}, 0x48c4) 21:04:05 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x03\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:05 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xff03000000000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:05 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 21:04:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140001c0000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140441f0000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:05 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff7f00000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:05 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x04\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:05 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffff00000000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:05 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7, 0x100) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000140), 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000040)={0x53, 0x4d6, 0x6, {0x8, 0x401}, {0x1ff, 0x8}, @period={0x5d, 0x3b4ca0ec, 0x3, 0x2, 0x5, {0x1, 0x80000000, 0x3da, 0x401}, 0x7, &(0x7f0000000000)=[0x1000, 0x2, 0x26, 0x2, 0xa90, 0xfffffffffffffff9, 0x9]}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000380)={0x79, 0x0, [0x2, 0x0, 0x8]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000005c0)={0x0, 0x0, [], @raw_data=[0x0, 0x8000, 0x1000, 0x7, 0x0, 0x0, 0x8, 0x3, 0x6, 0x8, 0x0, 0x400, 0x5, 0x4, 0x101, 0xfffffffffffffff7, 0x5, 0x8, 0x0, 0x0, 0xfffffffffffffc00, 0x59fd, 0x0, 0x0, 0x0, 0x2, 0x0, 0xe2e, 0x3693, 0x6, 0x0, 0x8]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 21:04:05 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 21:04:05 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000200000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc2052140003f0000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:06 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffff000, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:06 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x05\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:06 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:06 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 21:04:06 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:06 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000400000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:06 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x06\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:06 executing program 5: socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000040)=0xcd) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x8000) sendfile(r2, r1, 0x0, 0x8bc9) 21:04:06 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc20521401f440000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:06 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 21:04:06 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\a\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:06 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000600000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:06 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:07 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:07 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:07 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x180) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f00000001c0)={{0x100, 0x4, 0xfffffffffffffffe, 0xffffffffffffffe1, 0x1, 0x101}, 0x40}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x6, 0x2080) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$sock_SIOCETHTOOL(r1, 0x8930, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) fstat(r1, &(0x7f00000000c0)) sysinfo(&(0x7f0000000140)=""/94) 21:04:07 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 21:04:07 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:07 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000e10000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) [ 3402.454960][ T26] kauditd_printk_skb: 9 callbacks suppressed [ 3402.454972][ T26] audit: type=1107 audit(1564779847.215:371): pid=30381 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:07 