[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 21.176864] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.713417] random: sshd: uninitialized urandom read (32 bytes read) [ 24.154348] random: sshd: uninitialized urandom read (32 bytes read) [ 24.829055] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.205' (ECDSA) to the list of known hosts. [ 30.367046] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/10 22:37:46 fuzzer started [ 31.900916] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/10 22:37:49 dialing manager at 10.128.0.26:33453 2018/09/10 22:37:49 syscalls: 1 2018/09/10 22:37:49 code coverage: enabled 2018/09/10 22:37:49 comparison tracing: enabled 2018/09/10 22:37:49 setuid sandbox: enabled 2018/09/10 22:37:49 namespace sandbox: enabled 2018/09/10 22:37:49 fault injection: enabled 2018/09/10 22:37:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/10 22:37:49 net packed injection: enabled 2018/09/10 22:37:49 net device setup: enabled [ 34.836947] random: crng init done 22:40:54 executing program 0: r0 = socket$inet6(0xa, 0x80000, 0x7fff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @rand_addr=0x2d7d}], 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x600) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000080)={0x48, 0x800, 0x6, {}, 0x0, 0xffffffffffffff80}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x2, 0x4) ftruncate(r0, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x800, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000180)) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000240)={0x3f, 0x0, 0x5, 'queue1\x00', 0xffffffff}) r3 = socket$inet6(0xa, 0x80000, 0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x6}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000380)={r4, 0x4, 0x2, 0x6}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000003c0)={@local, @multicast2, 0x0}, &(0x7f0000000400)=0xc) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000440)={@ipv4={[], [], @rand_addr=0x7}, @dev={0xfe, 0x80, [], 0xd}, @local, 0x9, 0x1000, 0xe5, 0x500, 0xb9c0, 0x2340202, r5}) r6 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r2, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000780)={0xc0, 0x0, &(0x7f00000005c0)=[@register_looper, @reply={0x40406301, {0x4, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x30, 0x8, &(0x7f00000004c0)=[@flat={0x77682a85, 0x10a, r6, 0x3}, @fd={0x66642a85, 0x0, r2, 0x0, 0x3}], &(0x7f0000000500)=[0x48]}}, @dead_binder_done={0x40086310, 0x1}, @exit_looper, @reply_sg={0x40486312, {{0x2, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x30, 0x10, &(0x7f0000000540)=[@fd={0x66642a85, 0x0, r3, 0x0, 0x1}, @fd={0x66642a85, 0x0, r2, 0x0, 0x4}], &(0x7f0000000580)=[0x48, 0x48]}, 0x9}}, @register_looper, @acquire={0x40046305, 0x2}, @request_death={0x400c630e, 0x0, 0x3}], 0xe6, 0x0, &(0x7f0000000680)="7a47d37e7063af6caff8e295511654066d0e8f8d5cba23c51720e85e18bf06a76584b5fbe0ce26c0b0795b524bda16489d91df0502b80782026e689a62d0c0f7a6d94cd815ddc4d74b25691111691d09bbb05e4d0327c8a64ae5d2913d485cd592ed93a31a0ca0cb087253dec881d5f5013d0de27222ea986e22b6be1426290e035a512ee6f2bb35a21e1291021b3caa15dafe4b703c13afee02bb30b323e0fbfe3b3b55eee72722601ff5b7c2966e511013556d4d6fd37f515d6fa686cf5e0be5eb1a8ae1df90dfc441a3d77ebaf7c32f9bfe28bea4306912f7da1ffd219230051ea04f2a62"}) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000007c0)=0x2d, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000840)=0xc) bind$pptp(r2, &(0x7f0000000880)={0x18, 0x2, {0x1, @remote}}, 0x1e) setsockopt$inet6_dccp_buf(r3, 0x21, 0xe, &(0x7f00000008c0)="c5ac5c8b16b3d0c1ec6a0d3032725ad0112f70bde18283f41089e452a609544ff8d755f766ebbe588e511382a2934af06a49682b1ee0b77c", 0x38) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000900)={r4, 0x7f, "7aa1f2fb3393a0d4d64e5f045c5b333e63eeb9930a51d174a24ca21408a47023223cdc45171a1166959185c5bdcbb2c400224eb4dc55861109487b1a6ca96f28880bf6ebc116d0f6b125f2ed18d38abb0da9fbd7b7b4efb936c217ecd621f6e5440c71ebfba5a21f2e833523103debb3c963de2fabd2e3f22a6f33dcb4a8ab"}, &(0x7f00000009c0)=0x87) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000a00)='htcp\x00', 0x5) ioctl$TIOCEXCL(r1, 0x540c) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000a40)=@assoc_id=r8, &(0x7f0000000a80)=0x4) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr=0xff, 0x4e22, 0x80000001, 0x4e24, 0xb1, 0x2, 0x20, 0x20, 0x6f, r5, r7}, {0x20, 0x80000001, 0x7, 0x8000, 0x4, 0x8, 0x1, 0x4}, {0x4b, 0x2, 0x0, 0x1}, 0x5, 0x6e6bb0, 0x3, 0x1, 0x3, 0x1}, {{@in=@rand_addr=0xffffffffffffff20, 0x4d4, 0x3c}, 0x2, @in=@broadcast, 0x3500, 0x2, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffffb}}, 0xe8) preadv(r1, &(0x7f0000000c40)=[{&(0x7f0000000bc0)=""/103, 0x67}], 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000c80)={0x0, 0x362, 0xfff, 0x3f, 0x6, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000cc0)=[@in={0x2, 0x4e24, @local}], 0x10) accept4$unix(r1, &(0x7f0000000d00)=@abs, &(0x7f0000000d80)=0x6e, 0x80800) 22:40:54 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20d}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8800) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000180)) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x4) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000200)={0x7f, 0x351, 0x9, 0x5, 0x8, 0x101}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r0, 0xf, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280), &(0x7f00000002c0)=0x14) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000300), 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0x5}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={r2, 0x80000001}, &(0x7f0000000400)=0x8) write$binfmt_elf32(r0, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x7, 0x1, 0x80, 0x3, 0x0, 0x9, 0xef, 0x38, 0x245, 0x0, 0x200, 0x20, 0x1, 0x81, 0x8, 0x9c}, [{0x2, 0x4, 0xfff, 0x5, 0x91, 0x9, 0x6}, {0x0, 0x80000000, 0x7, 0x7f, 0x3, 0xd1, 0x7ff, 0x64db}], "432bcda0000a63e354b19f5a460a70e26e520de2b25173a624dae328b8ad676c56938ad465f9ec0c8efbacc50c56c95eab1f54fe14dc58d93ff4179686", [[], []]}, 0x2b5) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x24004000) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000800)={r3, 0x6}, 0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000840)=@assoc_value={r2, 0x7fffffff}, 0x8) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000880)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f00000008c0)={0x1f, 0xd7, {0xfffffffffffffc00, 0x4, 0x6, 