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\b\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:07 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:07 executing program 0 (fault-call:1 fault-nth:0): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 21:04:07 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 21:04:07 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000f00000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:07 executing program 5: r0 = socket(0x3, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x95, "ca3551e51c8ad3e47a1ad6410c92ce703880a58b3666e49f9651a24b24f036bce288cc0c3582bb6f2a40bf48199855273fa447b272cbf5b4859265cddb037d8719e959e003bd3a76669fb33e20989c42a4b08db3bce0b327b491d9fd5b2b0c31934c6caf43dde47e19ff72dbad66b83151bb045612d4e9966dacb1e50b411df7f4db6946fd3c7ba42125d78d3df6552da8117ac1ee"}, &(0x7f00000001c0)=0x9d) prctl$PR_SET_PDEATHSIG(0x1, 0x1f) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000200)={r1, 0x2}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000000)=0x100000001) close(r3) socket(0x840000000003, 0x3, 0x6) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, &(0x7f0000000240)) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) [ 3402.674173][ T26] audit: type=1107 audit(1564779847.435:372): pid=30497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' [ 3402.706791][T30500] FAULT_INJECTION: forcing a failure. [ 3402.706791][T30500] name failslab, interval 1, probability 0, space 0, times 0 [ 3402.753401][T30500] CPU: 1 PID: 30500 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #86 [ 3402.761435][T30500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3402.771531][T30500] Call Trace: [ 3402.778159][T30500] dump_stack+0x172/0x1f0 [ 3402.784478][T30500] should_fail.cold+0xa/0x15 [ 3402.789078][T30500] ? fault_create_debugfs_attr+0x180/0x180 [ 3402.794894][T30500] ? page_to_nid.part.0+0x20/0x20 [ 3402.799921][T30500] ? ___might_sleep+0x163/0x280 [ 3402.799939][T30500] __should_failslab+0x121/0x190 [ 3402.799957][T30500] should_failslab+0x9/0x14 [ 3402.799969][T30500] __kmalloc+0x2e0/0x770 [ 3402.799988][T30500] ? __kasan_check_write+0x14/0x20 [ 3402.823698][T30500] ? tracepoint_probe_unregister+0x1cc/0x6d0 [ 3402.829695][T30500] tracepoint_probe_unregister+0x1cc/0x6d0 [ 3402.835516][T30500] ? perf_trace_sched_kthread_stop+0x4a0/0x4a0 [ 3402.841686][T30500] trace_event_reg+0x189/0x350 [ 3402.846460][T30500] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 3402.852372][T30500] perf_trace_event_unreg.isra.0+0xb6/0x220 [ 3402.858282][T30500] perf_trace_destroy+0xbc/0x100 [ 3402.863235][T30500] ? perf_tp_event_init+0x120/0x120 [ 3402.868442][T30500] tp_perf_event_destroy+0x16/0x20 [ 3402.873648][T30500] _free_event+0x354/0x13a0 [ 3402.878170][T30500] ? ring_buffer_attach+0x650/0x650 [ 3402.883376][T30500] ? perf_event_release_kernel+0x17b/0xd70 [ 3402.889223][T30500] put_event+0x47/0x60 [ 3402.893306][T30500] perf_event_release_kernel+0x6d5/0xd70 [ 3402.898946][T30500] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3402.905190][T30500] ? put_event+0x60/0x60 [ 3402.909446][T30500] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3402.915697][T30500] perf_release+0x37/0x50 [ 3402.920033][T30500] __fput+0x2ff/0x890 [ 3402.924028][T30500] ? perf_event_release_kernel+0xd70/0xd70 [ 3402.929843][T30500] ____fput+0x16/0x20 [ 3402.933833][T30500] task_work_run+0x145/0x1c0 [ 3402.938458][T30500] exit_to_usermode_loop+0x316/0x380 [ 3402.943758][T30500] do_syscall_64+0x5a9/0x6a0 [ 3402.948354][T30500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3402.954344][T30500] RIP: 0033:0x459829 [ 3402.954360][T30500] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3402.954369][T30500] RSP: 002b:00007f49d9708c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 3402.986304][T30500] RAX: 0000000000000000 RBX: 00007f49d9708c90 RCX: 0000000000459829 [ 3402.994276][T30500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 21:04:07 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000400300008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:07 executing program 2: keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0!