0xc0e, 0x8d9, 0x20}, 0x10001, 0x9}, 0xe) r5 = open(&(0x7f0000000900)='./file0\x00', 0x8000, 0x2) connect$unix(r5, &(0x7f0000000940)=@file={0x1, './file0\x00'}, 0x6e) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000009c0)={0x81, 0x0, {0x2, 0x1, 0x7, 0x3, 0x2}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000a40), &(0x7f0000000a80)=0x14) r6 = fcntl$getown(r4, 0x9) ptrace$getsig(0x4202, r6, 0x4, &(0x7f0000000ac0)) mount$9p_rdma(&(0x7f0000000b00)='127.0.0.1\x00', &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)='9p\x00', 0x100804, &(0x7f0000000bc0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x100}}, {@common=@access_any='access=any'}, {@timeout={'timeout', 0x3d, 0x1000}}, {@sq={'sq', 0x3d, 0x16}}, {@sq={'sq', 0x3d, 0x4}}, {@timeout={'timeout', 0x3d, 0x8}}]}}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000c80)={r2, 0x6286a668}, 0x8) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fcntl$getflags(r5, 0x40b) 22:40:54 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 22:40:54 executing program 3: msgget(0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000580)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/7) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f0000000600)=0x4) syz_execute_func(&(0x7f0000000080)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") request_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0), &(0x7f0000000200)='&securityppp0em1oppp1vmnet1mime_typekeyringposix_acl_access&\x00', 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005d40)={&(0x7f00000002c0), 0xc, &(0x7f0000005c80)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000340)) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$session_to_parent(0x12) io_setup(0x0, &(0x7f0000000500)) keyctl$join(0x1, &(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty, @dev}, &(0x7f0000000780)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00), &(0x7f0000000a40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@local, @in6}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@mcast2}, &(0x7f0000000c00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@loopback}, &(0x7f0000000c80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @multicast1, @loopback}, &(0x7f0000000e80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f00)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000f40)=@hci, &(0x7f0000000fc0)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@dev, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001180)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000011c0)={0x0, @rand_addr, @loopback}, &(0x7f0000001200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001400)=0xe8) 22:40:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) 22:40:54 executing program 1: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08060001080006040000aaaaaaaaaabbac1414bbaaaaaa00000000000000e8776e32aaf8985160ef2556b4d889dcfa5cc2239cd27760b557251bb28eacac1ee75a97ecc0ff4cbd9e4319733e15e8b19fa5d009b1165fe3e0a2042770cf5ec8352fe4c8f971c05f7340c493e449a9fbafc7a045305ac6bc6f9004f06dbb33c9ccdba7498801e52613be9bda43a7588e48e0473dbdaf080ca3fc8c4aa42489cd29999bacbc826ab276bd7d71209d"], 0x0) [ 217.895740] IPVS: ftp: loaded support on port[0] = 21 [ 217.897000] IPVS: ftp: loaded support on port[0] = 21 [ 217.911525] IPVS: ftp: loaded support on port[0] = 21 [ 217.913271] IPVS: ftp: loaded support on port[0] = 21 [ 217.917164] IPVS: ftp: loaded support on port[0] = 21 [ 217.930160] IPVS: ftp: loaded support on port[0] = 21 [ 219.870226] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.876767] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.911028] device bridge_slave_0 entered promiscuous mode [ 219.944799] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.951242] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.966841] device bridge_slave_0 entered promiscuous mode [ 219.979982] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.986446] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.003356] device bridge_slave_0 entered promiscuous mode [ 220.016181] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.022601] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.037652] device bridge_slave_0 entered promiscuous mode [ 220.050970] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.057388] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.070367] device bridge_slave_1 entered promiscuous mode [ 220.080878] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.087286] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.095240] device bridge_slave_0 entered promiscuous mode [ 220.102933] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.109333] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.123541] device bridge_slave_0 entered promiscuous mode [ 220.133731] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.140144] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.152146] device bridge_slave_1 entered promiscuous mode [ 220.162807] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.169451] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.178491] device bridge_slave_1 entered promiscuous mode [ 220.187386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.196676] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.203131] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.220949] device bridge_slave_1 entered promiscuous mode [ 220.232586] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.239034] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.255015] device bridge_slave_1 entered promiscuous mode [ 220.271349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.293858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.302863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.310315] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.316746] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.349707] device bridge_slave_1 entered promiscuous mode [ 220.365072] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.374531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.382161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.426816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.466794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.480517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.518836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.575218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.652231] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.710098] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.747856] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.847279] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.867514] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.893320] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.921798] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.933254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.989509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.031092] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.051743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.065674] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.347479] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.358129] team0: Port device team_slave_0 added [ 221.479822] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.496958] team0: Port device team_slave_0 added [ 221.503232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.515472] team0: Port device team_slave_1 added [ 221.570032] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.596478] team0: Port device team_slave_0 added [ 221.622995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.630208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.639871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.664729] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.678469] team0: Port device team_slave_0 added [ 221.687381] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.696777] team0: Port device team_slave_0 added [ 221.703804] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.720555] team0: Port device team_slave_1 added [ 221.732254] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.746690] team0: Port device team_slave_1 added [ 221.752196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.760536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.778663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.795252] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.803682] team0: Port device team_slave_0 added [ 221.812497] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.821132] team0: Port device team_slave_1 added [ 221.839791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.847081] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.860492] team0: Port device team_slave_1 added [ 221.867196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.881741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.904376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.912474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.925476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.938351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.949261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.959983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.982982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.990108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.999586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.015507] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.025851] team0: Port device team_slave_1 added [ 222.034591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.049130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.061388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.070993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.090591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.121139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.133981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.144839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.155515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.168753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.176136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.197322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.220534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.240439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.249760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.257492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.265572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.279997] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.287569] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.302201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.317420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.331955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.344032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.354893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.372059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.409122] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.424277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.434067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.446249] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.453477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.461613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.478309] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.493972] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.507602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.524172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.551277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.575419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.587452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.603790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.612800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.647072] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.654402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.665713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.746948] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.754268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.764959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.647910] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.654467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.661578] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.668028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.685257] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.692682] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.699105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.706146] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.712577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.721304] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