\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 21:04:07 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 3403.002247][T30500] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3403.010215][T30500] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49d97096d4 [ 3403.018182][T30500] R13: 00000000004f8dd2 R14: 00000000004d19b0 R15: 0000000000000004 [ 3403.103463][ T26] audit: type=1107 audit(1564779847.865:373): pid=30717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:07 executing program 1: r0 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:04:07 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000048007f0000000000000007000a060040030000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000034000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de873cf1587c3b4100"/252, 0xfc) 21:04:08 executing program 5: ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x1, 0x1) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x8000, 0x0) syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x100, 0x200) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x200040, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x8002) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000001580)=""/4096, 0x1000) open$dir(&(0x7f0000000040)='./file0\x00', 0xc0000, 0x2) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000180)=0x3001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x81) 21:04:08 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf250d000000380003000800040000000000080007004e20000014000200626373663000000000000000000000000008000400020000000800040080000000089767bc4be8f3d68ca2101bd254b4000600000000000800050005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x1000, 0x0, 0x4, 0x100000, {0x0, 0x2710}, {0x5, 0xe, 0x6042, 0x65c, 0x9, 0x2, "7ebc5776"}, 0x100000001, 0x6, @planes=&(0x7f00000002c0)={0x2, 0x0, @mem_offset, 0x5}, 0x4}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000380)=0x20, 0x4) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 3403.249619][ T26] audit: type=1107 audit(1564779848.005:374): pid=30789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='' 21:04:08 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) [ 3403.361598][T22070] kasan: CONFIG_KASAN_INLINE enabled [ 3403.366944][T22070] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 3403.375035][T22070] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 3403.381995][T22070] CPU: 0 PID: 22070 Comm: syz-executor.3 Not tainted 5.3.0-rc2+ #86 [ 3403.389961][T22070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3403.400120][T22070] RIP: 0010:perf_tp_event_match+0x31/0x260 [ 3403.405928][T22070] Code: 89 f6 41 55 49 89 d5 41 54 53 48 89 fb e8 b7 0e ea ff 48 8d bb d0 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e cc 01 00 00 44 8b a3 d0 01 00 [ 3403.425545][T22070] RSP: 0018:ffff88804ffa7790 EFLAGS: 00010007 [ 3403.431615][T22070] RAX: dffffc0000000000 RBX: 00000000ffffff9f RCX: ffffffff818bcb73 [ 3403.439594][T22070] RDX: 000000002000002d RSI: ffffffff818890b9 RDI: 000000010000016f [ 3403.447567][T22070] RBP: ffff88804ffa77b0 R08: ffff8880531ba640 R09: ffffed100a6374c9 [ 3403.455559][T22070] R10: ffffed100a6374c8 R11: ffff8880531ba647 R12: ffff8880ae830860 [ 3403.463535][T22070] R13: ffff8880ae830860 R14: ffff88804ffa7880 R15: dffffc0000000000 [ 3403.471542][T22070] FS: 00005555556d7940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 3403.480469][T22070] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3403.487054][T22070] CR2: 0000000000738008 CR3: 000000004cad5000 CR4: 00000000001406f0 [ 3403.495030][T22070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3403.503001][T22070] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3403.510982][T22070] Call Trace: [ 3403.514337][T22070] perf_tp_event+0x1ea/0x730 [ 3403.518943][T22070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.525189][T22070] ? debug_smp_processor_id+0x3c/0x214 [ 3403.531016][T22070] ? perf_swevent_put_recursion_context+0xa0/0xa0 [ 3403.537443][T22070] ? perf_trace_lock+0xeb/0x4c0 [ 3403.542407][T22070] ? __lockdep_free_key_range+0x120/0x120 [ 3403.548141][T22070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.554393][T22070] ? debug_smp_processor_id+0x3c/0x214 [ 