.728919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.743392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.782019] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.788469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.795203] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.801683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.832544] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.858854] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.865330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.872079] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.878509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.903187] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.919550] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.925999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.932758] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.939168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.948817] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.171516] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.177960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.184707] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.191107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.206027] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.781930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.792253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.817690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.832769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.472965] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.511126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.544407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.730259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.889789] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.912556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.923771] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.934911] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.971091] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.173399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.294056] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.351408] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.357760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.367727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.382269] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.393430] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.399748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.410492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.428508] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.438201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.454259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.687585] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.693863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.704946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.761823] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.768178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.783453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.837975] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.852711] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.866913] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.873529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.892589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.912100] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.157190] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.234270] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.316430] 8021q: adding VLAN 0 to HW filter on device team0 22:41:08 executing program 1: request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000380), &(0x7f00000003c0)='#proc\x00', 0xfffffffffffffff8) keyctl$read(0xb, 0x0, &(0x7f0000000400), 0x0) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000f00)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0xf) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xfffffffffffffe35) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000600)) getgid() bind$netlink(0xffffffffffffffff, &(0x7f0000001140), 0xc) getgid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getgroups(0x0, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000001080)={'nat\x00', 0x0, 0x0, 0xc6, [], 0x0, &(0x7f0000000f40), &(0x7f0000000f80)=""/198}, &(0x7f0000001100)=0x78) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e80), 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 22:41:08 executing program 4: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffffbe) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000003c0)=""/138) syz_execute_func(&(0x7f0000000300)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78997e0f6eeefa39f6a02ffa39f60f38302fc4a10dfbd6450f2e1ac4c10d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() 22:41:09 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) getpgrp(0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)) getpgid(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) pipe(&(0x7f00000000c0)) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) dup(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) unshare(0x0) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) 22:41:09 executing program 0: 22:41:09 executing program 0: 22:41:09 executing program 0: 22:41:09 executing program 0: 22:41:09 executing program 3: msgget(0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000580)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/7) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f0000000600)=0x4) syz_execute_func(&(0x7f0000000080)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") request_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0), &(0x7f0000000200)='&securityppp0em1oppp1vmnet1mime_typekeyringposix_acl_access&\x00', 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005d40)={&(0x7f00000002c0), 0xc, &(0x7f0000005c80)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000340)) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$session_to_parent(0x12) io_setup(0x0, &(0x7f0000000500)) keyctl$join(0x1, &(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty, @dev}, &(0x7f0000000780)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000900)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00), &(0x7f0000000a40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@local, @in6}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@mcast2}, &(0x7f0000000c00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@loopback}, &(0x7f0000000c80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @multicast1, @loopback}, &(0x7f0000000e80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f00)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000f40)=@hci, &(0x7f0000000fc0)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@dev, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001180)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000011c0)={0x0, @rand_addr, @loopback}, &(0x7f0000001200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001400)=0xe8) 22:41:09 executing program 2: clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) bpf$MAP_CREATE(0x9903000000000000, &(0x7f00000000c0)={0x8, 0x4, 0x4, 0x8000000000009, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 22:41:09 executing program 0: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x48204) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pread64(r4, &(0x7f0000005000)=""/4096, 0xb8, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 22:41:09 executing program 4: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffffbe) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000003c0)=""/138) syz_execute_func(&(0x7f0000000300)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78997e0f6eeefa39f6a02ffa39f60f38302fc4a10dfbd6450f2e1ac4c10d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() 22:41:10 executing program 2: keyctl$session_to_parent(0x12) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$unix(0x1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xfffffffffffffee3) getgid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgroups(0x0, &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000140)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) gettid() lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003440)) getresuid(&(0x7f0000003480), &(0x7f00000034c0), &(0x7f0000003500)) fstat(0xffffffffffffffff, &(0x7f0000006600)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f00000035c0)) gettid() lstat(&(0x7f0000006840)='./file0\x00', &(0x7f00000067c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003700), &(0x7f0000003740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000003880)=0xa1) getresgid(&(0x7f00000038c0), &(0x7f0000003900), &(0x7f0000003940)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) pipe(&(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006080)={{{@in6=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000006180)=0xfffffffffffffec3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:41:10 executing program 0: clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) futex(&(0x7f0000000040), 0x0, 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000100), 0x0) bpf$MAP_CREATE(0x9903000000000000, &(0x7f00000000c0)={0x8, 0x4, 0x4, 0x8000000000009, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 22:41:10 executing program 1: request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000380), &(0x7f00000003c0)='#proc\x00', 0xfffffffffffffff8) keyctl$read(0xb, 0x0, &(0x7f0000000400), 0x0) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000f00)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0xf) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xfffffffffffffe35) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000600)) getgid() bind$netlink(0xffffffffffffffff, &(0x7f0000001140), 0xc) getgid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getgroups(0x0, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000001080)={'nat\x00', 0x0, 0x0, 0xc6, [], 0x0, &(0x7f0000000f40), &(0x7f0000000f80)=""/198}, &(0x7f0000001100)=0x78) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e80), 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 22:41:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000240)={0x6, {0x1, 0x51dc, 0x7ff, 0x2b0, 0xdd1, 0x1}}) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1b83, 0xd0100) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f00000001c0)={0x3, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}]}) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000580007031dfffd946f61830002200a00090000e7fe1c40000c1ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ebea8653b1cc7e63975c02007b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 22:41:10 executing program 0: syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000640)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) [ 234.044292] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 234.087355] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 22:41:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000240)={0x10, 0x34003}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, 0x39, 0x829, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) 22:41:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x3ff, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000140)={0x0, 0x1, 0x5, &(0x7f0000000100)=0x5}) ioctl$VT_DISALLOCATE(r1, 0x5608) eventfd(0x200) keyctl$set_reqkey_keyring(0x6, 0xfffffffffffffffb) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x10400) getpeername$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) 22:41:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0), &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rmdir(&(0x7f0000000240)='./file0//ile0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@dev={0xac, 0x14, 0x14, 0x18}, @in=@loopback, 0x4e22, 0x0, 0x4e22, 0xe000000000000000, 0x0, 0x80, 0x80, 0xff, 0x0, r4}, {0xa, 0x7, 0x4, 0x0, 0x9, 0x6, 0x40000000000000, 0xc1f}, {0x100000001, 0x0, 0x0, 0x8001}, 0x0, 0x6e6bbd, 0x1}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in=@multicast2, 0x3501, 0x2, 0x3, 0x1ff, 0x3ff, 0x0, 0x3}}, 0xe8) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) r8 = getpgid(0x0) r9 = getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000340)=0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000003c0)=0x0) sendmsg$netlink(r6, &(0x7f0000000440)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)=[{&(0x7f0000000980)={0x424, 0x2e, 0x10, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x8, 0x5b, @u32=0x1}, @nested={0xd8, 0x21, [@typed={0xc, 0x19, @str='cgroup2\x00'}, @typed={0x14, 