3403.559854][T22070] ? freezer_fork+0x268/0x490 [ 3403.564532][T22070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.570837][T22070] ? debug_smp_processor_id+0x3c/0x214 [ 3403.576312][T22070] ? perf_trace_lock+0xeb/0x4c0 [ 3403.581173][T22070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3403.587502][T22070] ? debug_smp_processor_id+0x3c/0x214 [ 3403.593047][T22070] ? perf_trace_lock+0xeb/0x4c0 [ 3403.597909][T22070] ? __lockdep_free_key_range+0x120/0x120 [ 3403.603634][T22070] ? select_task_rq_fair+0x4bf/0x2350 [ 3403.609101][T22070] ? __kasan_check_read+0x11/0x20 [ 3403.614140][T22070] ? activate_task+0x212/0x490 [ 3403.618898][T22070] ? __kasan_check_read+0x11/0x20 [ 3403.623927][T22070] perf_trace_run_bpf_submit+0x131/0x190 [ 3403.629666][T22070] ? debug_smp_processor_id+0x3c/0x214 [ 3403.635125][T22070] ? perf_trace_run_bpf_submit+0x131/0x190 [ 3403.640948][T22070] perf_trace_sched_wakeup_template+0x42d/0x5d0 [ 3403.647192][T22070] ? perf_trace_sched_kthread_stop+0x4a0/0x4a0 [ 3403.653345][T22070] ? __this_cpu_preempt_check+0x3a/0x210 [ 3403.658977][T22070] ? tracing_record_taskinfo_skip+0xa5/0xe0 [ 3403.664872][T22070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3403.671219][T22070] ? tracing_record_taskinfo+0x7f/0x230 [ 3403.676780][T22070] wake_up_new_task+0x70f/0xbd0 [ 3403.681625][T22070] ? wake_up_new_task+0x70f/0xbd0 [ 3403.686676][T22070] ? to_ratio+0x20/0x20 [ 3403.690849][T22070] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3403.696571][T22070] _do_fork+0x26c/0xfa0 [ 3403.700726][T22070] ? copy_init_mm+0x20/0x20 [ 3403.705492][T22070] ? __kasan_check_read+0x11/0x20 [ 3403.710535][T22070] ? _copy_to_user+0x118/0x160 [ 3403.715307][T22070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3403.721548][T22070] ? put_timespec64+0xda/0x140 [ 3403.726314][T22070] __x64_sys_clone+0x18d/0x250 [ 3403.731077][T22070] ? __ia32_sys_vfork+0xc0/0xc0 [ 3403.735942][T22070] ? trace_hardirqs_off_caller+0x65/0x230 [ 3403.741666][T22070] ? trace_hardirqs_on+0x67/0x240 [ 3403.746700][T22070] do_syscall_64+0xfd/0x6a0 [ 3403.751213][T22070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3403.757150][T22070] RIP: 0033:0x457dfa [ 3403.762573][T22070] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3403.788709][T22070] RSP: 002b:00007ffcf0b1c640 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3403.797128][T22070] RAX: ffffffffffffffda RBX: 00007ffcf0b1c640 RCX: 0000000000457dfa [ 3403.805125][T22070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3403.813132][T22070] RBP: 00007ffcf0b1c680 R08: 0000000000000001 R09: 00005555556d7940 [ 3403.821126][T22070] R10: 00005555556d7c10 R11: 0000000000000246 R12: 0000000000000001 [ 3403.829144][T22070] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcf0b1c6d0 [ 3403.837126][T22070] Modules linked in: [ 3403.841034][T22070] ---[ end trace 8f4efeb0ada52ec1 ]--- [ 3403.846506][T22070] RIP: 0010:perf_tp_event_match+0x31/0x260 [ 3403.852318][T22070] Code: 89 f6 41 55 49 89 d5 41 54 53 48 89 fb e8 b7 0e ea ff 48 8d bb d0 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e cc 01 00 00 44 8b a3 d0 01 00 [ 3403.871938][T22070] RSP: 0018:ffff88804ffa7790 EFLAGS: 00010007 [ 3403.878010][T22070] RAX: dffffc0000000000 RBX: 00000000ffffff9f RCX: ffffffff818bcb73 [ 3403.885985][T22070] RDX: 000000002000002d RSI: ffffffff818890b9 RDI: 000000010000016f [ 3403.894717][T22070] RBP: ffff88804ffa77b0 R08: ffff8880531ba640 R09: ffffed100a6374c9 [ 3403.902804][T22070] R10: ffffed100a6374c8 R11: ffff8880531ba647 R12: ffff8880ae830860 [ 3403.910792][T22070] R13: ffff8880ae830860 R14: ffff88804ffa7880 R15: dffffc0000000000 [ 3403.918773][T22070] FS: 00005555556d7940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 3403.927710][T22070] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3403.934300][T22070] CR2: 0000000000738008 CR3: 000000004cad5000 CR4: 00000000001406f0 [ 3403.942281][T22070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3403.950262][T22070] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3403.958238][T22070] Kernel panic - not syncing: Fatal exception [ 3405.109770][T22070] Shutting down cpus with NMI [ 3405.116688][T22070] Kernel Offset: disabled [ 3405.121479][T22070] Rebooting in 86400 seconds..