0x20, @ipv6=@remote}, @generic="edd2fa73bd6f47182f401df00640863d408a807ece6066839d0edb38937c9b518a51ccd929cac1e0bd1c75c6c6abd2633b767555eaa1f1f6e28070099884aa146abcf6d876fb208d75c3a0a23f141c9c2746cc11535daa26f8c873fb9ebaf4c38506894edd3d914348aa16e3d85d465e7a412043643a7e254f206384b68e25d24a31c0e3a66443287295fe0b74a49dfd3ef1723eb086a183d5886d9ec7d745e043f384b9f5c248660e0723cf7d0f3f01a8ca12"]}, @nested={0xe0, 0x4e, [@generic="978607746aaff77e091950f86d7afb66d9cd0e528558088df0ab2a0f39015737ebd1b55314879cea0776b620c39fc6cc9bb7225f732190400e508b9d232226c6209b4c5d4860520759b5dcdb253bfea3509a54edd9f4eae10b7b02bd70aac33b88f7a927c79555f0951f7b065595177227ef959dbfce4f53265faf5533b2b36d793b89efc53210982718b4f9d5c67bead1a4455ae459303fae47f590fae9b97e74d8919e312a85daf82d805e5967ed8d8827bc1b5758019b45659e7e3454ead6", @typed={0x8, 0x54, @uid=r4}, @typed={0xc, 0x35, @str='cgroup2\x00'}, @typed={0x8, 0x7, @pid=r7}]}, @nested={0x248, 0xf, [@generic="8af7ee20a7b0a3a138ed108eb9e3374e5658977ec22d4bc40f6a2af588525fe481a4a6c99acd1757ba93541a0fda1ebb341aaccff3129392e0c5546b", @generic="a72bab2c253914069f02d51c2f238b5d5c840edbef95998e34b5c562b0136d998aa55943f1d6cb0c9486bbfd3712c23479a4348bf84c0da3ed88074fc7a0", @typed={0x8, 0x8e, @ipv4=@multicast1}, @generic="340b7dcf3647c0baa706881fee96a08bb6e4cd1f27a0d33bde239dbf7740", @generic="7858dd871381002a40bbb562111d008aec5d953c5c97ede488df127889f58123c37c03811344fbffbc3960dd127aaa7fde73b7f1bf8807925ae605ff09760406d5526a042d9dc8359c344b215367559faf625c686de231e4bbedd008a1246aac3be2b7174f6714e73d4d9be8d0e705736c35ded946bb04e47d69c9f4ed2f6a73ad53681e506a592642a3088b3f56074135d8ef9847bd830c608c12e6964c88a30dba7ac8520d243beb2dce0327a9010536ed709abca29145a661f60a033d2b34ce7c010cdb14850b", @typed={0xc, 0x6a, @u64=0x3ff}, @typed={0xcc, 0x71, @binary="7ec0a474d078a68e8f9f27fa8e5e435c086c596ae780c7a2d57c36f6f3930f99aafa4cdcd2df2fbef2ac5134b882d4f45a9bf8be443cb23764dc2aa773f1200bd89b91f1af600c7874b0385745d549222b59b4c6f76879f8c34fa2458b42a7f627b1c68503f264ff2c60e462a744b41c48fafe175746aa75c6ea537eed2f97dde3bbc2d5cfbe6de2aaec60fa2506f2a181354ba351eb0da4eac0a8aed48248dc845d48546bd67fc07d6682f8e42f67eee063a672ebf24a1d2a5e8d825a43a5d5d2d52b7284"}, @typed={0x4, 0x2b}]}, @generic="125c92dd72", @typed={0x4, 0x44}]}, 0x424}], 0x1, &(0x7f00000006c0)=[@rights={0x30, 0x1, 0x1, [r2, r0, r3, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r4, r5}, @rights={0x38, 0x1, 0x1, [r0, r3, r2, r3, r0, r2, r1, r0, r0]}, @rights={0x28, 0x1, 0x1, [r2, r1, r0, r0, r2]}, @rights={0x30, 0x1, 0x1, [r3, r3, r0, r0, r2, r0, r1]}, @cred={0x20, 0x1, 0x2, r9, r4, r5}, @cred={0x20, 0x1, 0x2, r10, r4, r5}, @cred={0x20, 0x1, 0x2, r11, r4, r5}], 0x140, 0xc804}, 0x80) 22:41:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000003200290800000000000000000100000018000000140001000700000000000000000000000000000142b640533bb81edda2fc189102e86d7b763fa740f5589bcceca4726cccf62a4fb7f2f9d58ac6edf50e61676e5fd19932d1e18233"], 0x2c}}, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000080)) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) fcntl$setlease(r0, 0x400, 0x3) [ 234.433605] hrtimer: interrupt took 60060 ns [ 234.462575] netlink: set zone limit has 4 unknown bytes 22:41:10 executing program 4: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffffbe) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000003c0)=""/138) syz_execute_func(&(0x7f0000000300)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78997e0f6eeefa39f6a02ffa39f60f38302fc4a10dfbd6450f2e1ac4c10d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() [ 234.491591] netlink: set zone limit has 4 unknown bytes 22:41:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000003200290800000000000000000100000018000000140001000700000000000000000000000000000142b640533bb81edda2fc189102e86d7b763fa740f5589bcceca4726cccf62a4fb7f2f9d58ac6edf50e61676e5fd19932d1e18233"], 0x2c}}, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000080)) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) fcntl$setlease(r0, 0x400, 0x3) 22:41:10 executing program 2: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="680000004be89cb50a9ebb9c7d79408b35ee4323afad0957b2aef3376daf9e8f44c752189f91d23c58e36eeb32ea16e984e36dd7a96e1f9aa5684e153309db256e331fe0a13136ae651f2b2399e4179080ffc7bad4fc9fbbd98808d0c4c81a48d5c216f5523eb1e276a020926242a636e111a5e833632444d854efaba5"], &(0x7f0000000200)=0x70) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x1f, 0x2, &(0x7f0000000600)=[{&(0x7f00000004c0)="75f18fb9e84f733a89f3f4646a0447eff248aa12eadbf3256515585c25200b77eb76024c9aab0a2a0c5a5b0e1a91e9bf472606eff5fa3cdbe86cbc909afc1e90bbd005503955fca46564b110bfbdd66cf097449a0c17703a426562d10b86f5cca1d5e16edd2d942eb4081a9d6249bfced1ea9182dc59b7a5d7cbf3909c118ea2b9e609c4484e091f0c82394c00c9dc20", 0x90, 0xcee}, {&(0x7f0000000580)="88f9073be73bc938ecaa9470490533e04b743fb1a25b89f1cf684f20394f1fdd21e58577899275d7b64b557f0e9065cea6c42acab30c95aad341e857a131c59b7a47d8386b57e70328b58b4897c76a4cc5369a1c9aa9c48e96a6eb3fcff760caca29e84106a24b108320", 0x6a, 0xfe26}], 0x10, &(0x7f0000000640)={[{@fat=@sys_immutable='sys_immutable'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x3}}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={r1, 0x3}, &(0x7f00000002c0)=0x8) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x77359400}}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000380)={r2, 0x1}, &(0x7f00000003c0)=0x8) [ 234.629835] netlink: set zone limit has 4 unknown bytes 22:41:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0), &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rmdir(&(0x7f0000000240)='./file0//ile0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@dev={0xac, 0x14, 0x14, 0x18}, @in=@loopback, 0x4e22, 0x0, 0x4e22, 0xe000000000000000, 0x0, 0x80, 0x80, 0xff, 0x0, r4}, {0xa, 0x7, 0x4, 0x0, 0x9, 0x6, 0x40000000000000, 0xc1f}, {0x100000001, 0x0, 0x0, 0x8001}, 0x0, 0x6e6bbd, 0x1}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in=@multicast2, 0x3501, 0x2, 0x3, 0x1ff, 0x3ff, 0x0, 0x3}}, 0xe8) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) r8 = getpgid(0x0) r9 = getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000340)=0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000003c0)=0x0) sendmsg$netlink(r6, &(0x7f0000000440)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)=[{&(0x7f0000000980)={0x424, 0x2e, 0x10, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x8, 0x5b, @u32=0x1}, @nested={0xd8, 0x21, [@typed={0xc, 0x19, @str='cgroup2\x00'}, @typed={0x14, 0x20, @ipv6=@remote}, @generic="edd2fa73bd6f47182f401df00640863d408a807ece6066839d0edb38937c9b518a51ccd929cac1e0bd1c75c6c6abd2633b767555eaa1f1f6e28070099884aa146abcf6d876fb208d75c3a0a23f141c9c2746cc11535daa26f8c873fb9ebaf4c38506894edd3d914348aa16e3d85d465e7a412043643a7e254f206384b68e25d24a31c0e3a66443287295fe0b74a49dfd3ef1723eb086a183d5886d9ec7d745e043f384b9f5c248660e0723cf7d0f3f01a8ca12"]}, @nested={0xe0, 0x4e, [@generic="978607746aaff77e091950f86d7afb66d9cd0e528558088df0ab2a0f39015737ebd1b55314879cea0776b620c39fc6cc9bb7225f732190400e508b9d232226c6209b4c5d4860520759b5dcdb253bfea3509a54edd9f4eae10b7b02bd70aac33b88f7a927c79555f0951f7b065595177227ef959dbfce4f53265faf5533b2b36d793b89efc53210982718b4f9d5c67bead1a4455ae459303fae47f590fae9b97e74d8919e312a85daf82d805e5967ed8d8827bc1b5758019b45659e7e3454ead6", @typed={0x8, 0x54, @uid=r4}, @typed={0xc, 0x35, @str='cgroup2\x00'}, @typed={0x8, 0x7, @pid=r7}]}, @nested={0x248, 0xf, [@generic="8af7ee20a7b0a3a138ed108eb9e3374e5658977ec22d4bc40f6a2af588525fe481a4a6c99acd1757ba93541a0fda1ebb341aaccff3129392e0c5546b", @generic="a72bab2c253914069f02d51c2f238b5d5c840edbef95998e34b5c562b0136d998aa55943f1d6cb0c9486bbfd3712c23479a4348bf84c0da3ed88074fc7a0", @typed={0x8, 0x8e, @ipv4=@multicast1}, @generic="340b7dcf3647c0baa706881fee96a08bb6e4cd1f27a0d33bde239dbf7740", @generic="7858dd871381002a40bbb562111d008aec5d953c5c97ede488df127889f58123c37c03811344fbffbc3960dd127aaa7fde73b7f1bf8807925ae605ff09760406d5526a042d9dc8359c344b215367559faf625c686de231e4bbedd008a1246aac3be2b7174f6714e73d4d9be8d0e705736c35ded946bb04e47d69c9f4ed2f6a73ad53681e506a592642a3088b3f56074135d8ef9847bd830c608c12e6964c88a30dba7ac8520d243beb2dce0327a9010536ed709abca29145a661f60a033d2b34ce7c010cdb14850b", @typed={0xc, 0x6a, @u64=0x3ff}, @typed={0xcc, 0x71, @binary="7ec0a474d078a68e8f9f27fa8e5e435c086c596ae780c7a2d57c36f6f3930f99aafa4cdcd2df2fbef2ac5134b882d4f45a9bf8be443cb23764dc2aa773f1200bd89b91f1af600c7874b0385745d549222b59b4c6f76879f8c34fa2458b42a7f627b1c68503f264ff2c60e462a744b41c48fafe175746aa75c6ea537eed2f97dde3bbc2d5cfbe6de2aaec60fa2506f2a181354ba351eb0da4eac0a8aed48248dc845d48546bd67fc07d6682f8e42f67eee063a672ebf24a1d2a5e8d825a43a5d5d2d52b7284"}, @typed={0x4, 0x2b}]}, @generic="125c92dd72", @typed={0x4, 0x44}]}, 0x424}], 0x1, &(0x7f00000006c0)=[@rights={0x30, 0x1, 0x1, [r2, r0, r3, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r4, r5}, @rights={0x38, 0x1, 0x1, [r0, r3, r2, r3, r0, r2, r1, r0, r0]}, @rights={0x28, 0x1, 0x1, [r2, r1, r0, r0, r2]}, @rights={0x30, 0x1, 0x1, [r3, r3, r0, r0, r2, r0, r1]}, @cred={0x20, 0x1, 0x2, r9, r4, r5}, @cred={0x20, 0x1, 0x2, r10, r4, r5}, @cred={0x20, 0x1, 0x2, r11, r4, r5}], 0x140, 0xc804}, 0x80) 22:41:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/186) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x5eb, 0x0, 0x100}, &(0x7f0000000580)=0x14) r1 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x120e, 0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0), 0xc, &(0x7f0000000500)={&(0x7f0000000680)={0x14, 0x0, 0x5, 0x300, 0x70bd26, 0x25dfdbff, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x810) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) mmap(&(0x7f0000ff4000/0xa000)=nil, 0xa000, 0x2000000, 0x100011, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000780)={0xab92, 0x0, 0x0, 0x0, 0x2, 0x3ff}) renameat2(r1, &(0x7f0000000200)='./file0/file1\x00', r1, &(0x7f00000002c0)='./file1\x00', 0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) perf_event_open(&(0x7f0000000400)={0x7, 0x70, 0x0, 0x1, 0x100, 0x7, 0x0, 0x7e58, 0xb00, 0x8, 0x3, 0x400, 0x5, 0x3ff, 0x101, 0x0, 0x3f, 0x5, 0x2, 0x6, 0x7, 0x9, 0x7, 0x0, 0xc, 0x1, 0x9, 0x50c58dcb, 0x3, 0x3, 0x0, 0x2, 0x0, 0x3f, 0x5, 0x3f, 0xca88, 0x10000, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000000c0), 0x7}, 0x0, 0x4, 0x3, 0x7, 0x101, 0x6, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file0\x00', 0x3) syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) 22:41:11 executing program 1: request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000380), &(0x7f00000003c0)='#proc\x00', 0xfffffffffffffff8) keyctl$read(0xb, 0x0, &(0x7f0000000400), 0x0) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000f00)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0xf) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xfffffffffffffe35) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000600)) getgid() bind$netlink(0xffffffffffffffff, &(0x7f0000001140), 0xc) getgid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getgroups(0x0, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000001080)={'nat\x00', 0x0, 0x0, 0xc6, [], 0x0, &(0x7f0000000f40), &(0x7f0000000f80)=""/198}, &(0x7f0000001100)=0x78) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e80), 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") [ 234.782002] FAT-fs (loop2): bogus number of reserved sectors [ 234.788045] FAT-fs (loop2): Can't find a valid FAT filesystem 22:41:11 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400240, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000040)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000000080)=@ll, 0xffffffffffffffc5, &(0x7f0000000000), 0x1000000000000318, &(0x7f0000a01f13)=""/237, 0xfd1f}, 0x0) 22:41:11 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10200, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000180)={0x0, 0x1f}, 0x2) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}]}}) 22:41:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000100)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x2) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 22:41:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000000)="0f00130f322eeeb805000000b9008800000f01d9b9800000c00f3235010000000f300f20c035000000200f22c082d9000f20e035000010000f22e00f20e035800000000f22e06465660f3880b602000000", 0x51}], 0x1, 0x5d, &(0x7f0000000580), 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="000000ff00de00"], &(0x7f0000000040)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000100)="0f0103f26d67f2f7320fc79b000000000f01cbc4c23dab8b0a000000f2a3381dd45266baf80cb8bcbd3f80ef66bafc0cb803000000ef0f239df20f5a5b00", 0x3e}], 0xaaaacd8, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 235.175440] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 235.231985] kasan: CONFIG_KASAN_INLINE enabled [ 235.236888] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 235.244356] general protection fault: 0000 [#1] SMP KASAN [ 235.249908] CPU: 1 PID: 6001 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 235.258304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.267680] RIP: 0010:ubifs_mount+0x1a0/0x66f0 [ 235.272269] Code: 49 89 c7 48 89 c6 e8 3f 09 0f ff 49 81 ff 00 f0 ff ff 0f 86 91 03 00 00 e8 fd 07 0f ff 48 89 d8 48 89 da 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 1e 19 00 00 44 0f b6 2b bf [ 235.291175] RSP: 0018:ffff88018170f660 EFLAGS: 00010246 [ 235.296549] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90003281000 [ 235.303830] RDX: 0000000000000000 RSI: ffffffff826dce73 RDI: 0000000000000007 [ 235.311113] RBP: ffff88018170fb88 R08: ffff88018067a540 R09: ffffed003b6246de [ 235.318384] R10: ffffed003b6246de R11: ffff8801db1236f3 R12: ffff88018170fb60 [ 235.325654] R13: dffffc0000000000 R14: ffff8801bf1046c8 R15: ffffffffffffffea [ 235.332927] FS: 00007f6ce574a700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 235.341171] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 235.347050] CR2: 0000000020fdb000 CR3: 00000001bd53b000 CR4: 00000000001426e0 [ 235.354332] Call Trace: [ 235.356933] ? __kernel_text_address+0xd/0x40 [ 235.361432] ? unwind_get_return_address+0x61/0xa0 [ 235.366369] ? __save_stack_trace+0x8d/0xf0 [ 235.370868] ? ubifs_iget+0x1bf0/0x1bf0 [ 235.374864] ? save_stack+0x43/0xd0 [ 235.378489] ? kasan_kmalloc+0xc4/0xe0 [ 235.382379] ? __kmalloc_track_caller+0x14a/0x720 [ 235.387225] ? krealloc+0x65/0xb0 [ 235.390704] ? apparmor_fs_context_parse_param+0x1dd/0x490 [ 235.396340] ? security_fs_context_parse_param+0x54/0xb0 [ 235.401806] ? vfs_parse_fs_param+0x127/0x2c0 [ 235.406306] ? vfs_parse_fs_string+0x1d5/0x2b0 [ 235.410902] ? do_mount+0x658/0x1e30 [ 235.414624] ? ksys_mount+0x12d/0x140 [ 235.418433] ? __x64_sys_mount+0xbe/0x150 [ 235.422590] ? do_syscall_64+0x1b9/0x820 [ 235.426655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.432039] ? find_held_lock+0x36/0x1c0 [ 235.436123] ? __kmalloc_track_caller+0x26e/0x720 [ 235.440973] ? kasan_check_read+0x11/0x20 [ 235.445126] ? rcu_is_watching+0x8c/0x150 [ 235.449291] ? trace_hardirqs_on+0xbd/0x2c0 [ 235.453630] ? rcu_pm_notify+0xc0/0xc0 [ 235.457523] ? kasan_check_read+0x11/0x20 [ 235.461668] ? rcu_is_watching+0x8c/0x150 [ 235.465824] ? rcu_pm_notify+0xc0/0xc0 [ 235.469771] ? krealloc+0x7a/0xb0 [ 235.473230] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.478252] ? kfree+0x1d7/0x210 [ 235.481633] ? kasan_check_read+0x11/0x20 [ 235.485783] ? rcu_is_watching+0x8c/0x150 [ 235.489965] ? rcu_pm_notify+0xc0/0xc0 [ 235.493867] ? vfs_parse_fs_string+0x1f8/0x2b0 [ 235.498454] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.503496] ? kfree+0x1d7/0x210 [ 235.506870] ? ubifs_iget+0x1bf0/0x1bf0 [ 235.510837] legacy_get_tree+0x131/0x460 [ 235.514905] vfs_get_tree+0x1cb/0x5c0 [ 235.518706] do_mount+0x6f9/0x1e30 [ 235.522248] ? lock_release+0x9f0/0x9f0 [ 235.526571] ? copy_mount_string+0x40/0x40 [ 235.530812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.536358] ? _copy_from_user+0xdf/0x150 [ 235.540529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.546152] ? copy_mount_options+0x285/0x380 [ 235.550647] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.556199] ksys_mount+0x12d/0x140 [ 235.559852] __x64_sys_mount+0xbe/0x150 [ 235.563828] do_syscall_64+0x1b9/0x820 [ 235.567733] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.573113] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.578043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.582887] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 235.587906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 235.592928] ? prepare_exit_to_usermode+0x291/0x3b0 [ 235.597960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.602810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.607998] RIP: 0033:0x4572a9 [ 235.611186] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.630085] RSP: 002b:00007f6ce5749c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.637800] RAX: ffffffffffffffda RBX: 00007f6ce574a6d4 RCX: 00000000004572a9 [ 235.645068] RDX: 0000000020fdb000 RSI: 0000000020000040 RDI: 0000000020000080 [ 235.652346] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 235.659704] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 235.666984] R13: 00000000004d3490 R14: 00000000004c8444 R15: 0000000000000001 [ 235.674255] Modules linked in: [ 235.677453] Dumping ftrace buffer: [ 235.680981] (ftrace buffer empty) [ 235.685802] ---[ end trace e4e573176e803c2e ]--- [ 235.690611] RIP: 0010:ubifs_mount+0x1a0/0x66f0 [ 235.695248] Code: 49 89 c7 48 89 c6 e8 3f 09 0f ff 49 81 ff 00 f0 ff ff 0f 86 91 03 00 00 e8 fd 07 0f ff 48 89 d8 48 89 da 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 1e 19 00 00 44 0f b6 2b bf [ 235.714185] RSP: 0018:ffff88018170f660 EFLAGS: 00010246 [ 235.719575] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90003281000 [ 235.726881] RDX: 0000000000000000 RSI: ffffffff826dce73 RDI: 0000000000000007 22:41:12 executing program 1: request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000380), &(0x7f00000003c0)='#proc\x00', 0xfffffffffffffff8) keyctl$read(0xb, 0x0, &(0x7f0000000400), 0x0) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000f00)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0xf) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xfffffffffffffe35) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000600)) getgid() bind$netlink(0xffffffffffffffff, &(0x7f0000001140), 0xc) getgid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getgroups(0x0, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000001080)={'nat\x00', 0x0, 0x0, 0xc6, [], 0x0, &(0x7f0000000f40), &(0x7f0000000f80)=""/198}, &(0x7f0000001100)=0x78) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e80), 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") [ 235.734199] RBP: ffff88018170fb88 R08: ffff88018067a540 R09: ffffed003b6246de [ 235.741505] R10: ffffed003b6246de R11: ffff8801db1236f3 R12: ffff88018170fb60 [ 235.748805] R13: dffffc0000000000 R14: ffff8801bf1046c8 R15: ffffffffffffffea [ 235.756129] FS: 00007f6ce574a700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 235.764391] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 235.770325] CR2: 0000000020fdb000 CR3: 00000001bd53b000 CR4: 00000000001426e0 [ 235.777648] Kernel panic - not syncing: Fatal exception [ 235.783327] Dumping ftrace buffer: [ 235.786855] (ftrace buffer empty) [ 235.790568] Kernel Offset: disabled [ 235.794178] Rebooting in 86400 seconds..